applsci-logo

Journal Browser

Journal Browser

Information Security and Privacy Protection in Networks and Communication

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: 20 June 2025 | Viewed by 8381

Special Issue Editor


E-Mail Website
Guest Editor
School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
Interests: electronic security; side channel analysis; intelligent security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the development of internet technology, electronic information technology, microelectronic technology, and materials technology, new products, new industries, and new systems in the field of electronic information are developing fast, changing people's lives and working methods. At the same time, the importance of information security in electronic information technology has become increasingly prominent.

Therefore, this Special Issue is intended for the presentation of new ideas and experimental results in the field of electronic information security, from design, service, and theory to its practical use.

Areas relevant to electronic information security include, but are not limited to, electromagnetic security, electronic system design and application, computation and data-intensive applications of electronic information security, novel concurrent algorithms and applications, large-scale computational science in security, artificial intelligence, machine learning, deep learning, and the processing of software and hardware, scientific experiments, sensor networks, medical instruments, and other sources about information security. Computer architecture, integrated circuits, distributed systems, and energy-aware computing are also topics of interest.

This Special Issue will publish high-quality, original research papers in the overlapping fields of:

  • Security design of electronic information systems;
  • Information network and social security;
  • Electromagnetic radiation information security;
  • Aerospace electromagnetic safety;
  • Side channel attack and side channel analysis;
  • E-commerce security;
  • Security strategy;
  • Information security organization;
  • Asset management security;
  • Human resources security;
  • Physical and environmental security;
  • Communication and operational security;
  • Access control security;
  • System acquisition, development, and maintenance security;
  • Information security incident management;
  • Business continuity management.

Prof. Dr. Hongxin Zhang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • electronic security
  • information security
  • side channel analysis
  • physical and environmental security
  • electromagnetic radiation information security
  • security strategy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

27 pages, 2973 KiB  
Article
A Mathematical Model for the Initial Interaction Stage Between a Radar System and a Target Using GERT Network
by Serhii Semenov, Magdalena Krupska-Klimczak, Patryk Mieczkowski, Yevhen Tarasenko, Vitalii Voronets, Oleksandr Voronets, Vitalii Breslavets and Viacheslav Davydov
Appl. Sci. 2025, 15(3), 1123; https://doi.org/10.3390/app15031123 - 23 Jan 2025
Viewed by 670
Abstract
The article presents a mathematical model of radar systems operating under jamming conditions. The relevance of the study is highlighted by two main factors: the need to enhance the accuracy of radar systems and the requirement to incorporate new jamming factors into models, [...] Read more.
The article presents a mathematical model of radar systems operating under jamming conditions. The relevance of the study is highlighted by two main factors: the need to enhance the accuracy of radar systems and the requirement to incorporate new jamming factors into models, which raises challenges in maintaining the reliability of mathematical formalizations. Various modeling approaches, including Markov models, deep learning, and probabilistic filters, are analyzed. These methods enable radar systems to adapt to changing conditions and improve target detection, which are crucial for their effective operation under uncertainty. The article emphasizes the importance of integrating different techniques to develop algorithms capable of functioning in complex jamming environments. A key aspect of the model is its consideration of time delays and probabilistic characteristics, which help to formalize and optimize the system’s performance in various jamming scenarios. The model is based on the Graphical Evaluation and Review Technique (GERT) network, offering in-depth analysis and adaptation of radar systems to changing conditions. This approach is a critical component for enhancing the resilience of radar systems in complex and uncertain operational environments. Full article
Show Figures

