Special Issue "Security and Privacy in Information and Communication Systems"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: 31 May 2019

Special Issue Editors

Guest Editor
Dr. Ammar Alazab

Melbourne Institue Technology, Australia
Website | E-Mail
Interests: Cyber Crime and Cyber Security; Network Security; Data Science; Digital Forensics; Machine Learning and Data Mining; Mobile Computing; Cloud Computing; IOT Security
Guest Editor
Prof. Dr. Johnson Agbinya

Melbourne Institute Technology, Australia
Website | E-Mail
Interests: Mobile and wireless communications; Sensor networks and microcontrollers; Internet of Things; Biometric Systems; Wireless energy transfer
Guest Editor
Dr. Mamoun Alazab

Charles Darwin University, Australia
Website | E-Mail
Interests: Cyber security; Digital forensics; Data analytics, with a focus on cybercrime detection and prevention; Internet of Things (IoT) systems
Guest Editor
Dr. Ameer Al-Nemrat

University of East London, UK
Website | E-Mail
Interests: Cyber Criminal network analysis using data-mining techniques; Cybercrime prevention and detection; Profiling Cybercrime victims; Digital Forensics and Stegnography techniques

Special Issue Information

Dear Colleagues,

Our increasing interconnectivity with the Internet relies on the security of the ICT infrastructures. These infrastructures are a rich source of data (both financial and confidential) and can be subject to criminal exploitation and abuse. Recent security breaches show that security and privacy protection remain ongoing research topics. It is not an exaggeration to overstate the importance of security, privacy, and risk management to individuals, organizations, and governments. However, it is clear that many challenges, with the new technology advancement, remain unaddressed, such as IoT, Cloud Computing, CPS, Edge/Fog, Mobile Computing, Blockchain. Also important, in the context of privacy and security, is the interface between humans and technology.

This Special Issue encourages the submission of manuscripts that present research frameworks, methods, methodologies, theory developments and validations, case studies, simulation results and analyses, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy-preserving initiatives.

This Special Issue focuses on the practical aspects of security and privacy in ICT and aims to capture the latest advances in this research field. The scope of this Special Issue encompasses the security, privacy, and digital forensics of mobile systems, Big Data, IoT, CPS, mobile networks, and mobile cloud. Original and unpublished contributions on novel attacks, defences, and security applications in computing are solicited.

Topics of interest include (but are not limited to) the following subject categories:

  • Security and Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
  • Communication Privacy and Anonymity
  • Secure architectures for converged communication network
  • 5G technologies, applications, and services for the Internet of Things
  • Access and Usage Control
  • Risk and Reputation Management
  • Security and Privacy in Cloud and Pervasive Computing
  • Authentication, Privacy, and Security Models
  • Security Architecture and Design Analysis
  • Security Awareness and Education
  • Security Frameworks, Architectures, and Protocols
  • Security Testing
  • Software Security Assurance
  • Threat Awareness
  • Vulnerability Analysis and Countermeasures
  • Information Hiding and Anonymity
  • Web Applications and Services
  • Biometric Technologies and Applications
  • Content Protection and Digital Rights Management
  • Cryptographic Algorithms
  • Data and Software Security
  • Data Mining and Knowledge Discovery
  • Database Security
  • Identity and Trust Management
  • Trusted Computing
  • Intrusion Detection and Response
  • Legal and Regulatory Issues
  • Malware Detection
  • Mobile Systems Security
  • Privacy Metrics and Control
  • Privacy, Security, and Trust in Social Media

Dr. Ammar Alazab
Dr. Johnson Agbinya
Dr. Mamoun Alazab
Dr. Ameer Al-Nemrat
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security
  • privacy
  • digital forensics of mobile systems
  • Big Data
  • IoT
  • CPS
  • mobile networks
  • mobile cloud

Published Papers (5 papers)

View options order results:
result details:
Displaying articles 1-5
Export citation of selected articles as:

Research

Jump to: Review

Open AccessArticle Ant Colony Optimization Task Scheduling Algorithm for SWIM Based on Load Balancing
Future Internet 2019, 11(4), 90; https://doi.org/10.3390/fi11040090
Received: 19 February 2019 / Revised: 29 March 2019 / Accepted: 30 March 2019 / Published: 2 April 2019
PDF Full-text (2676 KB) | HTML Full-text | XML Full-text
Abstract
This paper focuses on the load imbalance problem in System Wide Information Management (SWIM) task scheduling. In order to meet the quality requirements of users for task completion, we studied large-scale network information system task scheduling methods. Combined with the traditional ant colony [...] Read more.
This paper focuses on the load imbalance problem in System Wide Information Management (SWIM) task scheduling. In order to meet the quality requirements of users for task completion, we studied large-scale network information system task scheduling methods. Combined with the traditional ant colony optimization (ACO) algorithm, using the hardware performance quality index and load standard deviation function of SWIM resource nodes to update the pheromone, a SWIM ant colony task scheduling algorithm based on load balancing (ACTS-LB) is presented in this paper. The experimental simulation results show that the ACTS-LB algorithm performance is better than the traditional min-min algorithm, ACO algorithm and particle swarm optimization (PSO) algorithm. It not only reduces the task execution time and improves the utilization of system resources, but also can maintain SWIM in a more load balanced state. Full article
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)
Figures

