Special Issue "Selected Papers from WISA 2020 (II)"

A special issue of Sustainability (ISSN 2071-1050).

Deadline for manuscript submissions: 30 September 2021.

Special Issue Editor

Dr. Ilsun You
E-Mail Website1 Website2
Guest Editor
Department of Information Security Engineering, Soonchunhyang University, 22 Soonchunhyang-ro, Shinchang-myeon, Asan-si 31538, Choongchungnam-do, Korea
Interests: 5G security; IoT security; authentication and access control; formal security analysis; mobile internet security
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

WISA is one of the main security research venues hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP), and co-sponsored by the Electronics and Telecommunications Research Institute (ETRI), the Korea Internet and Security Agency (KISA), and the National Security Research Institute (NSRI). It has successfully played an important role in the Korean flagship international security conference in particular. The primary focus of WISA 2020 will be on systems and network security, including all other technical and practical aspects of security applications. This Special Issue will include extended versions of selected papers from WISA 2020, along with general papers closely related to the conference themes.

We believe that this Special Issue will showcase the latest advances in systems and network security through the publication of not only the extended versions of outstanding papers presented at WISA 2020 but also general submissions of high quality.

Prof. Dr. Ilsun You
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sustainability is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1900 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Analysis of network and security protocols
  • Anonymity and censorship-resistant technologies
  • Applications of cryptographic techniques
  • Authentication and authorization
  • Automated tools for source code/binary analysis
  • Automobile security
  • Botnet defense
  • Blockchain security
  • Critical infrastructure security
  • Denial-of-service attacks and countermeasures
  • Digital Forensics
  • Embedded systems security
  • Exploit techniques and automation
  • Hardware and physical security
  • HCI security and privacy
  • Intrusion detection and prevention
  • Malware analysis
  • Mobile/wireless/cellular system security
  • Network-based attacks
  • Network infrastructure security
  • Operating system security
  • Practical cryptanalysis (hardware, DRM, etc.)
  • Security policy
  • Side channel attacks and countermeasures
  • Storage and file systems security
  • Techniques for developing secure systems
  • Trustworthy computing
  • Trusted execution environments
  • Unmanned System Security for Vehicle/Drone/Ship Systems
  • Vulnerability research
  • Web security

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers
Sustainability 2021, 13(8), 4324; https://doi.org/10.3390/su13084324 - 13 Apr 2021
Viewed by 434
Abstract
Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, [...] Read more.
Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Networks (WSN) enviornment. In this article, we propose a software optimization method that can be used generally to break through the speed limit of SHA-3. We combine the θ, π, and ρ processes into one, reducing memory access to the internal state more efficiently than conventional software methods. In addition, we present a new SHA-3 implementation for the proposed method in the most constrained environment, the 8-bit AVR microcontroller. This new implementation method, which we call the chaining optimization methodology, implicitly performs the π process of the f-function while minimizing memory access to the internal state of SHA-3. Through this, it achieves up to 26.1% performance improvement compared to the previous implementation in an AVR microcontroller and reduces the performance gap with the SHA-2 family to the maximum. Finally, we apply our SHA-3 implementation in Hash_Deterministic Random Bit Generator (Hash_DRBG), one of the upper algorithms of a hash function, to prove the applicability of our chaining optimization methodology on 8-bit AVR MCUs. Full article
(This article belongs to the Special Issue Selected Papers from WISA 2020 (II))
Show Figures

Figure 1

Article
AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing
Sustainability 2021, 13(6), 3048; https://doi.org/10.3390/su13063048 - 10 Mar 2021
Cited by 2 | Viewed by 639
Abstract
The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better [...] Read more.
The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better vessel tracking to avoid vessel collision as well as mayday calls. Additionally, governments can monitor vessels’ sea activities through AIS messages, stopping them from overfishing or tracking if any vessel has caused marine pollution. However, because AIS devices cannot guarantee data security, they are susceptible to malicious attacks such as message modification or an illegitimate identity faking a distress signal that causes other vessels to change their course. Given the above, a comprehensive network security system of a sustainable marine environment should be proposed to ensure secure communication. In this paper, a stationary IoT-enabled (Internet of Things) vessel tracking system of a sustainable marine environment is proposed. The system combines network security, edge computing, and tracking management. It offers the following functions: (1) The IoT-based vessel tracking system tracks each aquafarmer’s farming zone and issues periodic warning to prevent vessel collision for pursuing a sustainable marine environment; (2) the system can serve as a relay station that evaluates whether a vessel’s AIS data is correct; (3) the system detects abnormal behavior and any irregular information to law enforcement; (4) the system’s network security mechanism adopts a group key approach to ensure secure communication between vessels; and (5) the proposed edge computing mechanism enables the tracking system to perform message authentication and analysis, and to reduce computational burden for the remote or cloud server. Experiment results indicate that our proposed system is feasible, secure, and sustainable for the marine environment, and the tendered network security mechanism can reduce the computational burden while still ensuring security. Full article
(This article belongs to the Special Issue Selected Papers from WISA 2020 (II))
Show Figures

