Securing Tomorrow: Human-Centric Security and Privacy in the Fifth Industrial Revolution

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Industrial Electronics".

Deadline for manuscript submissions: 15 July 2026 | Viewed by 5117

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Engineering, Honam University, Gwan-ju 62399, Republic of Korea
Interests: AI and IoT security; security in cloud computing application/social network/collaborative computing

Special Issue Information

Dear Colleagues,

In the wake of rapid technological advancements characterized by the Fifth Industrial Revolution, the integration of human-centric technologies presents unprecedented opportunities and challenges. While discussions around the Fifth Industrial Revolution are ongoing and lacking a concrete definition, it is anticipated that this era will be marked by deeper collaboration between humans and machines, with emotional and intelligent technology innovation at its core. There is an optimistic outlook that beyond mere technological advancement, the Fifth Industrial Revolution will enhance human quality of life and foster sustainable development. With innovations spanning artificial intelligence, the Internet of Things (IoT), and advanced robotics, there is an essential need to re-evaluate cybersecurity and privacy strategies. Protecting sensitive information while ensuring seamless human–technology interaction has become a pivotal concern that affects consumers, businesses, and governments alike. This Special Issue will underscore the critical importance of security measures that are adaptable, resilient, and designed with human factors at the forefront.

This Special Issue will explore innovative security and privacy solutions within the broad and interdisciplinary field of electronic technologies. By aligning with the scope of the Electronics journal, this Special Issue will delve into cutting-edge research that addresses the integration of secure systems into emerging technology platforms. It will also bridge gaps between theoretical research and practical applications, fostering dialogue that enhances both academic and industry-related discourse in electronics.

Areas of interest related to the Fifth Industrial Revolution include the following:

  • Development of human-centric security protocols in IoT and smart environments;
  • Privacy-preserving techniques in AI and machine learning applications;
  • Cybersecurity strategies for next-generation communication systems;
  • Risk management and encryption technologies for digital healthcare;
  • Ethical and policy considerations in the implementation of secure technologies;
  • Cross-disciplinary approaches for enhancing electronic system security.

In this Special Issue, original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • Secure human–computer interaction;
  • Biometrics and identity management systems;
  • Security frameworks for augmented reality and virtual reality;
  • Blockchain applications in enhancing privacy and security;
  • Security challenges in autonomous systems and robotics;
  • Innovations in quantum cryptography;
  • Privacy-enhancing technologies for cloud computing;
  • Secure design and deployment of edge computing networks;
  • Cybersecurity for critical infrastructure systems;
  • Ethical hacking and vulnerability testing methodologies.

I look forward to receiving your contributions. 

Prof. Dr. Hyun A. Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • human-centric security
  • privacy preservation
  • fifth industrial revolution
  • cybersecurity
  • IoT security
  • AI and machine learning privacy
  • blockchain and security
  • autonomous systems
  • quantum cryptography
  • biometric security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 1806 KB  
Article
Human-Centric Zero Trust Identity Architecture for the Fifth Industrial Revolution: A JEPA-Driven Approach to Adaptive Identity Governance
by Jovita T. Nsoh
Electronics 2026, 15(9), 1878; https://doi.org/10.3390/electronics15091878 - 29 Apr 2026
Viewed by 262
Abstract
The Fifth Industrial Revolution (Industry 5.0) foregrounds human–machine collaboration, sustainability, and resilience as organizing principles for next-generation cyber-physical systems. Yet the identity and access management (IAM) architectures inherited from Industry 4.0 remain perimeter-centric, policy-static, and blind to the behavioral dynamics of human–AI teaming. [...] Read more.
The Fifth Industrial Revolution (Industry 5.0) foregrounds human–machine collaboration, sustainability, and resilience as organizing principles for next-generation cyber-physical systems. Yet the identity and access management (IAM) architectures inherited from Industry 4.0 remain perimeter-centric, policy-static, and blind to the behavioral dynamics of human–AI teaming. This paper introduces the Human-Centric Zero Trust Identity Architecture (HC-ZTIA), a novel framework that repositions identity as the adaptive control plane for Industry 5.0 environments. HC-ZTIA integrates three mutually reinforcing innovations: (1) a Joint Embedding Predictive Architecture (JEPA)-driven Behavioral Identity Assurance Engine (BIAE) that learns abstract world models of operator and machine-agent behavior to perform continuous, context-aware identity verification without relying on raw biometric surveillance; (2) a Privacy-Preserving Adaptive Authorization Protocol (PP-AAP) employing zero-knowledge proofs and federated policy evaluation to enforce least-privilege access across human, non-human, and hybrid identity classes while satisfying data-minimization mandates; and (3) a Resilience-Oriented Trust Degradation Model (RO-TDM) that provides formally verified fail-safe identity governance under adversarial, degraded, or disconnected operating conditions characteristic of operational technology (OT) and critical infrastructure. The framework is grounded in the Agile-Infused Design Science Research Methodology (A-DSRM) and formally extends National Institute of Standards and Technology (NIST) SP 800-207 and the Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model by addressing five identified gaps in human-centric identity governance. Simulation results, validated through Monte Carlo trials with 95% confidence intervals, provide preliminary evidence that HC-ZTIA reduces identity-related breach exposure by 73.2% (±4.1%) while maintaining sub-200 ms authorization latency under the simulated conditions, offering a principled bridge between Zero Trust rigor and Industry 5.0 human-centricity. Full article
Show Figures

