Security of Wireless Communications

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (28 February 2022) | Viewed by 6821

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science and Software Engineering, RMIT University, Melbourne 3000, Australia
Interests: date privacy; privacy-preserving data mining; network security protocols; mobile and wireless communication security protocols; applied cryptography; e-commerce security; mobile agent security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Software Engineering, RMIT University, Melbourne 3000, Australia
Interests: cryptography; database security; data mining

E-Mail Website
Guest Editor
Department of Software Systems and Cybersecurity, Monash University, Clayton, VIC 3168, Australia
Interests: data security and privacy; secure networked system; encrypted database; cryptographic machine learning system; trusted computing

Special Issue Information

Dear Colleagues,

Various aspects of the security of wireless communications are extremely important for the successful operation and widespread adoption of modern information technologies. Wireless communications have special requirements and vulnerabilities, and therefore are of special concern. In particular, wireless networks are vulnerable to malicious attacks and the number of potential threats has been increasing dramatically. Recently, considerable novel challenges have emerged in view of the rapid growth of advanced applications of wireless communications in commercial and industrial domains embracing Wireless Sensor Networks and the Internet of Things. In order to overcome these challenges, it is vitally important to develop a range of novel approaches as well as sophisticated combinations of useful and efficient security techniques. Relevant security measures include data encryption and device and user authentication. Privacy-preserving data mining is also essential for secure analysis of the big data pertaining to wireless communications,

The main aim of this Special Issue is to encourage submissions proposing novel solutions strengthening the security of wireless communications. Topics of interest include but are not limited to the following:

  • Authentication;
  • Cryptosystems;
  • Data privacy;
  • Homomorphic encryption;
  • Lightweight cryptography;
  • Privacy-preserving data mining;
  • RFID security;
  • Wireless sensor networks.

Prof. Dr. Xun Yi
Dr. Andrei Kelarev
Dr. Xingliang Yuan
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cryptography
  • Cryptosystems
  • Cyber security
  • Data privacy
  • Homomorphic encryption
  • Internet of Things security
  • Lightweight cryptography
  • Privacy-preserving data mining
  • RFID security
  • Wireless sensor networks security

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 1729 KiB  
Article
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
by Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam and Andrei Kelarev
Electronics 2022, 11(9), 1416; https://doi.org/10.3390/electronics11091416 - 28 Apr 2022
Cited by 8 | Viewed by 2638
Abstract
Blockchain has recently drawn wide attention in the research community. Since its emergence, the world has seen the expansion of this new technology, which was initially developed as a digital currency more than a decade ago. A self-administering ledger that ensures extensive data [...] Read more.
Blockchain has recently drawn wide attention in the research community. Since its emergence, the world has seen the expansion of this new technology, which was initially developed as a digital currency more than a decade ago. A self-administering ledger that ensures extensive data immutability over a peer-to-peer network has made it attractive for cybersecurity applications, including sensor-enabled Internet of Things (IoT) systems. Brand new challenges and questions now demand solutions, as IoT devices are now online in a distributed fashion to simplify our everyday lives. Motivated by those challenges, the work here has detailed issues from which an IoT infrastructure can suffer if the wrong blockchain technology is chosen. Unlike a typical review, this paper focuses on security challenges of the blockchain-IoT ecosystem through critical findings and applicable use cases. The contribution directs Blockchain architects, designers, and researchers in the domain to select an unblemished combination of Blockchain-powered IoT applications. In addition, the paper provides insight into the state-of-the-art Blockchain platforms, namely Ethereum, Hyperledger, and IOTA, to exhibit their respective challenges, their constraints, and their prospects in terms of performance and scalability. Full article
(This article belongs to the Special Issue Security of Wireless Communications)
Show Figures

Figure 1

15 pages, 865 KiB  
Article
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
by Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi and Adnan Anwar
Electronics 2022, 11(7), 1083; https://doi.org/10.3390/electronics11071083 - 30 Mar 2022
Cited by 19 | Viewed by 2768
Abstract
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of [...] Read more.
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When public-key infrastructure dominates worldwide, the symmetric key encipherment such as Advanced Encryption Standard (AES) shows immense prospects to sit with the smart home IoT appliances. As investigated, chaos motivated logistic map shows enormous potential to secure IoT aligned real-time data communication. The unpredictability and randomness features of the logistic map in sync with chaos-based scheduling techniques can pave the way to build a particular dynamic key propagation technique for data confidentiality, availability and integrity. After being motivated by the security prospects of AES and chaos cryptography, the paper illustrates a key scheduling technique using a 3-dimensional S-box (substitution-box). The logistic map algorithm has been incorporated to enhance security. The proposed approach has applicability for lightweight IoT devices such as smart home appliances. The work determines how seeming chaos accelerates the desired key-initiation before message transmission. The proposed model is evaluated based on the key generation delay required for the smart-home sensor devices. Full article
(This article belongs to the Special Issue Security of Wireless Communications)
Show Figures

Figure 1

Back to TopTop