Topic Editors

Dr. Savio Sciancalepore
Faculty of Mathematics and Computer Science, Technical University of Eindhoven, 5600 MB Eindhoven, The Netherlands
Prof. Dr. Giuseppe Piro
Department of Electrical and Information Engineering, Politecnico di Bari, Via Edoardo Orabona, 4, 70126 Bari BA, Italy
Dr. Nicola Zannone
Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands

Next Generation of Security and Privacy in IoT, Industry 4.0, 5G Systems and Beyond

Abstract submission deadline
31 December 2022
Manuscript submission deadline
31 March 2023
Viewed by
13246

Topic Information

Dear Colleagues,

The increasing demand for ubiquitous connection of users and machines to the Internet is currently accelerating the deployment of 5G networks, integrating successful paradigms such as the Internet of Things (IoT), cyber–physical systems (CPS), and mobile technologies under the same technological umbrella and standardization efforts.

Although such an integration might benefit users and manufacturers on several servicelevels, it also widens the attack surface of such systems, jeopardizing the trustworthiness, usability, and availability of the overall network infrastructure. In addition, the connection of typically isolated environments to the Internet increasingly threatens the privacy of the data of users and companies. Motivated adversaries can steal not only data stored on local servers, but also access to the physical environment surrounding the connected devices, and maliciously use them to acquire sensitive information.

The aim of this Topic is to gather and showcase the most recent developments in the areas of cybersecurity and privacy of next-generation 5G systems, IoT, and Industry 4.0 applications. The SI solicits contributions focusing on all aspects of security and privacy for 5G-based systems, including new attack vectors, defensive strategies, secure-by-design network architectures, privacy-by-design solutions, industry-based and application-specific use-cases, and data analyses for security and privacy. Literature review papers on recent challenges and solutions in the area of security and privacy for IoT and 5G are also welcome.

Topic contents include (but are not limited to):

  • Cybersecurity for the Internet of Things (IoT).
  • Security attacks and defense technologies for IoT, cyber–physical systems (CPS), 5G systems, and beyond.
  • Authentication and access control in IoT and 5G-enabled architectures.
  • Applications of security and privacy in IoT and CPS.
  • Privacy-preserving network architectures. - Physical-layer security.
  • Jamming and anti-jamming solutions for 5G and IoT.
  • Side channels and covert channels.
  • Security and privacy in Edge and Fog computing.
  • Energy depletion attacks in 5G Systems and Industry 4.0.
  • Security via Machine Learning in IoT and 5G-beyond systems.
  • Trust management techniques in IoT and 5G.
  • Malware detection in 5G network architectures and beyond.
  • Interception mechanisms for flow inspection, tracking, and user localization in 5G architectures and beyond.
  • Methodologies for securing digital service chains in IoT, CPS, and 5G and beyond.

Dr. Savio Sciancalepore
Prof. Dr. Giuseppe Piro
Dr. Nicola Zannone
Topic Editors

Keywords

  • Cybersecurity
  • Privacy
  • Internet of Things
  • Cyber-Physical Systems
  • 5G
  • 5G and beyond

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Journal of Cybersecurity and Privacy
jcp
- - 2021 19.7 Days 1000 CHF Submit
Sensors
sensors
3.847 6.4 2001 16.2 Days 2400 CHF Submit
Future Internet
futureinternet
- 5.4 2009 12.6 Days 1400 CHF Submit
Algorithms
algorithms
- 3.3 2008 15 Days 1400 CHF Submit
Cryptography
cryptography
- 3.9 2017 17.5 Days 1400 CHF Submit

Preprints is a platform dedicated to making early versions of research outputs permanently available and citable. MDPI journals allow posting on preprint servers such as Preprints.org prior to publication. For more details about reprints, please visit https://www.preprints.org.

