Special Issue "Advances on Networks and Cyber Security"

A special issue of Network (ISSN 2673-8732).

Deadline for manuscript submissions: 30 September 2023 | Viewed by 18454

Special Issue Editors

Faculty of Science and Engineering, Plymouth University, Drake Circus, Plymouth PL4 8AA, UK
Interests: computer networks; wireless networks; network performance; network security
Special Issues, Collections and Topics in MDPI journals
School of Economics and Technology, Faculty of Informatics and Telecommunications, University of Peloponnese, 22131 Tripolis, Greece
Interests: cryptography; coding; security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue will include a selection of papers covering a range of subjects, focusing on topical areas of computer networks and security, with a specific emphasis on novel environments, ranging from 5G and virtualized infrastructures to Internet of Things, smart environments and cyber security issues.

Networking represents the underlying core of current IT systems, providing the necessary communication support for complex infrastructures. Recent years have witnessed a number of novel concepts moving from theory to large scale implementations, such as software defined networking, network function virtualization, 5G, smart environments, and IoT. These concepts fundamentally change the paradigms used in traditional networking, with a number of areas, such as network routing and system or business security, having to adjust or redesign to accommodate them. While the benefits are clear, through the advent of new applications, use cases, improved user interaction and experience, they also introduce new challenges for generic network architectures, mobility, security and traffic engineering.

This is a joint special issue with Electronics.

Dr. Nicholas Kolokotronis
Dr. Bogdan Ghita
Dr. Stavros Shiaeles
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Network is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • traffic engineering and network management
  • pervasive networks
  • network-enabled devices
  • smart city
  • smart grid
  • smart home
  • NFV
  • SDN
  • 5G
  • routing
  • network and service management
  • traffic engineering
  • congestion control
  • security and privacy: authentication and access control
  • network security
  • intrusion detection and response
  • digital forensics

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

Article
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach
Network 2022, 2(4), 606-627; https://doi.org/10.3390/network2040035 - 02 Nov 2022
Viewed by 929
Abstract
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial [...] Read more.
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial control systems (ICS) have received significantly less attention. What is very different is that industrial control systems can be made to do things that could destroy equipment or even harm people. For example, in 2021 the US encountered a cyberattack on a water treatment plant in Florida that could have resulted in serious injuries or even death. These risks are based on the unique physical characteristics of these industrial systems. In this paper, we present a holistic, integrated safety and security analysis, we call Cybersafety, based on the STAMP (System-Theoretic Accident Model and Processes) framework, for one such industrial system—an industrial chiller plant—as an example. In this analysis, we identify vulnerabilities emerging from interactions between technology, operator actions as well as organizational structure, and provide recommendations to mitigate resulting loss scenarios in a systematic manner. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Article
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network
Network 2022, 2(4), 519-544; https://doi.org/10.3390/network2040031 - 12 Oct 2022
Viewed by 1150
Abstract
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet [...] Read more.
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet traffic on the network, especially in the IoT network where resources are limited. It is necessary to know the status of the communication environment and the reason why network scanning failed. Therefore, this paper proposes a multimodel-based approach which can be utilized to estimate the cause of failure/delay of network scanning over wireless networks where a scan packet or its response may sometimes be dropped or delayed. Specifically, the factors that cause network scanning failure/delay were identified and categorized. Then, using a machine learning algorithm, we introduced a multimodel linear discriminant analysis (MM-LDA) to estimate the cause of scan failure/delay based on the results of network scanning. In addition, a one-to-many model and a training data filtering technique were adopted to ensure that the estimation error was drastically reduced. The goal of our proposed method was to correctly estimate the causes of scan failure/delay in IP-connected devices. The performance of the proposed method was evaluated using computer simulation assuming a cellular (LTE) network as the targeted IoT wireless network and using LTE-connected devices as the targeted IoT devices. The proposed MM-LDA correctly estimates the cause of failure/delay of the network scan at an average probability of 98% in various scenarios. In comparison to other conventional machine learning classifiers, the proposed MM-LDA outperforms various classification methods in the estimation of the cause of scan failure/delay. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Review

Jump to: Research

Review
Cybersecurity Challenges in the Maritime Sector
Network 2022, 2(1), 123-138; https://doi.org/10.3390/network2010009 - 07 Mar 2022
Cited by 9 | Viewed by 15189
Abstract
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to [...] Read more.
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to the lack of Internet connectivity and the isolated nature of ships in the sea, is showing a 900% increase in cybersecurity breaches on operational technology as it enters the digital era. Although some research is being conducted in this area, maritime cybersecurity has not been deeply investigated. Hence, this paper provides a close investigation of the landscape of cybersecurity in the maritime sector with the aim of highlighting security problems and challenges. First, it explores the systems available on ships that could be targeted by attackers, their possible vulnerabilities that an attacker could exploit, the consequences if the system is accessed, and actual incidents. Then, it describes and analyses possible mitigation actions that can be utilised in advance to prevent such attacks. Finally, several challenges and open problems are discussed for future research. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Back to TopTop