sensors-logo

Journal Browser

Journal Browser

Communication Security in Wireless and Mobile Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (31 January 2022) | Viewed by 8585

Special Issue Editor

Graduate school of Information Science, Nara Institute of Science and Technology, Ikoma 6300192, Japan
Interests: distributed systems; inter-vehicle communication; mobile computing; multimedia communication; parallel algorithms
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the advancement of wireless communication technologies, it is now common for ordinary users to carry around mobile devices and perform various computing tasks on the road. Today, computers control every inch of equipment that once did not have a built-in computer. A variety of products, such as home appliances and connected cars, have computers embedded in them and are designed to function by constantly exchanging data with the cloud using wireless communication capabilities. They contain a large amount of storage capacity, various sensors and actuators, and implement a wide variety of functions. Various vulnerabilities are discovered every day in these products, and accordingly, various damages are expected to occur if these devices are hijacked by malicious users. This is potentially a major social threat. This Special Issue aims at addressing the topics on security in wireless communication systems across multiple levels, ranging from hardware, interfaces, protocols, applications and services to improve security, trust, and privacy in smart sensors, IoT devices, wearable devices, smart appliances, connected cars, 5G-connected infrastructure, and so on.

Prof. Dr. Naoki Shibata
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Protocols and architectures
  • Algorithmic developments
  • Authentication
  • Access control
  • Trust and identity management
  • Anonymization techniques
  • Blockchain-based methods
  • Threat modeling
  • Vulnerability analysis

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 2707 KiB  
Article
Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles
by Lisset Suárez-Plasencia, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez and Omar Rojas
Sensors 2022, 22(5), 1987; https://doi.org/10.3390/s22051987 - 03 Mar 2022
Viewed by 1658
Abstract
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands out for its security and usability. However, it can be violated if [...] Read more.
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands out for its security and usability. However, it can be violated if the user follows a predefined pattern when selecting the five points in an image as their passwords, such as the DIAG and LINE patterns. Dictionary attacks can be built using these two patterns to compromise graphical passwords. So far, no reports have been found in the state of the art about any test capable of detecting graphical passwords with DIAG or LINE patterns in PassPoints. Studies carried out in other scenarios have shown the effectiveness of the characteristics of Delaunay triangulations in extracting information about the dependence between the points. In this work, graphical passwords formed by five randomly selected points on an image are compared with passwords whose points contain patterns of the DIAG or LINE type. The comparison is based on building for each password its Delaunay triangulation and calculating the mean value of the maximum angles of the triangles obtained; such a mean value is denoted by amadt. It is experimentally shown that in passwords containing DIAG and LINE patterns, the value of amadt is higher than the one obtained in passwords formed by random dots. From this result, it is proposed to use this amadt value as a statistic to build a test of means. This result constitutes the work’s main contribution: The proposal of a spatial randomness test to detect weak graphic passwords that contain DIAG and LINE type patterns. The importance and novelty of this result become evident when two aspects are taken into account: First, these weak passwords can be exploited by attackers to improve the effectiveness of their attacks; second, there are no prior criteria to detect this type of weak password. The practical application of said test contributes to increasing PassPoints security without substantially affecting its efficiency. Full article
(This article belongs to the Special Issue Communication Security in Wireless and Mobile Networks)
Show Figures

Figure 1

22 pages, 3829 KiB  
Article
5G Security Threat Assessment in Real Networks
by Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim and Sungmoon Kwon
Sensors 2021, 21(16), 5524; https://doi.org/10.3390/s21165524 - 17 Aug 2021
Cited by 14 | Viewed by 6012
Abstract
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but [...] Read more.
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service. Full article
(This article belongs to the Special Issue Communication Security in Wireless and Mobile Networks)
Show Figures

Figure 1

Back to TopTop