Advances in Mathematical Cryptography and Information Security toward Industry 5.0

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Engineering Mathematics".

Deadline for manuscript submissions: 1 November 2024 | Viewed by 1147

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering, University of Mount Union, Alliance, OH 44601-3993, USA
Interests: ML/federated learning in wireless systems; heterogeneous networks; massive MIMO; reconfigurable intelligent surface-assisted networks; mmWave communication networks; energy harvesting; full-duplex communications; cognitive radio; small cell; non-orthogonal multiple access (NOMA); physical layer security; UAV networks; visible light communication; IoT system
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

As we gradually move toward Industry 5.0, which is envisioned as a complex network integrating information technology and massive industrial production processes, the need to protect security-critical systems from unauthorized access becomes imperative. However, due to the proliferation of massive devices in such a complex system, designing a secure user authentication scheme for achieving the desired forward secrecy poses several challenges. The preliminary authentication schemes have not addressed the problem by considering the resource-limited sensor nodes. Most of these schemes have not provided forward secrecy, and only a few achieve forward secrecy at high computational costs. Generally, the sensor nodes deployed in a typical industrial setting are resource-limited devices. In particular, their storage and computation resources are limited. Additionally, sensitive user data in the industry 5.0 applications need to be well secured from a multitude of sophisticated adversaries that proliferate cyber-space. As a result, it becomes expedient to authenticate and secure sensitive user information transmitted via sensor nodes from all intruders. In order to achieve this objective, a suitable authentication protocol and a session key are desirable to grant access to only the authorized users of the application. Cryptography relies on mathematics and logic to design strong security schemes. Modern cryptography and information security emphasize the mathematics behind the theory of these cryptosystems. This Special Issue calls for original contributions to designing and developing advanced mathematical cryptographic schemes for information security toward Industry 5.0.

The topics of interest include but are not limited to the following:

  • Advanced mathematical cryptography in the Industry 5.0 era.
  • Information security in Industry 5.0 for societal good.
  • Sustainable cryptographic models for secured systems in Industry 5.0.
  • Secured digital twins enabling smart systems in Industry 5.0.
  • Novel security architectures for smart systems in Industry 5.0.
  • Lightweight authentication schemes based on extended Chebyshev chaotic maps.
  • Machine learning aiding the design and development of advanced cryptographic schemes for information security.
  • Security and privacy challenges for designing and developing advanced cryptographic schemes for information security toward Industry 5.0.
  • Experimentation and deployment of advanced cryptographic schemes for information security.
  • Machine learning and blockchain technology enabling the design of novel advanced cryptographic schemes and information security.
  • Case studies and recommendations for designing and developing advanced cryptographic schemes for information security.

This Special Issue will provide novel contributions that will drive cutting-edge research, leading to the development of advanced mathematical cryptography and information security toward Industry 5.0. Quality submissions from academia and industry are highly welcome.

Prof. Dr. Cheng-Chi Lee
Dr. Dinh-Thuan Do
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • lightweight schemes
  • energy-efficient protocols
  • authentication
  • information security
  • forward secrecy
  • wireless sensor nodes
  • biometrics
  • machine learning
  • Internet of Things
  • blockchain technology
  • security and privacy
  • chaotic communications
  • artificial intelligence
  • Industry 5.0
  • wireless security systems
  • discrete logarithms
  • factorization algorithms
  • probability theory
  • collision algorithms
  • lattice-based cryptography
  • chaos-based cryptography

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 300 KiB  
Article
On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
by Satyabrat Rath, Jothi Ramalingam and Cheng-Chi Lee
Mathematics 2024, 12(5), 713; https://doi.org/10.3390/math12050713 - 28 Feb 2024
Viewed by 374
Abstract
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have [...] Read more.
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have security vulnerabilities. This work identifies a critical flaw in a recent outsourcing protocol for RSA proposed by Hu et al. We demonstrate how this flaw compromises the security of the entire RSA system. Subsequently, we propose a robust solution that strengthens the RSA algorithm and mitigates the identified vulnerability. Furthermore, our solution remains resilient against existing lattice-based attacks. The proposed fix offers a more secure and efficient way for IoT devices to leverage the power of third-party servers while maintaining data integrity and confidentiality. An extensive performance evaluation confirms that our solution offers comparable efficiency while significantly enhancing security compared to existing approaches. Full article
Show Figures

Figure 1

Back to TopTop