sensors-logo

Journal Browser

Journal Browser

Monitoring of Security Properties in IoT and Emerging Technologies

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 August 2021) | Viewed by 23965

Special Issue Editors

Ampliación Campus de Teatinos, Universidad de Málaga, 29071 Málaga, Spain
Interests: secure elements and trusted computing system design; security engineering (security patterns); monitoring of security properties in clouds
Special Issues, Collections and Topics in MDPI journals
Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431, USA
Interests: software architecture; systems security; IoT systems; security patterns; cloud computing security; Internet of Things security; object-oriented design
Special Issues, Collections and Topics in MDPI journals
School of Computer Science and Electronic Engineering, University of Essex, Colchester CO4 3SQ, UK
Interests: security and privacy requirements engineering; IoT, 5G, cyber-physical, and cloud computing security; model-based security/privacy engineering; security engineering decision support; security attack and threat discovery; security and privacy patterns; automated analysis tools
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The recent advances in technologies such as cloud computing, IoT, edge computing, and fog computing are transforming the way in which large-scale computations are performed. This has introduced improvements in terms of scalability for clouds, and in terms of permanent connection and user-centric computation for IoT, edge, and pervasive computing. However, the incursion of these technologies entails the introduction of new challenges regarding security and privacy. Monitoring of security properties in each of these technologies implies tailoring solutions according to particular features of baseline technology.

The Issue will focus on high-quality research and state-of-the-art research paradigms on monitoring security properties in cloud, IoT, edge, and fog computing. It is open to high-quality research contributions from a wide range of authors including scholars, researchers, academicians, and industry. Original research papers and state-of-the-art reviews will be accepted. We anticipate that this Special Issue will open new roads for further research and technology improvements in this important area.

Subject Coverage

Suitable topics include but are not limited to the following:
Monitoring of security properties in clouds
Monitoring of security properties in IoT
Monitoring of security properties in edge computing
Monitoring of security properties in fog
Monitoring languages
Monitoring Infrastructures

Dr. Antonio Muñoz
Prof. Dr. Eduardo B. Fernandez
Prof. Dr. Haris Mouratidis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

31 pages, 3474 KiB  
Article
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
by Hisham AlMajed and Ahmad AlMogren
Sensors 2020, 20(21), 6158; https://doi.org/10.3390/s20216158 - 29 Oct 2020
Cited by 19 | Viewed by 3957
Abstract
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the [...] Read more.
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one’s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge. Full article
(This article belongs to the Special Issue Monitoring of Security Properties in IoT and Emerging Technologies)
Show Figures

Figure 1

13 pages, 5704 KiB  
Article
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264
by Mingyuan Cao, Lihua Tian and Chen Li
Sensors 2020, 20(18), 5242; https://doi.org/10.3390/s20185242 - 14 Sep 2020
Cited by 15 | Viewed by 2426
Abstract
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that adaptive steganography may not be suitable for video steganography [...] Read more.
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that adaptive steganography may not be suitable for video steganography based on the intra-prediction mode; this is because the adaptive steganography algorithm must first calculate the loss of all cover before the first secret message is embedded. However, the modification of an IPM may change the pixel values of the current block and adjacent blocks, which will lead to the change of the loss of the following blocks. In order to avoid this problem, a new secure video steganography based on a novel embedding strategy is proposed in this paper. Video steganography is combined with video encoding. Firstly, the frame is encoded by an original encoder and all the relevant information is saved. The candidate block is found according to the relevant information and mapping rules. Then every qualified block is analyzed, and a one-bit message is embedded during intra-prediction encoding. At last, if the IPM of this block is changed, the values of the residual are modified in order to keep the optimality of the modified IPM. Experimental results indicate that our algorithm has good security performance and little impact on video quality. Full article
(This article belongs to the Special Issue Monitoring of Security Properties in IoT and Emerging Technologies)
Show Figures

Figure 1

18 pages, 1302 KiB  
Article
Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN: An Experimental Approach
by Jesús Galeano-Brajones, Javier Carmona-Murillo, Juan F. Valenzuela-Valdés and Francisco Luna-Valero
Sensors 2020, 20(3), 816; https://doi.org/10.3390/s20030816 - 03 Feb 2020
Cited by 96 | Viewed by 12237
Abstract
The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and [...] Read more.
The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic. Full article
(This article belongs to the Special Issue Monitoring of Security Properties in IoT and Emerging Technologies)
Show Figures

Figure 1

18 pages, 2096 KiB  
Article
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules
by Alexandra Tidrea, Adrian Korodi and Ioan Silea
Sensors 2019, 19(19), 4191; https://doi.org/10.3390/s19194191 - 27 Sep 2019
Cited by 15 | Viewed by 4262
Abstract
The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing critical infrastructures and manufacturing plants. The evolution towards [...] Read more.
The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing critical infrastructures and manufacturing plants. The evolution towards interconnection and interoperability has expanded the vulnerabilities of these systems, especially in the context of the widely spread legacy standard protocols, by exposing the data to the outside network. After gaining access to the system data by launching a variety of attacks, an intruder can cause severe damage to the industrial process in place. Hence, this paper attempts to respond to the security issue caused by legacy structures using insecure communication protocols (e.g., Modbus TCP, DNP3, S7), presenting a different perspective focused on the capabilities of a trusted platform module (TPM). Furthermore, the intent is to assure the authenticity of the data transmitted between two entities on the same (horizontal interoperation) or different (vertical interoperation) hierarchical levels communicating through Modbus TCP protocol based on functionalities obtained by integrating trusted platform modules. From the experimental results perspective, the paper aims to show the advantages of integrating TPMs in automation/SCADA systems in terms of security. Two methods are proposed in order to assure the authenticity of the messages which are transmitted, respectively the study presents the measurements related to the increased time latency introduced due to the proposed concept. Full article
(This article belongs to the Special Issue Monitoring of Security Properties in IoT and Emerging Technologies)
Show Figures

Figure 1

Back to TopTop