Special Issue "Security and Privacy for Modern Wireless Communication Systems"

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Microwave and Wireless Communications".

Deadline for manuscript submissions: 31 January 2023 | Viewed by 2349

Special Issue Editors

Dr. Tao Huang
E-Mail Website
Guest Editor
College of Science & Engineering, James Cook University, Nguma-bada Campus, Smithfield Cairns, QLD 4878, Australia
Interests: B5G/6G; URLLC; NOMA; edge computing; IoT security; deep learning; smart sensing; computer vision; pattern recognition
Dr. Shihao Yan
E-Mail Website
Guest Editor
School of Science, Edith Cowan University, 270 Joondalup Drive, Joondalup, WA 6027, Australia
Interests: UAV-aided communications; covert communications; covert sensing; location spoofing detection; physical layer security; IRS-aided wireless communications
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Guanglin Zhang
E-Mail Website
Guest Editor
Department of Communication Engineering, College of Information Science and Technology, Donghua University, Shanghai 201620, China
Interests: mobile edge computing offloading; reinforcement learning for microgrids; online learning for VANET caching optimization for wireless networks; SDN and applications in UAV and the IoT for industry applications
Prof. Dr. Li Sun
E-Mail Website
Guest Editor
School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China
Interests: physical layer security, wireless AI, B5G/6G wireless communication systems, Internet of Things, R&D of experimental platform for wireless communications
Prof. Dr. Tsz Hon Yuen
E-Mail Website
Guest Editor
Department of Computer Science, University of Hong Kong, Pokfulam, Hong Kong
Interests: cryptography; privacy-preserving protocols; blockchain
Dr. YoHan Park
E-Mail Website
Guest Editor
Next-generation Information Security Laboratory(NISL), College of Engineering, Keimyung University, Daegu, Korea
Interests: network security, security of IoT; blockchain; post-quantum cryptography; secu-rity of VANETs; formal analysis
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Changhoon Lee
E-Mail Website
Guest Editor
Department of Computer Science & Engineering, Seoul National University of Science and Technology, Seoul, Korea
Interests: cyber threat intelligence (CTI); information security; digital forensics; IoT and Cloud security; cryptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Security and privacy are always critical issues in wireless communication systems. To tackle these issues, novel designs of cryptography, physical layer transmission strategies, network protocol, and related regulations are in high demand. In the last decade, there has been a significant evolvement in wireless communication networks from many aspects.

Firstly, research on wireless communication systems is now starting to move from 5G to 6G. As a result, there will be further increased device connectivity and information flow in wireless networks. In addition, some emerging new applications, e.g., remote real-time medical services and patient care, require confidential data only to be received and processed by the intended service provider.

Secondly, the development of the Internet of Things (IoT) has become a major driver of automation in many applications, such as smart homes, precision agriculture, and intelligent manufacturing. However, design parameters such as packet length, transmission pattern, and time delay vary significantly for different applications, thus introducing unique challenges in the related security and privacy designs. For example, lightweight cryptography is desired for power-constrained IoT systems.

Thirdly, the development and introduction of new technologies, such as intelligent reflection surface, edge/fog/cloud computing, blockchain, deep learning, and cyber twin, into the wireless communication system design bring new opportunities and challenges in guaranteeing information security and user privacy.

This Special Issue focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing the emerging security and privacy issues for modern wireless communication networks.  Relevant topics include but are not limited to the following:

  • Deep-learning-based security and privacy design;
  • Covert communications;
  • Information-theoretical foundations for advanced security and privacy techniques;
  • Lightweight cryptography for power-constrained networks;
  • Physical-layer key generation;
  • Prototype and testbed for security and privacy solutions;
  • Encryption and decryption algorithm for low-latency constrained networks;
  • Security protocols for modern wireless communication networks;
  • Network intrusion detection;
  • Physical layer design with security consideration;
  • Anonymity in data transmission;
  • Vulnerabilities in security and privacy in modern wireless communication networks;
  • Challenges of security and privacy in node–edge–cloud computation;
  • Security and privacy design for low-power wide-area IoT networks;
  • Security and privacy design for vehicle networks;
  • Security and privacy design for underwater communications networks;
  • Blockchain-based solutions for modern wireless communication networks.

Dr. Tao Huang
Dr. Shihao Yan
Prof. Dr. Guanglin Zhang
Prof. Dr. Li Sun
Prof. Dr. Tsz Hon Yuen
Prof. Dr. Yohan Park
Prof. Dr. Changhoon Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • physical-layer security
  • covert communications
  • information-theoretical foundations
  • lightweight cryptography
  • privacy
  • key generation
  • security protocols
  • intrusion detection
  • machine learning
  • blockchain
  • prototype and testbed

