sensors-logo

Journal Browser

Journal Browser

Special Issue "Cryptography and Security Protocol in Internet of Things"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: 31 December 2022 | Viewed by 1152

Special Issue Editors

Dr. Lei Xu
E-Mail Website
Guest Editor
Computer Science Department, Kent State University, 800 E Summit St., Kent, OH 44240, USA
Interests: cryptography engineering; cloud/mobile/IoT security; blockchain; AI safety; security enhancement technologies
Dr. Xinxin Fan
E-Mail Website
Guest Editor
IoTeX, Menlo Pk, CA 94025, USA
Interests: cryptography; blockchain

Special Issue Information

Dear Colleagues,

Recent progress in IoT, including IIoT and the increased capability of digesting harvested data, has created many cutting-edge applications that are being deployed in the field, such as smart transportation, industry 4.0, home automation, etc. At the same time, the complexity of typical IoT systems makes it harder to meet the ever-growing security/privacy demands. As the core of security/privacy protection schemes, all aspects related to cryptographic tools and protocols customized for IoT applications are of the utmost importance to fully unleash the potential of IoT.

Potential topics include but are not limited to:

  • New cryptographic tools that mitigate existing security/privacy concerns for IoT systems.
  • Engineering-focused works on cryptographic tools and protocols for IoT systems.
  • Benchmarking and testbeds for IoT-oriented cryptographic tools and protocols.
  • Position papers on the future research directions of cryptography and secure protocol for IoT.

If you want to learn more information or need any advice, you can contact the Special Issue Editor Penelope Wang via <[email protected]> directly.

Dr. Lei Xu
Dr. Xinxin Fan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
Sensors 2022, 22(19), 7191; https://doi.org/10.3390/s22197191 - 22 Sep 2022
Viewed by 315
Abstract
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the current related research. Then, we [...] Read more.
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the current related research. Then, we propose a new lightweight authentication and key agreement protocol based on the CoAP framework. The scheme adopts shared secret and elliptic curve public key technology, which ensures the anonymity of the communicators and provides strong security and anti-attack capacity. In terms of security analysis, the Dolev–Yao Adversary model and a security model checking analysis method based on CPN Tools are improved, in order to verify the correctness and security of the proposed scheme. Compared with other schemes, regarding communication overhead, computational cost, and security, the proposed scheme provides a robust and comprehensive security guarantee, although it is not the lightest. Full article
(This article belongs to the Special Issue Cryptography and Security Protocol in Internet of Things)
Show Figures

Figure 1

Article
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
by and
Sensors 2022, 22(17), 6713; https://doi.org/10.3390/s22176713 - 05 Sep 2022
Viewed by 334
Abstract
EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily [...] Read more.
EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily accessible by malicious attackers, attackers can analyze users’ habits based on the intercepted information. This paper analyzed the security of the EnOcean protocol using a formal analysis method based on the colored Petri net (CPN) theory and the Dolev–Yao attacker model and found that the protocol did not anonymize the device identity information and did not have a communication key update mechanism, so an attacker could easily initiate a key compromise impersonation attack (KCIA) after breaking the pre-shared communication key. To address the above security issues, this paper proposed an EnOcean-A protocol with higher security based on the EnOcean protocol. The EnOcean-A protocol introduced a trusted third-party server to send communication keys to communication devices because devices must obtain different communication keys from the trusted third-party server each time they communicated. Thus, this protocol could resist a KCIA and achieve forward security. Meanwhile, the device identity information was anonymized using a homomorphic hash function in the EnOcean-A protocol, and the dynamic update mechanism of the device identity information was added so that an attacker could not obtain the real identity information of the device. Finally, the formal analysis of the EnOcean-A protocol showed that the new protocol could resist a KCIA and ensure the anonymity and untraceability of the communication device, which had higher security compared with the EnOcean protocol. Full article
(This article belongs to the Special Issue Cryptography and Security Protocol in Internet of Things)
Show Figures

Figure 1

Back to TopTop