Published Papers (13 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
Review
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Sensors 2022, 22(9), 3400; https://doi.org/10.3390/s22093400 - 29 Apr 2022
Cited by 3
Abstract
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it [...] Read more.
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore® digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. Full article
Show Figures

Figure 1

Article
A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
Future Internet 2022, 14(4), 119; https://doi.org/10.3390/fi14040119 - 14 Apr 2022
Abstract
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient [...] Read more.
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient and has a low computational cost. Although a large number of scholars have conducted relevant research, most of these schemes cannot balance the computational overhead and security. Therefore, we propose a lightweight and secure key management method, having a low computational overhead, based on blockchain for smart grids. Firstly, we redesigned the architecture of the smart grid based on blockchain and completed the division of various entities. Furthermore, we designed a pairing-free certification authenticated group key agreement method based on blockchain under the architecture. Finally, we achieved higher security attributes, and lower authentication delay and computational overhead, compared to the traditional schemes, as shown in performance analysis and comparison. Full article
Show Figures

Figure 1

Article
A Three-Stage Dynamic Assessment Framework for Industrial Control System Security Based on a Method of W-HMM
Sensors 2022, 22(7), 2593; https://doi.org/10.3390/s22072593 - 28 Mar 2022
Cited by 1
Abstract
Industrial control systems (ICS) are applied in many fields. Due to the development of cloud computing, artificial intelligence, and big data analysis inducing more cyberattacks, ICS always suffers from the risks. If the risks occur during system operations, corporate capital is endangered. It [...] Read more.
Industrial control systems (ICS) are applied in many fields. Due to the development of cloud computing, artificial intelligence, and big data analysis inducing more cyberattacks, ICS always suffers from the risks. If the risks occur during system operations, corporate capital is endangered. It is crucial to assess the security of ICS dynamically. This paper proposes a dynamic assessment framework for industrial control system security (DAF-ICSS) based on machine learning and takes an industrial robot system as an example. The framework conducts security assessment from qualitative and quantitative perspectives, combining three assessment phases: static identification, dynamic monitoring, and security assessment. During the evaluation, we propose a weighted Hidden Markov Model (W-HMM) to dynamically establish the system’s security model with the algorithm of Baum–Welch. To verify the effectiveness of DAF-ICSS, we have compared it with two assessment methods to assess industrial robot security. The comparison result shows that the proposed DAF-ICSS can provide a more accurate assessment. The assessment reflects the system’s security state in a timely and intuitive manner. In addition, it can be used to analyze the security impact caused by the unknown types of ICS attacks since it infers the security state based on the explicit state of the system. Full article
Show Figures

Figure 1

Review
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
Future Internet 2022, 14(3), 73; https://doi.org/10.3390/fi14030073 - 25 Feb 2022
Cited by 2
Abstract
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this paper discusses the current state of the art of [...] Read more.
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this paper discusses the current state of the art of 5G technology in the merger of unconditional security requirements referred to as Quantum Cryptography. The various domain of Quantum Cryptography is illustrated including the protocols available, their functionality and previous implementation in real networks. This paper further identifies research gaps covering critical aspects of how Quantum Cryptography can be realized and effectively utilized in 5G networks. These include improving the current technique in Quantum Cryptography through efficient key distribution and message sharing between users in 5G networks. Full article
Show Figures

Figure 1

Article
Research on Distributed Energy Consensus Mechanism Based on Blockchain in Virtual Power Plant
Sensors 2022, 22(5), 1783; https://doi.org/10.3390/s22051783 - 24 Feb 2022
Cited by 1
Abstract
Virtual power plant (VPP) composed of a large number of distributed energy resources (DERs) has become a regional multienergy aggregation model to realize the large-scale integration of renewable energy generation into the grid. Due to the characteristics of centralized management, the existing energy [...] Read more.
Virtual power plant (VPP) composed of a large number of distributed energy resources (DERs) has become a regional multienergy aggregation model to realize the large-scale integration of renewable energy generation into the grid. Due to the characteristics of centralized management, the existing energy operation mode is difficult to simply apply to distributed energy resources transactions. The decentralization, transparency, contract execution automation and traceability of blockchain technology provide a new solution to the aggregation of decentralized resources and the opacity of transactions in VPP. In this paper, the existing problems of virtual power plants are analyzed, and the virtual power plant trading model is designed, which realizes the transparent benefit distribution and message transmission of virtual power plants. The virtual power plant blockchain network based on blockchain technology in this model solves the DERs coordination problem in VPP and the security and efficiency problems in information transmission. Combined with the actual situation of virtual power plant, the blockchain network collaboration mechanism (BNCM), which is convenient to reach agreement, is designed. Compared with the traditional practical Byzantine fault tolerance (PBFT) consensus algorithm, this mechanism can make DERs reach a consensus quickly. Finally, simulation experiments on the consensus algorithm show that the algorithm can reduce the collaboration time between DERs under the premise of ensuring the same fault tolerance rate and is more suitable for VPP scenarios with a large number of DERs. Full article
Show Figures