Figure 1

Open AccessArticle Nonlinear Analysis of Built-in Sensor in Smart Device under the Condition of Voice Actuating
Future Internet 2019, 11(3), 81; https://doi.org/10.3390/fi11030081
Received: 25 February 2019 / Revised: 12 March 2019 / Accepted: 15 March 2019 / Published: 26 March 2019
PDF Full-text (8355 KB) | HTML Full-text | XML Full-text
Abstract
A built-in sensor in a smart device, such as the accelerometer and the gyroscope, will produce an obvious nonlinear output when it receives voice signal. In this paper, based on the chaotic theory, the nonlinearity of smartphone built-in accelerometer is revealed by phase [...] Read more.
A built-in sensor in a smart device, such as the accelerometer and the gyroscope, will produce an obvious nonlinear output when it receives voice signal. In this paper, based on the chaotic theory, the nonlinearity of smartphone built-in accelerometer is revealed by phase space reconstructing after we calculate several nonlinearity characteristics, such as best delay time, embedding dimension, and the attractor of accelerometer system, under the condition of voice commands inputting. The results of theoretical calculation and experiments show that this specific nonlinearity could lay a foundation for further signal extraction and analysis. Full article
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)
Figures

Figure 1

Open AccessArticle eHealth Integrity Model Based on Permissioned Blockchain
Future Internet 2019, 11(3), 76; https://doi.org/10.3390/fi11030076
Received: 17 January 2019 / Revised: 18 March 2019 / Accepted: 20 March 2019 / Published: 24 March 2019
PDF Full-text (1650 KB) | HTML Full-text | XML Full-text
Abstract
(1) Background: Large eHealth systems should have a mechanism to detect unauthorized changes in patients’ medical documentation, access permissions, and logs. This is due to the fact that modern eHealth systems are connected with many healthcare providers and sites. (2) Methods: Design-science methodology [...] Read more.
(1) Background: Large eHealth systems should have a mechanism to detect unauthorized changes in patients’ medical documentation, access permissions, and logs. This is due to the fact that modern eHealth systems are connected with many healthcare providers and sites. (2) Methods: Design-science methodology was used to create an integrity-protection service model based on blockchain technology. Based on the problem of transactional transparency, requirements were specified and a model was designed. After that, the model’s security and performance were evaluated. (3) Results: a blockchain-based eHealth integrity model for ensuring information integrity in eHealth systems that uses a permissioned blockchain with off-chain information storage was created. In contrast to existing solutions, the proposed model allows information removal, which in many countries’ eHealth systems is a legal requirement, and is based on a blockchain using the Practical Byzantine Fault Tolerant algorithm. (4) Conclusion: A blockchain can be used to store medical data or only security-related data. In the proposed model, a blockchain is mainly used to implement a data-integrity service. This service can be implemented using other mechanisms, but a blockchain provides a solution that does not require trusted third parties, works in a distributed eHealth environment, and supports document removal. Full article
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)
Figures

Figure 1

Open AccessArticle Smart System for Prediction of Accurate Surface Electromyography Signals Using an Artificial Neural Network
Future Internet 2019, 11(1), 25; https://doi.org/10.3390/fi11010025
Received: 2 December 2018 / Revised: 25 December 2018 / Accepted: 2 January 2019 / Published: 21 January 2019
PDF Full-text (9241 KB) | HTML Full-text | XML Full-text
Abstract
Bioelectric signals are used to measure electrical potential, but there are different types of signals. The electromyography (EMG) is a type of bioelectric signal used to monitor and recode the electrical activity of the muscles. The current work aims to model and reproduce [...] Read more.
Bioelectric signals are used to measure electrical potential, but there are different types of signals. The electromyography (EMG) is a type of bioelectric signal used to monitor and recode the electrical activity of the muscles. The current work aims to model and reproduce surface EMG (SEMG) signals using an artificial neural network. Such research can aid studies into life enhancement for those suffering from damage or disease affecting their nervous system. The SEMG signal is collected from the surface above the bicep muscle through dynamic (concentric and eccentric) contraction with various loads. In this paper, we use time domain features to analyze the relationship between the amplitude of SEMG signals and the load. We extract some features (e.g., mean absolute value, root mean square, variance and standard deviation) from the collected SEMG signals to estimate the bicep’ muscle force for the various loads. Further, we use the R-squared value to depict the correlation between the SEMG amplitude and the muscle loads by linear fitting. The best performance the ANN model with 60 hidden neurons for three loads used (3 kg, 5 kg and 7 kg) has given a mean square error of 1.145, 1.3659 and 1.4238, respectively. The R-squared observed are 0.9993, 0.99999 and 0.99999 for predicting (reproduction step) of smooth SEMG signals. Full article
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)
Figures

Figure 1

Review

Jump to: Research

Open AccessReview Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues
Future Internet 2019, 11(3), 73; https://doi.org/10.3390/fi11030073
Received: 7 February 2019 / Revised: 11 March 2019 / Accepted: 13 March 2019 / Published: 18 March 2019
PDF Full-text (551 KB) | HTML Full-text | XML Full-text
Abstract
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organizations’ human capital cyber security knowledge bases are very [...] Read more.
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organizations’ human capital cyber security knowledge bases are very low. In particular, the lack of social engineering awareness is a concern in the context of human cyber security risks. This study highlights pitfalls and ongoing issues that organizations encounter in the process of developing the human knowledge to protect from social engineering attacks. A detailed literature review is provided to support these arguments with analysis of contemporary approaches. The findings show that despite state-of-the-art cyber security preparations and trained personnel, hackers are still successful in their malicious acts of stealing sensitive information that is crucial to organizations. The factors influencing users’ proficiency in threat detection and mitigation have been identified as business environmental, social, political, constitutional, organizational, economical, and personal. Challenges with respect to both traditional and modern tools have been analyzed to suggest the need for profiling at-risk employees (including new hires) and developing training programs at each level of the hierarchy to ensure that the hackers do not succeed. Full article
(This article belongs to the Special Issue Security and Privacy in Information and Communication Systems)
Figures

Figure 1

Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top