Security and Privacy in Distributed Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (31 July 2023) | Viewed by 5176

Special Issue Editors


E-Mail Website
Guest Editor
Industrial Innovation & Robotics Center, Faculty of Computers and Information Technology, University of Tabuk, Tabuk 47512, Saudi Arabia
Interests: distributed system security; image processing; network security; artificial intelligence

E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621301, Taiwan
Interests: blockchain; deep learning; trustworthy AI; cloud security

E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, Oakland University, Rochester, MI 48309, USA
Interests: real-time systems; computer security; artificial intelligence

Special Issue Information

Dear Colleagues,

Security is an integral component of all systems. Achieving security in a distributed system environment is an arduous task. The major challenge for any system designer is that the system must be efficient and secure. As the size of the system increases, it becomes increasingly difficult to maintain efficiency without compromising security, and vice versa. The threats that a distributed system can face are mostly security threats, and the other security challenges are sharing and storing data in the distributed system. The blockchain, federated learning technology, enables secure data storage and exchanges in a distributed system. A blockchain is an excellent tool for securing and keeping data private by encrypting it and storing it across different machines that are difficult to hack. Federated learning is another option that allows systems to learn and grow together safely in an environment where researchers can work independently without compromising one another’s work. Healthcare, industrial, and social network applications are deployed on distributed systems. The deployed application must be secure and safe for data exchange.

The primary goals of this Special Issue are to discuss how blockchain, federated learning, and trustworthy AI are used to secure and maintain privacy in distributed systems in the modern era, and to provide a forum for experts to discuss their most recent cutting-edge research, opinions, and ideas on potential future directions in this field.

In this Special Issue, original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • Security and privacy in cyber-physical distributed systems;
  • The function of trust management in the security of distributed systems;
  • Security and privacy of distributed online social networks;
  • Implementing security protocols for distributed healthcare systems;
  • Distributed systems privacy and security using blockchain;
  • Trustworthy distributed intelligence for smart factories;
  • Distributed systems data security for Industrial IoT;
  • Security architecture for distributed digital systems;
  • Distributed security network functions against botnet attacks in software-defined networks;
  • Federated learning models for distributed system security;
  • Challenges in cloud computing security and solutions;
  • Threats, issues, and remedies for the distributed IoT network.

Dr. S. Manimurugan
Dr. P. Karthikeyan
Prof. Dr. Subramaniam Ganesan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • deep learning
  • trustworthy AI
  • cloud security
  • image processing

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 1779 KiB  
Article
An Intrusion Detection System Using BoT-IoT
by Shema Alosaimi and Saad M. Almutairi
Appl. Sci. 2023, 13(9), 5427; https://doi.org/10.3390/app13095427 - 26 Apr 2023
Cited by 9 | Viewed by 4392
Abstract
The rapid growth of the Internet of Things (IoT) has led to an increased automation and interconnectivity of devices without requiring user intervention, thereby enhancing the quality of our lives. However, the security of IoT devices is a significant concern as they are [...] Read more.
The rapid growth of the Internet of Things (IoT) has led to an increased automation and interconnectivity of devices without requiring user intervention, thereby enhancing the quality of our lives. However, the security of IoT devices is a significant concern as they are vulnerable to cyber-attacks, which can cause severe damage if not detected and resolved in time. To address this challenge, this study proposes a novel approach using a combination of deep learning and three-level algorithms to detect attacks in IoT networks quickly and accurately. The Bot-IoT dataset is used to evaluate the proposed approach, and the results show significant improvements in detection performance compared to existing methods. The proposed approach can also be extended to enhance the security of other IoT applications, making it a promising contribution to the field of IoT security. Full article
(This article belongs to the Special Issue Security and Privacy in Distributed Systems)
Show Figures

Figure 1

Back to TopTop