Security and Privacy Challenges in 5G Networks

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 10 March 2025 | Viewed by 2383

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology Taiwan, Taichung 41170, Taiwan
Interests: watermarking; cryptography; security; electronic commerce

E-Mail Website
Guest Editor
Information Technology Center, The University of Tokyo, Tokyo, Japan
Interests: computer science; information security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In traditional mobile communications networks, the major goal is to enrich people's life through communication. Users may communicate with each other through text messages, voice calls, video calls or shared images, surf the Internet or access app/social media services via smart phones. However, 5G is no longer limited to individual users. It is not just about having a faster mobile network or having richer features in a smartphone. In the future, 5G will also provide services for vertical industries, and various new services, such as smart transport, smart manufacturing, health care, and smart homes, will emerge from this. As open network platforms, 5G networks raise serious concerns around security and privacy issues. Therefore, in order to ensure that various enterprise applications can run smoothly in the 5G environment, it is urgent and challenging to explore the security solutions required by various commercial applications and find solutions that can reduce privacy leakage. This Special Issue aims to provide an advanced method or application for researchers and engineers to contribute with original research that presents state-of-the-art research outcomes toward security and privacy solutions in the 5G environment. All submitted papers will be peer-reviewed and selected based on both their quality and relevance to the theme of this Special Issue. Potential topics include but are not limited to the cryptographic approach for privacy-preserving data transmission and data analysis; private information collection, storage, aggregation, retrieval, and transmission; security analysis; digital watermarking; forensics; information hiding; security and privacy in machine learning; security and privacy issues in the cloud service; security and privacy issues in IoT; and security and privacy in 5G applications. Please note that all submitted papers should be in the scope of the Symmetry journal.

Prof. Dr. Chia-Chen Lin
Dr. Hiroyuki Sato
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G
  • security
  • privacy
  • cryptography
  • steganography
  • cloud service
  • IoT
  • 5G applications
  • forensics

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 406 KiB  
Article
Symmetry-Enabled Resource-Efficient Systolic Array Design for Montgomery Multiplication in Resource-Constrained MIoT Endpoints
by Atef Ibrahim and Fayez Gebali
Symmetry 2024, 16(6), 715; https://doi.org/10.3390/sym16060715 - 9 Jun 2024
Viewed by 473
Abstract
In today’s TEST interconnected world, the security of 5G Medical IoT networks is of paramount concern. The increasing number of connected devices and the transmission of vast amounts of data necessitate robust measures to protect information integrity and confidentiality. However, securing Medical IoT [...] Read more.
In today’s TEST interconnected world, the security of 5G Medical IoT networks is of paramount concern. The increasing number of connected devices and the transmission of vast amounts of data necessitate robust measures to protect information integrity and confidentiality. However, securing Medical IoT edge nodes poses unique challenges due to their limited resources, making the implementation of cryptographic protocols a complex task. Within these protocols, modular multiplication assumes a crucial role. Therefore, careful consideration must be given to its implementation. This study focuses on developing a resource-efficient hardware implementation of the Montgomery modular multiplication algorithm over GF(2l), which is a critical operation in cryptographic algorithms. The proposed solution introduces a bit-serial systolic array layout with a modular structure and local connectivity between processing elements. This design, inspired by the principles of symmetry, allows for efficient utilization of resources and optimization of area and delay management. This makes it well-suited for deployment in compact Medical IoT edge nodes with limited resources. The suggested bit-serial processor structure was evaluated through ASIC implementation, which demonstrated substantial improvements over competing designs. The results showcase an average area reduction of 24.5% and significant savings in the area–time product of 26.2%. Full article
(This article belongs to the Special Issue Security and Privacy Challenges in 5G Networks)
Show Figures

Figure 1

17 pages, 12740 KiB  
Article
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack
by Kai Gao, Chin-Chen Chang and Chia-Chen Lin
Symmetry 2023, 15(1), 189; https://doi.org/10.3390/sym15010189 - 9 Jan 2023
Cited by 1 | Viewed by 1257
Abstract
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze [...] Read more.
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze the vulnerabilities of RDHEI based on BPCM encryption and then propose a cryptanalysis method based on the vector quantization (VQ) attack. Unlike the existing cryptanalysis method, our method does not require the help of a plaintext image instead of adopting the symmetric property between the original cover image and the encrypted cover image. To obtain the pixel-changing pattern of a block before and after co-modulation, the concept of a pixel difference block (PDB) is first defined. Then, the VQ technique is used to estimate the content of the ciphertext block. Finally, we propose a sequence recovery method to help obtain the final recovered image based on the premise that the generator is compromised. The experimental results demonstrate that when the block size is 4 × 4, our proposed cryptanalysis method can decrypt the contents of the ciphertext image well. The average similarity can exceed 75% when comparing the edge information of the estimated image and the original image. It is concluded from our study that the BPCM encryption algorithm is not robust enough. Full article
(This article belongs to the Special Issue Security and Privacy Challenges in 5G Networks)
Show Figures

Figure 1

Back to TopTop