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Provably Secure PUF-Based Lightweight Mutual Authentication Scheme for Wireless Body Area Networks
Electronics 2022, 11(23), 3868; https://doi.org/10.3390/electronics11233868 - 23 Nov 2022
Viewed by 226
Abstract
Wireless body area networks (WBANs) are used in modern medical service environments for the convenience of patients and medical professionals. Owing to the recent COVID-19 pandemic and an aging society, WBANs are attracting attention. In a WBAN environment, the patient has a sensor [...] Read more.
Wireless body area networks (WBANs) are used in modern medical service environments for the convenience of patients and medical professionals. Owing to the recent COVID-19 pandemic and an aging society, WBANs are attracting attention. In a WBAN environment, the patient has a sensor node attached to him/her that collects patient status information, such as blood pressure, blood glucose, and pulse; this information is simultaneously transmitted to his/her respective medical professional through a gateway. The medical professional receives and checks the patient’s status information and provides a diagnosis. However, sensitive information, including the patient’s personal and status data, are transmitted via a public channel, causing security concerns. If an adversary intercepts this information, it could threaten the patient’s well-being. Therefore, a secure authentication scheme is essential for WBAN environments. Recently, Chen et al. proposed a two-factor authentication scheme for WBANs. However, we found out Chen et al.’s scheme is vulnerable to a privileged insider, physical cloning, verification leakage, impersonation, and session key disclosure attacks. We also propose a secure physical-unclonable-function (PUF)-based lightweight mutual authentication scheme for WBANs. Through informal security analysis, we demonstrate that the proposed scheme using biometrics and the PUF is safe against various security attacks. In addition, we verify the security features of our scheme through formal security analyses using Burrows–Abadi–Needham (BAN) logic, the real-or-random (RoR) model, and the Automated Validation of Internet Security Protocols and Applications (AVISPA). Furthermore, we evaluate the security features, communication costs, and computational costs of our proposed scheme and compare them with those of other related schemes. Consequently, our scheme is more suitable for WBAN environments than the other related schemes. Full article
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)
Show Figures

Figure 1

Article
A Cube Attack on a Reduced-Round Sycon
Electronics 2022, 11(21), 3605; https://doi.org/10.3390/electronics11213605 - 04 Nov 2022
Viewed by 325
Abstract
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specific output bits of a BlackBox cipher. Cube attacks target recovery keys or secret states. In this paper, we present a cube attack on a 5-round Sycon permutation [...] Read more.
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specific output bits of a BlackBox cipher. Cube attacks target recovery keys or secret states. In this paper, we present a cube attack on a 5-round Sycon permutation and a 6-round Sycon permutation with a 320-bit state, whose rate occupies 96 bits, and whose capacity is 224 bits. We found cube variables related to a superpoly with a secret state. Within the cube variables, we recovered 32 bits of the secret state. The target algorithm was Sycon with 5-round and 6-round versions of permutation. For the 5-round Sycon, we found a cube variable and recovered a state with a total of 2192 Sycon computations and 237 bits of memory. For the 6-round Sycon, we found cube variables and recovered a state with a total of 2192 Sycon computations and 270 bits of memory. When using brute force in a 5-round attack, 2224 operations were required, but the cube attack proposed in this paper had 248 offline operations, and 232 operations were required. When using brute force in a 6-round attack, 2224 operations were required, but the cube attack proposed in this paper required 295 offline operations, and 263 operations were required. For both attacks, offline could be used continuously after performing only once. To the best of our knowledge, this is the first cube attack on Sycon. Full article
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)
Show Figures

Figure 1

Article
A Study on Secret Key Rate in Wideband Rice Channel
Electronics 2022, 11(17), 2772; https://doi.org/10.3390/electronics11172772 - 02 Sep 2022
Viewed by 463
Abstract
Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can hardly cope with the computational complexity often required to run encryption algorithms. In this framework, physical layer security is often claimed as an effective solution to enforce secrecy [...] Read more.
Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can hardly cope with the computational complexity often required to run encryption algorithms. In this framework, physical layer security is often claimed as an effective solution to enforce secrecy in IoT systems. It relies on wireless channel characteristics to provide a mechanism for secure communications, with or even without cryptography. Among the different possibilities, an interesting solution aims at exploiting the random-like nature of the wireless channel to let the legitimate users agree on a secret key, simultaneously limiting the eavesdropping threat thanks to the spatial decorrelation properties of the wireless channel. The actual reliability of the channel-based key generation process depends on several parameters, as the actual correlation between the channel samples gathered by the users and the noise always affecting the wireless communications. The sensitivity of the key generation process can be expressed by the secrecy key rate, which represents the maximum number of secret bits that can be achieved from each channel observation. In this work, the secrecy key rate value is computed by means of simulations carried out under different working conditions in order to investigate the impact of major channel parameters on the SKR values. In contrast to previous works, the secrecy key rate is computed under a line-of-sight wireless channel and considering different correlation levels between the legitimate users and the eavesdropper. Full article
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)
Show Figures

Figure 1

Article
Time-Dependent Prediction of Microblog Propagation Trends Based on Group Features
Electronics 2022, 11(16), 2585; https://doi.org/10.3390/electronics11162585 - 18 Aug 2022
Viewed by 401
Abstract
The conventional machine learning-based method for the prediction of microblogs’ reposting number mainly focuses on the extraction and representation of static features of the source microblogs such as user attributes and content attributes, without taking into account the problem that the microblog propagation [...] Read more.
The conventional machine learning-based method for the prediction of microblogs’ reposting number mainly focuses on the extraction and representation of static features of the source microblogs such as user attributes and content attributes, without taking into account the problem that the microblog propagation network is dynamic. Moreover, it neglects dynamic features such as the change of the spatial and temporal background in the process of microblog propagation, leading to the inaccurate description of microblog features, which reduces the performance of prediction. In this paper, we contribute to the study on microblog propagation trends, and propose a new microblog feature presentation and time-dependent prediction method based on group features, using a reposting number which reflects the scale of microblog reposting to quantitatively describe the spreading effect and trends of the microblog. We extract some dynamic features created in the process of microblog propagation and development, and incorporate them with some traditional static features as group features to make a more accurate presentation of microblog features than a traditional machine learning-based research. Subsequently, based on the group features, we construct a time-dependent model with the LSTM network for further learning its hidden features and temporal features, and eventually carry out the prediction of microblog propagation trends. Experimental results show that our approach has better performance than the state-of-the-art methods. Full article
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)
Show Figures

Figure 1

Back to TopTop