Special Issue "Blockchain and Machine Learning for IoT: Security and Privacy Challenges"

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 28 February 2022.

Special Issue Editors

Dr. Michele Mastroianni
E-Mail Website
Guest Editor
Dipartimento di Matematica e Fisica, Universita degli Studi della Campania Luigi Vanvitelli, Caserta, Italy
Interests: security and privacy; computer modeling and simulation; information systems; computer networks
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Francesco Palmieri
E-Mail Website
Guest Editor
Department of Computer Science, University of Salerno, Via Giovanni Paolo II 132, I-84084 Fisciano, SA, Italy
Interests: high performance networking protocols and architectures; routing algorithms; network security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The pervasiveness of IoT technologies in a variety of fields is changing our lives. Industry, agriculture, health, and even personal life are experiencing a revolution in the way data are collected, communicated, processed, and stored. In recent years, two other technologies have begun to be used in synergy with IoT: Blockchain, which has changed the way data are stored, and machine learning, which has changed the way data are processed. With these premises in mind, it is desirable for researchers to focus their attention not just on the performance and features of the new systems but also on the new security and privacy issues related to this revolution. 

This Special Issue invites researchers to contribute with original contributions, case studies, and reviews that address all new challenges due to the use of IoT in synergy with blockchain systems and/or machine learning techniques.

The topics relevant for this Special Issue include (but are not limited to):

  • Security and privacy in blockchain technology for IoT;
  • Intelligent systems for fraud detection and forensics in blockchain environments;
  • Innovative architectures and protocols for safe blockchain application in IoT;
  • Blockchain and trust management;
  • Blockchain-based solutions for IoT security;
  • Novel machine learning and data science methods for IoT security;
  • Generative adversarial networks (GAN) in IoT security;
  • Architectures and protocols for scalable, secure, robust, and privacy enhancing IoT;
  • Privacy preservation in IoT;
  • Vulnerability analysis, threat modeling, and risk assessment in IoT;
  • Intrusion detection for IoT;
  • Novel security architectures, protocols, or applications for IoT.

This is a joint special issue with Network.

Dr. Michele Mastroianni
Prof. Dr. Francesco Palmieri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Blockchain
  • Machine Learning
  • IoT
  • Security
  • Privacy
  • Risk Analysis

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Anonymous Sealed-Bid Auction on Ethereum
Electronics 2021, 10(19), 2340; https://doi.org/10.3390/electronics10192340 - 24 Sep 2021
Viewed by 366
Abstract
In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality of their bids in a decentralized, transparent, secure, and auditable manner. However, in a competitive market, parties [...] Read more.
In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality of their bids in a decentralized, transparent, secure, and auditable manner. However, in a competitive market, parties would prefer not to disclose their interests to competitors, and to remain anonymous during auctions. In this paper, we firstly analyze the specific requirements for blockchain-based anonymous fair auctions. We present a formal model tailored to study auction systems that facilitate anonymity, as well as a generic protocol for achieving bid confidentiality and bidder anonymity using existing cryptographic primitives such as designated verifier ring signature. We demonstrate that it is secure using the security model we presented. Towards the end, we demonstrate through extensive simulation results on Ethereum blockchain that the proposed protocol is practical and has minimal associated overhead. Furthermore, we discuss the complexity and vulnerabilities that a blockchain environment might introduce during implementation. Full article
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Planned Paper 1:

A Survey of Cybersecurity Issues and Challenges in V2X Communication Technology for VANETs

Eslam Farsimadan, Francesco Palmieri, Leila Moradi, Dajana Conte, Beatrice Paternoster

Abstract: Nowadays, both sciences and technology, including Intelligent Transportation Systems, are involved in improving current approaches. Overview studies give you fast, comprehensive, and easy access to all of the existing strategies in the eld. With this inspiration, and the e ect of trac congestion as a challenging issue that a ects the regular daily lives of millions of people around the world, in this work, we concentrate on cyber security issues and challenges in communication paradigms, which can be used to address trac congestion problems. Vehicular Ad-hoc Networking (VANET), a modern networking technology, provides innovative techniques for vehicular trac control and management. Virtual trac light (VTL) methods for VANET seek to address trac issues through using vehicular network communication models. These communication paradigms can be classified into four scenarios: Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) and Vehicle-to-Network (V2N) and Vehicle-to-Pedestrian (V2P). In general, these four scenarios are included in the category of vehicle-to-everything (V2X). Security issues are essential in V2X, as they are in other wireless technologies. Security issues are crucial in V2X, as they are in other wireless technologies. Security issues are essential in V2X, as they are in other wireless technologies. In this paper, we highlight and investigate the most important V2X security issues. The principal purpose of this survey is to provide a comprehensive and systematic overview of various research directions and methodologies, with a focus on security concerns and challenges in V2X communication technologies. First, we go through the fundamental properties of V2X and concentrate on the tandardization approaches applied in communication technologies. Then, we discuss V2X security issues and requirements.

 

Back to TopTop