Figure 1

Article
Security Perception of IoT Devices in Smart Homes
J. Cybersecur. Priv. 2022, 2(1), 65-73; https://doi.org/10.3390/jcp2010005 - 14 Feb 2022
Cited by 1
Abstract
IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants participated in the survey with [...] Read more.
IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants participated in the survey with measurement items, out of which 121 had already been using IoT devices in their smart homes. The results show that users’ awareness of data breaches, ransomware attacks, personal information access breaches, and device vulnerabilities have an effect on IoT security importance. On the other hand, users often do not check their security settings and feel safe while using IoT devices. This paper provides an overview of users’ perception of security while using IoT devices, and can help developers build better devices and help raise awareness of security among users. Full article
Show Figures

Figure 1

Article
An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP
Sensors 2022, 22(2), 647; https://doi.org/10.3390/s22020647 - 14 Jan 2022
Cited by 3
Abstract
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area [...] Read more.
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area for vehicle security. However, most of the previous studies were carried out on V2X networks, while those on in-vehicle networks (IVNs) did not involve Ethernet. To this end, oriented to the new IVNs based on Ethernet, we designed an efficient secure scheme, including an authentication scheme using the Scalable Service-Oriented Middleware over IP (SOME/IP) protocol and a secure communication scheme modifying the payload field of the original SOME/IP data frame. The security analysis shows that the designed authentication scheme can provide mutual identity authentication for communicating parties and ensure the confidentiality of the issued temporary session key; the designed authentication and secure communication scheme can resist the common malicious attacks conjointly. The performance experiments based on embedded devices show that the additional overhead introduced by the secure scheme is very limited. The secure scheme proposed in this article can promote the popularization of the SOME/IP protocol in IVNs and contribute to the secure communication of IVNs. Full article
Show Figures

Graphical abstract

Article
Localization of a Power-Modulated Jammer
Sensors 2022, 22(2), 646; https://doi.org/10.3390/s22020646 - 14 Jan 2022
Abstract
Jamming is a malicious radio activity that represents a dreadful threat when employed in critical scenarios. Several techniques have been proposed to detect, locate, and mitigate jamming. Similarly, counter-counter-jamming techniques have been devised. This paper belongs to the latter thread. In particular, we [...] Read more.
Jamming is a malicious radio activity that represents a dreadful threat when employed in critical scenarios. Several techniques have been proposed to detect, locate, and mitigate jamming. Similarly, counter-counter-jamming techniques have been devised. This paper belongs to the latter thread. In particular, we propose a new jammer model: a power-modulated jammer that defies standard localization techniques. We provide several contributions: we first define a new mathematical model for the power-modulated jammer and then propose a throughout analysis of the localization error associated with the proposed power-modulated jammer, and we compare it with a standard power-constant jammer. Our results show that a power-modulated jammer can make the localization process completely ineffective—even under conservative assumptions of the shadowing process associated with the radio channel. Indeed, we prove that a constant-power jammer can be localized with high precision, even when coupled with a strong shadowing effect (σ  6 dBm). On the contrary, our power-modulated jammer, even in the presence of a very weak shadowing effect (σ < 2 dBm), presents a much wider localization error with respect to the constant-power jammer. In addition to being interesting on its own, we believe that our contribution also paves the way for further research in this area. Full article
Show Figures

