Special Issue "Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy"

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer and Engineer Science and Symmetry".

Deadline for manuscript submissions: 31 December 2020.

Special Issue Editors

Dr. Weizhi Meng
Guest Editor
Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Lyngby 2800, Denmark
Interests: cyber security; malware and vulnerability analysis; intrusion detection; biometric authentication and security; trust computation
Special Issues and Collections in MDPI journals
Dr. Georgios Kambourakis
Guest Editor
Prof. Dr. Jun Shao

Guest Editor
Zhejiang Gongshang University, China

Special Issue Information

Dear Colleagues,

Internet of Things (IoT) enables Internet-connected devices to maintain seamless connections between people, networks, and physical services. It allows billions of objects in the physical world, as well as virtual environments, to exchange data with each other in an autonomous way, which is the basis of smart ecosystems, including automotive, healthcare, smart cities, smart homes, logistics, and environmental monitoring. With their connection capability, cyber-physical systems (CPS) comprise interacting digital, analog, physical, and human components engineered for functioning via integrated physics and logic. These systems provide the foundation of critical infrastructures, form the basis of emerging and future smart services, and improve quality of life in many domains.

In the context of IoT and CPS, and given the broadcast nature of wireless channels, security and privacy have become of utmost concern. For instance, because of increasingly skilled cybercriminals, transmitting confidential data over IoT/CPS remains a challenging task in both academia and industry. Even more, with the global rollout of 5G systems, which will eventually lead to an even tighter integration of the legacy internet and IoT, there is a greater need to safeguard IoT and CPS and adequately defend such systems against the plethora of modern external and insider threats.

This Special Issue will focus on IoT and CPS security and privacy with the aim to solicit the latest technologies, solutions, case studies, and prototypes on this topic.

Topics of interest include, but are limited to, the following:

Ь Secure data management in IoT/CPS
Ь Intrusion detection and prevention, firewalls, and packet filters
Ь Malware, botnets, and distributed denial of service
Ь IoT/CPS communication privacy and anonymity
Ь Forensics techniques
Ь Public key infrastructures, key management, and credential management
Ь Secure routing in IoT/CPS
Ь Security and privacy in pervasive and ubiquitous computing
Ь Security and privacy for IoT/CPS applications.
Ь Disaster recovery in IoT/CPS communication
Ь Reliability of IoT/CPS communication

Dr. Weizhi Meng
Dr. Georgios Kambourakis
Prof. Dr. Jun Shao
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


Open AccessArticle
AACS: Attribute-Based Access Control Mechanism for Smart Locks
Symmetry 2020, 12(6), 1050; https://doi.org/10.3390/sym12061050 - 23 Jun 2020
This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic [...] Read more.
This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic managing and enforcing the permissions of an authorized device if the device is offline. Moreover, most smart lock systems lack fine-grained access control and cascading removal of permissions. In this paper, we leverage attribute-based access control mechanisms to manage the access of visitors with different identities. We use identity-based encryption to verify the identity of the visitor. In our proposed system, the administrator uses the policy set in the smart lock to implement access control on the device side, which reduces the dependence of access control on the server. We set attributes such as role, time, date, and location to have fine-grained control over access to different permissions and roles that might appear in the house. And the scheme provides the cascading delete function while providing the group access function. Our solution considers multiple roles in the home as well as hierarchical management issues, and improves the applicability of the smart lock system in complex residential and commercial situations. In the experimental section, we show that our system can be applied to premises with many different inhabitant identities. Full article
Show Figures

Figure 1

Back to TopTop