Special Issue "Security and Privacy in Networks and Multimedia"

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 31 August 2023 | Viewed by 1087

Special Issue Editors

Department of Computer and Control Engineering, Rzeszow University of Technology, Powstancow Warszawy 12, Rzeszow, Poland
Interests: computer engineering; formal modeling and testing; distributed systems; cluster computing; systems modeling; network monitoring; network security; interactive systems; web services; internet systems architectures
Department of Computer and Control Engineering, Rzeszow University of Technology, Powstancow Warszawy 12, Rzeszow, Poland
Interests: embedded systems; industrial control systems; cryptography; colored Petri nets

Special Issue Information

Dear Colleagues,

Over the last two decades, the Internet has become an essential medium for entertainment, information, and business.

The significant development of Web technologies requires the application of increasingly complex systems, the enhancement of infrastructure, and improved security and privacy. The Web ecosystem is still far from advanced, and requires constant improvements, novel technologies, architectures, and algorithms. With the enforcement of privacy laws such as the General Data Protection Regulation in the European Union, privacy protection has received a great deal of attention. How these techniques could be applied is of great interest for study, and is also of practical significance.

In fact, with the rise of social media, mobile technologies, cloud services and IoT, massive amounts of multimedia content are created and disseminated as users post updates that include personal information, video and audio data, and other analytical information. Multimedia has arguably expanded well beyond the scope of its original definition. Therefore, ensuring multimedia security has become a research hotspot in the academic world.

The purpose of this Special Issue is to promote the study of security issues in data networks. We hope that your submitted articles will raise and respond to new security issues, or represent ongoing research to enhance the effectiveness and efficiency of existing security issues in various environments.

In the era of information, a huge amount of digital media is being generated and transmitted every second, in the form of text, imagery, audio, and video. Multimedia has been applied in many fields of human society. Security vulnerabilities and threats may be obstacles to the popularization of multimedia services.

This Special Issue intends to collect high-quality research and review articles concerning privacy protection and security in networks and multimedia processing. We also welcome academic articles that cover security and privacy policies related to IoT and multimedia services.

The topics of interest include, but are not limited to:

  • Reviews or surveys;
  • New technological developments;
  • Security architectures and platforms;
  • Intrusion detection;
  • Anonymization techniques;
  • Access control;
  • AI security;
  • Multimedia services;
  • Processing of encrypted multimedia;
  • Privacy-preserving data mining;
  • Secure multimedia distribution in cloud computing;
  • Cryptographic protocols;
  • Security and privacy in online social networks;
  • Security and privacy issues in smart homes;
  • Empirical research and case studies.

Dr. Tomasz Rak
Dr. Dariusz Rzońca
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security
  • privacy
  • access control
  • cloud computing security
  • data mining security
  • security algorithms
  • data security for mobile internet and social networks
  • games for cybersecurity training and awareness
  • multimedia service
  • enhancement in web infrastructure
  • smart homes

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Identifying Adversary Impact Using End User Verifiable Key with Permutation Framework
by , , and
Electronics 2023, 12(5), 1136; https://doi.org/10.3390/electronics12051136 - 26 Feb 2023
Viewed by 463
Abstract
In the Internet of Things (IoT), security is a crucial aspect that ensures secure communication, transactions, and authentication for different applications. In IoT security, maintaining the user interface and platform security is a critical issue that needs to be addressed due to leaky [...] Read more.
In the Internet of Things (IoT), security is a crucial aspect that ensures secure communication, transactions, and authentication for different applications. In IoT security, maintaining the user interface and platform security is a critical issue that needs to be addressed due to leaky security distribution. During communication, synchronisation and security are important problems. The security problems are caused by the adversary impact and vulnerable attacks, leading to service failure. Therefore, the Permutated Security Framework (PSF) is designed to manage security in the IoT by providing secure communication, transactions, and authentication for different applications. The PSF uses time intervals to manage transaction security. These intervals are secured using end-verifiable keys generated using the conventional Rivest–Shamir–Adleman (RSA) technique in IoT-based communication-related applications. In this approach, the key validity is first provided for the interval, and in the latter, the access permitted time modifies its validity. The security of transactions is managed by dividing time into smaller intervals and providing different levels of security for each interval. By using time intervals, the framework is adaptable and adjustable to changes in the system, such as user density and service allocation rate, adapting parallel transactions per support vector classifications’ recommendations. The proposed framework aims to synchronise interval security, service allocation, and user flexibility to mitigate adversary impact, service failures, and service delays while improving the access rate and transactions. This allows for more flexibility and better management of transaction security. The proposed framework reduces adversary impact (10.98%), service failure (11.82%), and service delay (10.19%) and improves the access rate by 7.73% for different transactions. Full article
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia)
Show Figures

Figure 1

Article
A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments
Electronics 2023, 12(4), 1011; https://doi.org/10.3390/electronics12041011 - 17 Feb 2023
Viewed by 376
Abstract
Wireless sensor networks (WSNs) have developed during the past twenty years as a result of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN technology sends the real-time sense information of a specific monitoring environment to a backend for processing and analysis. [...] Read more.
Wireless sensor networks (WSNs) have developed during the past twenty years as a result of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN technology sends the real-time sense information of a specific monitoring environment to a backend for processing and analysis. Security and management concerns have become hot topics with WSN systems due to the popularity of wireless communication channels. A large number of sensors are dispersed in an unmonitored medical environment, making them not safe from different risks, even though the information conveyed is vital, such as health data. Due to the sensor′s still limited resources, protecting information in WSN is a significant difficulty. This paper presents a hierarchical key management method for safeguarding heterogeneousWSNs on hybrid energy-efficient distributed (HEED) routing. In the proposed method, the Bloom scheme is used for key management and a pseudo-random number generator (PRNG) to generate keys in an efficient method to keep sensor resources. In addition, using cipher block chaining-Rivest cipher 5 (CBC-RC5) in this method achieved cryptography goals such as confidentiality. A comparison is made between the proposed and existing methods such as dynamic secret key management (DSKM) and smart security implementation (SSI) under the same circumstance to determine the performance of the new method. The data transmission in WSN consumes about 71 percent of a sensor′s energy, while encryption computation consumes only 2 percent. As a result, our method reduces the frequency with which data transmissions are made during the key management process. The simulation findings demonstrated that, in comparison to earlier techniques, the proposed method is significantly more secure, flexible, scalable, and energy-efficient. Our proposed method is also able to prevent classifications of node capture attacks. Full article
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia)
Show Figures

Figure 1

Back to TopTop