sensors-logo

Journal Browser

Journal Browser

Security and Privacy in 5G-Enabled IoT Applications

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (25 April 2023) | Viewed by 2211

Special Issue Editors


E-Mail Website
Guest Editor
Centre for Informatics and Systems, Department of Informatics Engineering, University of Coimbra Polo 2, 3030-290 Coimbra, Portugal
Interests: computer security; computer networks; sensor networks; Internet of Things
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Centre for Informatics and Systems, Department of Informatics Engineering, University of Coimbra, Polo 2, 3030-290 Coimbra, Portugal
Interests: computer networks; QoS; computer security; wireless sensor networks; IoT; 5G networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The necessity of wireless connectivity is increasing. In addition to the human-centric communications that drove most of the present growth, machine-type applications are becoming more important, and the number of devices connected is increasing at a fast pace. The fifth generation of mobile and wireless communications (5G) is designed to support higher speed, reduced latency, and massive connectivity, with improved reliability and energy efficiency. These characteristics make 5G a key enabler to finally realize the full potential of IoT, making it an integral part of our economy and lifestyle. In this context, new applications will be created to support the novel business requirements of different verticals, from healthcare to industry, such as the need to control multiple devices or the support of critical applications that require real-time performance and reliability. These new applications will also demand massive data exchange between different and heterogeneous devices that are connected by an also heterogeneous network. Security will be of cornerstone importance for the enabling of such applications, and appropriate solutions will be required to deal with requirements such as identification and authentication, trust management, end-to-end encryption, and key management, among various others.

This special issue is an ideal platform to report the more recent research advances in security and privacy to support 5G-enabled IoT applications. We invite researchers to contribute with original research and review articles, which share new mechanisms, protocols and architectures, present theoretical proposals, describe practical deployments, or that identify new research opportunities.

Articles may include, but are not limited to, the following topics:

  • Security and privacy concept, mechanisms, and protocols for 5G IoT applications
  • Security in LPWAN (Low Power Wide Area Networks) 5G environments
  • Security in the context of 5G-LPWAN integration
  • Middleware support and services for intra-slice security
  • Modelling, simulation, and tools for effective design of security solutions for 5G IoT
  • Architectures and standards for security in 5G IoT
  • Experiences with real-world deployments and innovative applications
  • 5G core security services and mechanisms
  • Authentication, Authorization and Accounting
  • Autonomous trust management
  • Energy and security management for IoT
  • Security management for distributed IoT devices
  • Latency-controlled secure communication mechanisms
  • Security and Privacy in critical 5G IoT applications
  • Dynamic security for 5G IoT
  • Energy-aware security mechanisms and solutions
  • Security optimization in heterogeneous environments

The integration of IoT applications with 5G communications environments is accelerating the need for the design of innovative and open approaches to security and privacy, as is our target in this special issue of Sensors 

Prof. Dr. Jorge Granjal
Prof. Vasco Pereira
Guest Editors

If you want to learn more information or need any advice, you can contact the Special Issue Editor Bell Ding via <[email protected]>

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 5298 KiB  
Article
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
by Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu and Yousof Al-Hammadi
Sensors 2022, 22(23), 9063; https://doi.org/10.3390/s22239063 - 22 Nov 2022
Viewed by 1304
Abstract
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling [...] Read more.
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol variants, including scalability support and immediate authentication of Multilevel-µTESLA protocol and continuous authentication with minimal computation overhead of enhanced Inf-TESLA protocol. The inclusion of three different keychains and checking criteria of the packets in the Hybrid TLI-µTESLA protocol enabled resistance against Masquerading, Modification, Man-in-the-Middle, Brute-force, and DoS attacks. A solution for the authentication problem in the first and last packets of the high-level and low-level keychains of the Multilevel-µTESLA protocol was also proposed. The simulation analysis was performed using Java, where we compared the Hybrid TLI-µTESLA protocol with other variants for time complexity and computation overhead at the sender and receiver sides. We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. The results demonstrated the superiority of the proposed protocol over other variants in terms of immediate and continuous authentication, scalability, cybersecurity, lifetime, network performance, and compatibility with 5G and 6G IoT generations. Full article
(This article belongs to the Special Issue Security and Privacy in 5G-Enabled IoT Applications)
Show Figures

Figure 1

Back to TopTop