Figure 1

Article
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications
Sensors 2022, 22(2), 489; https://doi.org/10.3390/s22020489 - 09 Jan 2022
Cited by 1
Abstract
The existence of quantum computers and Shor’s algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in [...] Read more.
The existence of quantum computers and Shor’s algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the Internet, and it involves the connection of millions of low-powered and resource-constrained devices to the network. Because quantum computers are becoming more capable, the creation of a new cryptographic standard that cannot be compromised by them is indispensable. There are several current proposals of quantum-resistant or post-quantum algorithms that are being considered for future standards. Given that the IoT is increasing in popularity, and given its resource-constrained nature, it is worth adapting those new standards to IoT devices. In this work, we study some post-quantum cryptosystems that could be suitable for IoT devices, adapting them to work with current cryptography and communication software, and conduct a performance measurement on them, obtaining guidelines for selecting the best for different applications in resource-constrained hardware. Our results show that many of these algorithms can be efficiently executed in current IoT hardware, providing adequate protection from the attacks that quantum computers will eventually be capable of. Full article
Show Figures

Figure 1

Article
Deep Stacking Network for Intrusion Detection
Sensors 2022, 22(1), 25; https://doi.org/10.3390/s22010025 - 22 Dec 2021
Cited by 3
Abstract
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems. However, with the increasing number of advanced threat attacks, traditional intrusion detection mechanisms have defects and it is [...] Read more.
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems. However, with the increasing number of advanced threat attacks, traditional intrusion detection mechanisms have defects and it is still indispensable to design a powerful intrusion detection system. This paper researches the NSL-KDD data set and analyzes the latest developments and existing problems in the field of intrusion detection technology. For unbalanced distribution and feature redundancy of the data set used for training, some training samples are under-sampling and feature selection processing. To improve the detection effect, a Deep Stacking Network model is proposed, which combines the classification results of multiple basic classifiers to improve the classification accuracy. In the experiment, we screened and compared the performance of various mainstream classifiers and found that the four models of the decision tree, k-nearest neighbors, deep neural network and random forests have outstanding detection performance and meet the needs of different classification effects. Among them, the classification accuracy of the decision tree reaches 86.1%. The classification effect of the Deeping Stacking Network, a fusion model composed of four classifiers, has been further improved and the accuracy reaches 86.8%. Compared with the intrusion detection system of other research papers, the proposed model effectively improves the detection performance and has made significant improvements in network intrusion detection. Full article
Show Figures

Figure 1

Communication
Energy-Efficient Secure Communications for Wireless-Powered Cognitive Radio Networks
Sensors 2021, 21(23), 8040; https://doi.org/10.3390/s21238040 - 01 Dec 2021
Abstract
In this study, we investigate energy-efficient secure communications for wireless-powered cognitive ratio networks, in which multiple secondary users (SUs) share the same frequency band with primary users (PUs) and energy harvesting (EH) nodes harvest energy from the transmitted signals, even though information decoding [...] Read more.
In this study, we investigate energy-efficient secure communications for wireless-powered cognitive ratio networks, in which multiple secondary users (SUs) share the same frequency band with primary users (PUs) and energy harvesting (EH) nodes harvest energy from the transmitted signals, even though information decoding is not permitted. To maximize the average secrecy energy efficiency (SEE) of SUs while ensuring acceptable interference on PUs and the required amount of energy for the EH nodes, we propose an energy-efficient transmit power control algorithm using dual decomposition, wherein suboptimal transmit powers are determined in an iterative manner with low complexity. Through extensive simulations in various scenarios, we verify that the proposed scheme has a higher average SEE than conventional schemes and a considerably shorter computation time than the optimal scheme. Full article
Show Figures

Figure 1

Article
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
Sensors 2021, 21(23), 7917; https://doi.org/10.3390/s21237917 - 27 Nov 2021
Cited by 4
Abstract
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. [...] Read more.
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing. Full article
Show Figures

Figure 1

Article
Deceptive Techniques to Hide a Compressed Video Stream for Information Security
Sensors 2021, 21(21), 7200; https://doi.org/10.3390/s21217200 - 29 Oct 2021
Abstract
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH [...] Read more.
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video. Full article
Show Figures

Figure 1

Back to TopTop