Symmetry and Asymmetry in IoT Security

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 January 2025 | Viewed by 83

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, Drexel University, Philadelphia, PA, USA
Interests: IoT security; program analysis; data security and privacy; mobile security

E-Mail Website
Guest Editor
Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China
Interests: crypto; IoT security; blockchain security; android security

Special Issue Information

Dear Colleagues,

Symmetry and asymmetry play important roles in the field of Internet of Things (IoT) security. The rapid growth of the Internet of Things (IoT) has brought numerous opportunities and challenges, particularly in the realm of security. As IoT devices become integral parts of our daily lives, ensuring the confidentiality, integrity, and availability of IoT data is of paramount importance. The importance of symmetry and asymmetry in IoT security lies in the need to address different security requirements and constraints within IoT ecosystems. For example, symmetric encryption offers efficiency and confidentiality, while asymmetric encryption provides secure key exchange, authentication, and digital signatures. Additionally, symmetry and asymmetry concepts can also be applied to fingerprinting, a biometric identification technique that analyzes unique patterns of an individual’s fingertips. Symmetry can assist in accurate feature extraction and matching, enhancing the overall reliability of fingerprint-based identification systems in IoT. Fingerprint asymmetry is a fundamental characteristic that contributes to the uniqueness of fingerprints and can help in distinguishing one IoT device’s or user’s fingerprints from another, which is useful in recognition systems and forensic analysis. It is worth noting that the selection of symmetry and asymmetry methods and protocols should consider the specific use case, computational resources of IoT devices, scalability, and the potential impact on system performance.

We are pleased to invite you to submit a paper within the general scope of Symmetry. Potential topics include, but are not limited to, the following:

  • Encryption algorithms for IoT security;
  • Performance analysis of encryption techniques in resource-constrained IoT devices;
  • Key management and distribution schemes in IoT;
  • Authentication mechanisms in IoT systems;
  • Digital signatures and their applications in IoT security;
  • Secure communication protocols leveraging symmetry and asymmetry in IoT networks;
  • Scalability and efficiency considerations in symmetric and asymmetric encryption for IoT;
  • Cryptographic key lifecycle management in IoT security;
  • Symmetric and asymmetric fingerprint feature extraction algorithms for IoT applications;
  • Symmetry-based fingerprint matching techniques in IoT-based identification systems;
  • Privacy-preserving approaches for fingerprinting IoT systems;
  • Integration of fingerprinting with IoT authentication and access control mechanisms.

This Special Issue aims to invite researchers and practitioners to contribute their original research, insights, and perspectives on the topic of “Symmetry and Asymmetry in IoT Security”, exploring the significance and applications of symmetric and asymmetric encryption techniques in securing IoT ecosystems.

We look forward to receiving your contributions.

Dr. Yue Zhang
Dr. Shan Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT system
  • security
  • symmetric encryption
  • asymmetric decryption
  • data privacy

Published Papers

This special issue is now open for submission.
Back to TopTop