Special Issue "Blockchain-Enabled Technology for IoT Security, Privacy and Trust"

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer and Engineering Science and Symmetry/Asymmetry".

Deadline for manuscript submissions: 15 December 2021.

Special Issue Editors

Prof. Dr. Kuo-Hui Yeh
E-Mail Website
Guest Editor
Department Information Management, National Dong Hwa University, Hualien 97401, Taiwan
Interests: IoT Security; blockchain; mobile security; NFC/RFID security; authentication; data privacy; cryptology
Special Issues and Collections in MDPI journals
Prof. Dr. Chunhua Su
E-Mail Website
Guest Editor
Division of Computer Science, University of Aizu, Aizu-Wakamatsu, Fukushima Pref. 965-8580, Japan
Interests: cryptography; IoT security and privacy; privacy-preserving technologies
Special Issues and Collections in MDPI journals
Prof. Dr. Shi-Cho Cha
E-Mail Website
Guest Editor
Department of Information Management, National Taiwan University of Science and Technology, 43 Keelung Rd., Sect. 4, Taipei 106, Taiwan
Interests: IoT/IoV security; blockchain security; cloud security; network security; trusted computing
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleague,

The Internet-of-Things (IoT) is an emerging paradigm seamlessly integrating a great quantity of smart objects connected to the Internet. With the rise in interest around the IoT, further attention must be devoted by the research community and industry to overcoming related trust, security and privacy challenges, to unleash the full potential of IoT. The industry has introduced a variety of technologies for IoT security, privacy, and trust such as trust management, data confidentiality, authentication and authorization, secure communication and computation, and individual privacy protection. Recently, blockchain technology is perceived as a promising solution for managing distributed IoT devices because it has the characteristics of decentralization, openness and tamper-resistance. Although numerous studies have addressed various applications of blockchain technology in the IoT, there are neither consensus regarding their integration nor agreed-upon best practices exist for applying blockchain technology in the IoT with robust security and privacy. As things stand, employing blockchain technologies in the IoT is still particularly challenging.

Symmetry is an extraordinary characteristic which has widely been deployed in diverse research fields of computer engineering. This special issue invites original research that investigates blockchain-enabled technologies involving the concept of Symmetry for IoT security, privacy and trust. Potential topics include, but are not limited to, the following:

  • Accountability for blockchain technology in the IoT
  • Anonymity for blockchain technology in the IoT
  • Blockchain-based applications for IoT security and privacy
  • Blockchain-based authentication and authorization for the IoT
  • Blockchain-based reputation systems for the IoT
  • Distributed consensus of blockchain technology for IoT management
  • Fraud detection and forensics for blockchain technology in the IoT
  • New cryptographic algorithms for blockchain technology in the IoT
  • Proof-of-work for blockchain technology in the IoT
  • Smart contracts for the IoT
  • Trust management for blockchain technology in the IoT

Prof. Dr. Kuo-Hui Yeh
Prof. Dr. Chunhua Su
Prof. Dr. Shi-Cho Cha
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Communication
Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security
Symmetry 2021, 13(5), 855; https://doi.org/10.3390/sym13050855 - 11 May 2021
Viewed by 437
Abstract
Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of [...] Read more.
Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server. Full article
(This article belongs to the Special Issue Blockchain-Enabled Technology for IoT Security, Privacy and Trust)
Article
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
Symmetry 2021, 13(4), 597; https://doi.org/10.3390/sym13040597 - 03 Apr 2021
Cited by 1 | Viewed by 728
Abstract
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use [...] Read more.
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception. Full article
(This article belongs to the Special Issue Blockchain-Enabled Technology for IoT Security, Privacy and Trust)
Show Figures

Figure 1

Back to TopTop