Security and Privacy in Cyber-Physical Systems (CPSs)

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (20 April 2024) | Viewed by 1142

Special Issue Editors


E-Mail Website
Guest Editor
Division of Information Systems and Cybersecurity, Institute of Control & Computation Engineering, University of Zielona Gora, ul. Prof. Z. Szafrana 2, 65-516 Zielona Gora, Poland
Interests: cyber-physical system (CPS); UML; state machine diagram; design, modeling, and implementation of CPS; Petri nets; cybersecurity; blockchain application; trusted third party (TTP); design of trusted and secure electronic services
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Control and Computation Engineering, University of Zielona Góra, Prof. Z. Szafrana 2, 65-516 Zielona Góra, Poland
Interests: Petri nets; FPGA; cyber–physical systems; concurrent systems; design, analysis, and modeling of CPS; cybersecurity
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The ever-increasing number of applications of Cyber-Physical Systems (CPSs) has had a positive influence on the industry (including Industry 4.0), but it has also created unprecedented opportunities for the exploitation of new cyberattacks. Therefore, one of the current major issues is CPS security aspects in terms of infrastructure protection as well as data privacy, integrity, and confidentiality. Among the different cybersecurity applications, it is also worth mentioning the use of blockchain to offer non-repudiation and strengthen the security of a CPS. The aim of this Special Issue is to provide the necessary grounds for discussion and advancement towards enhancing the security and safety properties of CPSs and their applications.

The scope of this Special Issue includes (but is not limited to):

  • CPS cybersecurity;
  • Security and privacy challenges in CPS design and implementation;
  • Access control, authentication, and authorization;
  • Blockchain-based cybersecurity applications;
  • Usable security and privacy in CPSs;
  • Malware and intrusion detection;
  • Efficient cryptography;
  • Secure mechanisms for the storage, sharing, and accessing of sensitive data in CPSs;
  • Methods, algorithms, and applications for vulnerability remediation;
  • Cybersecurity attacks on CPSs and their infrastructure.

Dr. Grzegorz Bazydlo
Prof. Dr. Remigiusz Wiśniewski
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber-physical system (CPS)
  • cybersecurity
  • cryptography
  • blockchain

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 1753 KiB  
Article
Trusted Third Party Application in Durable Medium e-Service
by Grzegorz Bazydło, Kamil Kozdrój, Remigiusz Wiśniewski and Aniruddha Bhattacharjya
Appl. Sci. 2024, 14(1), 191; https://doi.org/10.3390/app14010191 - 25 Dec 2023
Viewed by 826
Abstract
The paper presents a novel concept of applying a trusted third party (TTP) to the blockchain-based electronic service (e-service) in the form of a durable medium. The main aim of the proposed e-service is storing, managing, and processing sensitive electronic documents. The developed [...] Read more.
The paper presents a novel concept of applying a trusted third party (TTP) to the blockchain-based electronic service (e-service) in the form of a durable medium. The main aim of the proposed e-service is storing, managing, and processing sensitive electronic documents. The developed e-service meets the requirements of both Polish law (related to the durable medium) and market needs. Firstly, the functional requirements were defined. Subsequently, the adequate e-service was designed, and then implemented in a real company in Poland. Due to the nature of the durable medium e-service, the presented research combines scientific and implementation aspects. The designed and implemented e-service is secure (because of using the immutable blockchain technology merged with symmetric and asymmetric cryptographic algorithms) and trusted (by using TTP as the e-service provider, as well as an independent arbitrator monitoring the document storage and processing flow). Finally, the presented approach was experimentally verified using Hyperledger Besu—a blockchain implementation platform. During the realization of two designed test scenarios, over 30,000 transactions were added to the blockchain. Furthermore, security analyses were performed regarding inherent blockchain properties, the use of cryptographic algorithms, and potential cyberattacks and vulnerabilities. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber-Physical Systems (CPSs))
Show Figures

Figure 1

Back to TopTop