Figure 1

Article
Dynamic Membership Management in Anonymous and Deniable Distance Bounding
Sustainability 2020, 12(24), 10330; https://doi.org/10.3390/su122410330 - 10 Dec 2020
Cited by 1 | Viewed by 556
Abstract
For secure location proof in many applications, distance bounding protocols are considered as one of the useful tools that can be used in practice. In distance bounding protocols, a prover and a verifier can measure the distance between them by performing an interactive [...] Read more.
For secure location proof in many applications, distance bounding protocols are considered as one of the useful tools that can be used in practice. In distance bounding protocols, a prover and a verifier can measure the distance between them by performing an interactive protocol. In general, the verifier is regarded as an honest service provider, and thus, an adversarial verifier is not considered for security analysis. However, we cannot ignore the possibility of the corruption of the verifier, which can spoil the prover’s privacy. To handle the security problem, a prover-anonymous and deniable distance bounding protocol is proposed, which can guarantee the privacy of the prover even though the verifier is corrupted. In this paper, we review the prover-anonymous and deniable distance bounding protocol in terms of the membership management, and we show that the communication overhead in the protocol for each membership change is O(n) where n is the number of users. Then, we propose an improved membership management technique, which can efficiently support membership change in terms of the communication overhead. The improved technique requires O(1) for each membership change instead of O(n), as in the existing protocol. Full article
(This article belongs to the Special Issue Selected Papers from WISA 2020 (II))
Show Figures

Figure 1

Article
Faster Data Forwarding in Content-Centric Network via Overlaid Packet Authentication Architecture
Sustainability 2020, 12(20), 8746; https://doi.org/10.3390/su12208746 - 21 Oct 2020
Cited by 1 | Viewed by 558
Abstract
Content-Centric Networking (CCN) is one of the emerging paradigms for the future Internet, which shifts the communication paradigm from host-centric to data-centric. In CCN, contents are delivered by their unique names, and a public-key-based signature is built into data packets to verify the [...] Read more.
Content-Centric Networking (CCN) is one of the emerging paradigms for the future Internet, which shifts the communication paradigm from host-centric to data-centric. In CCN, contents are delivered by their unique names, and a public-key-based signature is built into data packets to verify the authenticity and integrity of the contents. To date, research has tried to accelerate the validation of the given data packets, but existing techniques were designed to improve the performance of content verification from the requester’s viewpoint. However, we need to efficiently verify the validity of data packets in each forwarding engine, since the transmission of invalid packets influences not only security but also performance, which can lead to a DDoS (Distributed Denial of Service) attack on CCN. For example, an adversary can inject a number of meaningless packets into CCN to consume the forwarding engines’ cache and network bandwidth. In this paper, a novel authentication architecture is introduced, which can support faster forwarding by accelerating the performance of data validation in forwarding engines. Since all forwarding engines verify data packets, our authentication architecture can eliminate invalid packets before they are injected into other CCN nodes. The architecture utilizes public-key based authentication algorithms to support public verifiability and non-repudiation, but a novel technique is proposed in this paper to reduce the overhead from using PKI for verifying public keys used by forwarding engines and end-users in the architecture. The main merit of this work is in improving the performance of data-forwarding in CCN regardless of the underlying public-key validation mechanism, such as PKI, by reducing the number of accesses to the mechanism. Differently from existing approaches that forgive some useful features of the Naive CCN for higher performance, the proposed technique is the only architecture which can support all useful features given by the Naive CCN. Full article
(This article belongs to the Special Issue Selected Papers from WISA 2020 (II))
Show Figures

Figure 1

Back to TopTop