Figure 1

29 pages, 931 KB  
Article
Stateful Order-Preserving Encryption for Secure Cloud Databases
by Nam-Su Jho and Taek-Young Youn
Electronics 2026, 15(7), 1412; https://doi.org/10.3390/electronics15071412 - 28 Mar 2026
Viewed by 307
Abstract
We propose stateful order-preserving encryption (SOPE), a novel framework designed to realize human-centric data security and privacy, the fundamental values of the Fifth Industrial Revolution. Conventional order-preserving encryption supports efficient queries in cloud databases but fundamentally leaks plaintext distributions, leaving data vulnerable to [...] Read more.
We propose stateful order-preserving encryption (SOPE), a novel framework designed to realize human-centric data security and privacy, the fundamental values of the Fifth Industrial Revolution. Conventional order-preserving encryption supports efficient queries in cloud databases but fundamentally leaks plaintext distributions, leaving data vulnerable to inference attacks. To mitigate this vulnerability while maintaining query efficiency, SOPE introduces a partition-based dynamic density adjustment mechanism under an honest-but-curious threat model. This mechanism offsets density imbalances between partitions in real time by inserting decoy ciphertexts, thereby limiting the leakage scope to the order of data while obscuring frequency information. Our analysis and empirical evaluations demonstrate that SOPE’s ciphertexts consistently approach a uniform distribution by adaptively compensating for the underlying plaintext distribution through decoy insertion. While the continuous insertion of decoy ciphertexts inevitably incurs additional storage overhead (controlled by a tunable parameter λ), our evaluations demonstrate practical performance. By striking an optimal balance between efficiency and human privacy rights, SOPE provides a trustworthy infrastructure for secure data utilization. Full article
Show Figures

Figure 1

15 pages, 3236 KB  
Article
Analysis of OpenCV Security Vulnerabilities in YOLO v10-Based IP Camera Image Processing Systems for Disaster Safety Management
by Do-Yoon Jung and Nam-Ho Kim
Electronics 2025, 14(16), 3216; https://doi.org/10.3390/electronics14163216 - 13 Aug 2025
Viewed by 4007
Abstract
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology [...] Read more.
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology in disaster response and safety management systems has been increasing, but it has been confirmed that open source-based object detection frameworks and security vulnerabilities in IP cameras can pose serious threats to the reliability and safety of actual systems. In this study, the structure of an image processing system that applies the latest YOLO v10 algorithm was analyzed, and major security threats (e.g., remote code execution, denial of service, data tampering, authentication bypass, etc.) that might occur during the IP camera image collection and processing process using OpenCV were identified. In particular, the possibility of attacks due to insufficient verification of external inputs (model files, configuration files, image data, etc.), failure to set an initial password, and insufficient encryption of network communication sections were presented with cases. These problems could lead to more serious results in mission-critical environments such as disaster safety management. Full article
Show Figures

Figure 1

Back to TopTop