Special Issue "Information-Theoretic Security II"
Deadline for manuscript submissions: 31 August 2019.
Prof. Dr. Eduard A. Jorswieck
Security is one the main challenges for future wireless communications systems, including 5G and beyond, cyber-physical systems, and the Internet of Things. In today’s communications systems, there is a clear separation between data-encryption and error-correction. Error-correction is implemented at the physical layer allowing higher layers to abstract the physical layer as an ideal bit pipe. Encryption, based on cryptographic principles, then takes place on higher layers. This separation has long been an obvious solution in most systems, but there is growing interest in providing security directly at the physical layer by exploiting the properties of the underlying communication channel. In this approach, the security is ensured by information-theoretic arguments that do not require hardy computable functions as in traditional cryptography. This new paradigm is explored from both an information-theoretic and practical point of view, and some preliminary integrations with traditional security systems based on cryptography are investigated. Still, many open questions remain to be addressed for a full integration of information-theoretic security into future communication systems.
Previously unpublished contributions in information theoretic security are solicited, including (but not limited to) the following:
- The secrecy capacity of wireless channels
- Secure communication under adversarial attacks
- Security in distributed storage systems
- Secret key generation and agreement
- Secret sharing in multi-party and multi-user networks
- Security with quantum channels and resources
- Wireless, biometric, and physical unclonable functions (PUF)-based authentication
- Private information retrieval (PIR)
- Security and privacy in distributed storage
- Code design for physical layer security
- Joint cryptography and physical layer security
- Differential, privacy-based schemes
- Anonymity and unlinkability
- Covert and stealth communications
- Unconditional security
- Analysis of physical layer security experiments
- Cross-layer security
Prof. Dr. Rafael F. Schaefer
Prof. Dr. Eduard A. Jorswieck
Prof. Dr. Stefano Tomasin
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- physical layer security
- secret key
- secrecy capacity
- physical unclonable functions (PUFs)
- private information retrieval (PIR)
- information theory
- communication theory
- wireless communication