Figure 1

33 pages, 1029 KiB  
Article
GSFedSec: Group Signature-Based Secure Aggregation for Privacy Preservation in Federated Learning
by Sneha Kanchan, Jae Won Jang, Jun Yong Yoon and Bong Jun Choi
Appl. Sci. 2024, 14(17), 7993; https://doi.org/10.3390/app14177993 - 6 Sep 2024
Cited by 4 | Viewed by 1492
Abstract
Privacy must be preserved when working with client data in machine learning. Federated learning (FL) provides a way to preserve user data privacy by aggregating locally trained models without sharing the user data. Still, the privacy of user identity is not preserved. Secure [...] Read more.
Privacy must be preserved when working with client data in machine learning. Federated learning (FL) provides a way to preserve user data privacy by aggregating locally trained models without sharing the user data. Still, the privacy of user identity is not preserved. Secure aggregation is a popular technique in FL for aggregating gradients without disclosing individual data. However, it is costly and inaccurate. Therefore, we propose a novel, scalable, cost-effective group signature-based secure aggregation algorithm in FL, called GSFedSec, where secure aggregation helps conceal the user’s update while the group signature helps conceal their identity. Our algorithm preserves the data and their source. Our simulation results show that the proposed algorithm does not suffer from a loss of accuracy, handles increases in network size competently, offers computational and communication efficiency, and is secure against various security attacks. We have compared the results of efficiency and security against existing algorithms in FL. Also, the security of the algorithm is verified using Burrows–Abadi–Needham (BAN) logic and simulated via the Automated Validation of Internet Security Protocols and Applications (AVISPA) protocol. Full article
Show Figures

Figure 1

21 pages, 3986 KiB  
Article
A Security-Oriented Data-Sharing Scheme Based on Blockchain
by Wei Ma, Xibei Wei and Longlong Wang
Appl. Sci. 2024, 14(16), 6940; https://doi.org/10.3390/app14166940 - 8 Aug 2024
Cited by 1 | Viewed by 2244
Abstract
Data sharing serves to maximize the efficiency of data resources by facilitating their full utilization and reducing associated costs. However, existing data-sharing schemes are confronted with issues such as data loss, data tampering, difficulties in privacy protection, and high sharing costs. To address [...] Read more.
Data sharing serves to maximize the efficiency of data resources by facilitating their full utilization and reducing associated costs. However, existing data-sharing schemes are confronted with issues such as data loss, data tampering, difficulties in privacy protection, and high sharing costs. To address these issues, this paper proposes a blockchain-based security-oriented data-sharing scheme. Firstly, an architecture that separates data from data ownership is employed to enhance the security of the scheme and reduce storage overhead. Secondly, a lightweight on-chain and off-chain collaborative data security algorithm based on ECC and ECDHE is designed to ensure confidentiality during data sharing. Finally, a mechanism for tracking the circulation of shared data is proposed, which records the data flow in non-fungible tokens (NFTs), thereby improving the traceability of the proposed scheme. We designed relevant experiments to evaluate the proposed solution, and the results demonstrate that the data-sharing scheme devised in this paper performs well in terms of both security and usability, effectively achieving secure data sharing. Full article
Show Figures

Figure 1

24 pages, 1027 KiB  
Article
Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling
by Vladimir Antić, Danijela Protić, Miomir Stanković, Radomir Prodanović, Miodrag Manić, Gordana Ostojić, Stevan Stankovski and Denis Kučević
Appl. Sci. 2024, 14(11), 4830; https://doi.org/10.3390/app14114830 - 3 Jun 2024
Cited by 1 | Viewed by 3446
Abstract
Unintentional electromagnetic (EM) emissions often include information about the data processed by electronic devices. Intrusion based on an unintentional EM emission leaves no evidence of an attacker’s activity, while the data owner is unaware that it has been lost. EM attacks can be [...] Read more.
Unintentional electromagnetic (EM) emissions often include information about the data processed by electronic devices. Intrusion based on an unintentional EM emission leaves no evidence of an attacker’s activity, while the data owner is unaware that it has been lost. EM attacks can be performed without physically damaging a device that operates regularly. The most typical intrusion activities involve sensitive data exfiltration using various methods that do not require the physical connection of devices to the computer network or communication channels. This research examines EM emissions from computer monitors, wireless keyboards and mice, printers, scanners, conductors, piezoelectric sensors (PES), and radio frequency identification (RFID) devices. The telecommunication electronics material protected from emanating spurious transmissions (TEMPEST) profiling as a performance engineering of the EM footprint is discussed. This study also presents different TEMPEST standards and highlights their importance concerning unintentional EM radiation. Full article
Show Figures

Figure 1

Back to TopTop