Symmetry in Cyber Security and Privacy

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (30 April 2025) | Viewed by 1885

Special Issue Editors


E-Mail Website
Guest Editor
Associate Professor, Technology Higher School Essaouira, Cadi Ayyad University, Essaouira 40000, Morocco
Interests: computer security; cryptography; artificial intelligence; intrusion detection; smart cities
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Symmetry in cybersecurity and information security strives to establish harmony between defensive measures and potential threats. It emphasizes the need for proportional and balanced security strategies that adapt to the evolving threat landscape. By achieving symmetry, organizations can enhance their resilience, reduce vulnerabilities, and protect their critical assets from malicious actors.

In recent years, several cyber security methods have been proposed in different fields, but traditional approaches cannot be directly applied to ensure the security of Cyber Physical Systems (CPSs) due to their increasing complexity and more sophisticated attacks. These methods can be challenged by the growing volume of data. They require domain-specific knowledge and innovative solutions integrating advanced AI, Blockchain models, and different sources of information, e.g., from IoT sensors and Cloud environments, and information on topology.

In this Special Issue, we present proposed research works on advanced approaches based on artificial intelligence and Blockchain to strengthen the security of Cloud-assisted CPS and mobile edge computing.

Dr. Azidine Guezzaz
Dr. Mourade Azrour
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • computer security
  • intrusion detection
  • Internet of Things
  • machine learning
  • deep learning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

31 pages, 4517 KiB  
Article
Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain
by Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, Megat F. Zuhairi and Mesith Chaimanee
Symmetry 2025, 17(1), 61; https://doi.org/10.3390/sym17010061 - 1 Jan 2025
Cited by 4 | Viewed by 1224
Abstract
A typical Wireless Sensor Network (WSN) defines the usage of static sensors; however, the growing focus on smart cities has led to a rise in the adoption of mobile sensors to meet the varied demands of Internet of Things (IoT) applications. This results [...] Read more.
A typical Wireless Sensor Network (WSN) defines the usage of static sensors; however, the growing focus on smart cities has led to a rise in the adoption of mobile sensors to meet the varied demands of Internet of Things (IoT) applications. This results in significantly increasing dependencies towards secure storage and effective resource management. One way to address this issue is to harness the immutability property of the Ethereum blockchain. However, the existing challenges in IoT communication using blockchain are noted to eventually lead to symmetry issues in the network dynamics of Ethereum. The key issues related to this symmetry are scalability, resource disparities, and centralization risk, which offer sub-optimal opportunities for nodes to gain benefits, influence, or participate in the processes in the blockchain network. Therefore, this paper presents a novel blockchain-based computation model for optimizing resource utilization and offering secure data exchange during active communication among mobile sensors. An empirical method of trust computation was carried out to identify the degree of legitimacy of mobile sensor participation in the network. Finally, a novel cost model has been presented for cost estimation and to enhance the users’ quality of experience. With the aid of a simulation study, the benchmarked outcome of the study exhibited that the proposed scheme achieved a 40% reduced validation time, 28% reduced latency, 23% improved throughput, 38% minimized overhead, 27% reduced cost, and 38% reduced processing time, in contrast to the existing blockchain-based solutions reported in the literature. This outcome prominently exhibits fairer symmetry in the network dynamics of Ethereum presented in the proposed system. Full article
(This article belongs to the Special Issue Symmetry in Cyber Security and Privacy)
Show Figures

Figure 1

Back to TopTop