sustainability-logo

Journal Browser

Journal Browser

Application of Cyber Security in Sustainable System

A special issue of Sustainability (ISSN 2071-1050). This special issue belongs to the section "Sustainable Engineering and Science".

Deadline for manuscript submissions: closed (25 July 2023) | Viewed by 5553

Special Issue Editors

School of Business, Renmin University of China, Beijing 100872, China
Interests: innovation; networks; alternative energy

E-Mail Website
Guest Editor
School of Business, Qingdao University, Qingdao 266071, China
Interests: sustainable development; cyber security; innovation ecology; innovation network

Special Issue Information

Dear Colleagues,

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. Given the rapid digitization of all aspects of business and society, cyber security has become critical. Cyber attacks have become a daily challenge for businesses and society worldwide, and its threats are the top priority of global management. Businesses and society are investing huge sums in improving cyber security, along with the continuous adoption and updating of relevant technologies to resist cyber attacks, thereby maintaining system security and supporting sustainable development.

In the process of maintaining the sustainable development of systems, cyber security technology has many applications. This breadth of applications is also associated with a rich field of research opportunities. For example: How can technologies such as robot automation, blockchain and Internet of Things (IoT) applications help to improve the design of global business and social networks? How can data quality challenges be addressed in the sustainable operation of new ventures? How can big data analysis and optimization tools be used to combat advanced cyber attacks?

This Special Issue will focus on cutting-edge research from both academia and industry, and solicits original research papers with a particular emphasis on the application of cyber security in sustainable systems. Potential topics include, but are not limited to, the following:

  • Reshaping a sustainable view of cyber security;
  • Comparison of cyber security models of sustainable systems;
  • Application of emerging technologies in improving system resilience;
  • Dealing with data quality challenges in the process of sustainable operation;
  • Security, privacy, and trust issues in sustainable systems;
  • The impact of the introduction of AI on the cyber security of sustainable systems;
  • A framework for sustainable systems management considering cyber security;
  • Construction of a sustainable cyber security ecosystem;
  • Problems encountered in the rapid digital transformation of various fields;
  • Challenges in the sustainable operation of new ventures;
  • Cyber security systems considering multi-level coordination and sustainability.

We look forward to receiving your contributions.

Dr. Yan Yan
Dr. Shanwu Tian
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sustainability is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • sustainable systems
  • system resilience
  • sustainable development
  • cyber security
  • trust issues
  • emerging technologies
  • businesses and society management
  • digital transformation
  • innovation
  • networks

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 1276 KiB  
Article
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
by Firuz Kamalov, Mehdi Gheisari, Yang Liu, Mohammad Reza Feylizadeh and Sherif Moussa
Sustainability 2023, 15(13), 10068; https://doi.org/10.3390/su151310068 - 25 Jun 2023
Cited by 5 | Viewed by 1429
Abstract
The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols [...] Read more.
The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively. Full article
(This article belongs to the Special Issue Application of Cyber Security in Sustainable System)
Show Figures

Figure 1

18 pages, 3215 KiB  
Article
Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network
by Hani Alshahrani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman and Asadullah Shaikh
Sustainability 2023, 15(11), 9001; https://doi.org/10.3390/su15119001 - 2 Jun 2023
Cited by 4 | Viewed by 2084
Abstract
The Industrial Internet of Things (IIoT) refers to the employment of the Internet of Things in industrial management, where a substantial number of machines and devices are linked and synchronized with the help of software programs and third platforms to improve the overall [...] Read more.
The Industrial Internet of Things (IIoT) refers to the employment of the Internet of Things in industrial management, where a substantial number of machines and devices are linked and synchronized with the help of software programs and third platforms to improve the overall productivity. The acquisition of the industrial IoT provides benefits that range from automation and optimization to eliminating manual processes and improving overall efficiencies, but security remains to be forethought. The absence of reliable security mechanisms and the magnitude of security features are significant obstacles to enhancing IIoT security. Over the last few years, alarming attacks have been witnessed utilizing the vulnerabilities of the IIoT network devices. Moreover, the attackers can also sink deep into the network by using the relationships amidst the vulnerabilities. Such network security threats cause industries and businesses to suffer financial losses, reputational damage, and theft of important information. This paper proposes an SDN-based framework using machine learning techniques for intrusion detection in an industrial IoT environment. SDN is an approach that enables the network to be centrally and intelligently controlled through software applications. In our framework, the SDN controller employs a machine-learning algorithm to monitor the behavior of industrial IoT devices and networks by analyzing traffic flow data and ultimately determining the flow rules for SDN switches. We use SVM and Decision Tree classification models to analyze our framework’s network intrusion and attack detection performance. The results indicate that the proposed framework can detect attacks in industrial IoT networks and devices with an accuracy of 99.7%. Full article
(This article belongs to the Special Issue Application of Cyber Security in Sustainable System)
Show Figures

Figure 1

34 pages, 2287 KiB  
Article
Application of Multicriteria Methods for Improvement of Information Security Metrics
by Aliya Abdiraman, Nikolaj Goranin, Simas Balevicius, Assel Nurusheva and Inga Tumasonienė
Sustainability 2023, 15(10), 8114; https://doi.org/10.3390/su15108114 - 16 May 2023
Cited by 1 | Viewed by 1170
Abstract
Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication infrastructure facilities. Metrics in the field [...] Read more.
Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication infrastructure facilities. Metrics in the field of information security are used to quantify the possibility of damage due to unauthorized hacking of an information system, which make it possible to assess the cyber sustainability of the system. The purpose of the paper is to improve information security metrics using multicriteria decision–making methods (MCDM). This is achieved by proposing aggregated information security metrics and evaluating the effectiveness of their application. Classical information security metrics consist of one size or one variable. We obtained the total value by adding at least two different metrics and evaluating the weighting factors that determine their importance. This is what we call aggregated or multicriteria metrics of information security. Consequently, MCDM methods are applied to compile aggregated metrics of information security. These are derived from expert judgement and are proposed for the three management domains of the ISO/IEC 27001 information security standard. The proposed methods for improving cyber sustainability metrics are also relevant to information security metrics. Using AHP, WASPAS and Fuzzy TOPSIS methods to solve the problem, the weights of classical metrics are calculated and three aggregated metrics are proposed. As a result, to confirm the fulfilment of the task of improving information security metrics, a verification experiment is conducted, during which aggregated and classical information security metrics are compared. The experiment shows that the use of aggregated metrics can be a more convenient and faster process and higher intelligibility is also achieved. Full article
(This article belongs to the Special Issue Application of Cyber Security in Sustainable System)
Show Figures

Figure 1

Back to TopTop