Protocols and Mechanisms for Emerging Network Technologies

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 June 2024 | Viewed by 3404

Special Issue Editors


E-Mail Website
Guest Editor
Computer Science and Multimedia Higher Institute (ISIMS), University of Sfax, Sfax 3021, Tunisia
Interests: medium access control; information networks; ad hoc networks; unmanned aerial vehicles; base stations

E-Mail Website
Guest Editor
Computer Science and Digital Society (LIST3N), University of Technology of Troyes, 10300 Troyes, France
Interests: network security; internet of things; location privacy

E-Mail Website
Guest Editor
School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai P.O. Box 415053, United Arab Emirates
Interests: applied AI and ML; Internet of Things; VANETs and FANETs; blockchain and cybersecurity; edge/fog and cloud computing

Special Issue Information

Dear Colleagues,

This century is marked by the rapid evolution of networking technologies that provide connectivity and communication infrastructure for a diverse range of smart applications, including in transportation (terrestrial and aerial), healthcare, grids, education, agriculture, factories, cities and cyber-physical systems. In this context, this Special Issue solicits new contributions describing well-founded approaches and communication systems and architectures based on new strong protocols, mechanisms and concepts that address current challenges and open research issues in various applications and solve problems with direct relevance to societal needs. Indeed, the behavior of emerging computer networks is fundamentally complex, being shaped by several technologies, many users, complex smart application, numerous protocols and mechanisms, massive operating systems, huge data and a wide variety of devices, diverse networks tools, simulators and test beds.

As a result, understanding the behavior of the emerging networks technologies (especially the new generation of wireless networks including 6G and space–air–ground interconnected networks) is becoming challenging. In addition, increasingly sophisticated network attacks and cyber-physical-system-related threats and attacks necessitate secure, reliable and intelligent network monitoring. Additionally, the use of intelligence artificial solutions within networks architecture has become a necessity for intelligent and self-organizing networks. Accordingly, these challenging areas require further investigation.

This Special Issue's goal is to present theoretical and experimental research, as well as original protocols, applications, frameworks and techniques, that focus on upcoming technologies and developing trends in the multidisciplinary field of next-generation systems. Review papers and surveys of the highest caliber are encouraged.

Topics of interest include, but are not limited to:

  • Algorithms, protocols and architecture for space–air–ground integrated networks (SAGINs);
  • Emerging standardization-issue-related network technologies;
  • Algorithms, protocols and architecture for beyond-5G networks and emerging 6G networks;
  • Evaluation and performance analysis of emerging networks technologies in different contexts;
  • Artificial intelligence, machine learning, deep learning and federated learning in intelligent networking systems;
  • Quality of experience (QoE) and quality of service (QoS)  provisioning within emerging network technologies;
  • Protocols, services and applications for vehicular networks, internet of vehicles (IoV), vehicular cloud, UAVs, internet of drones and urban air mobility (UAMs) scenarios;
  • Security, privacy and trust management within emerging network technologies.

Prof. Dr. Chaari Fourati Lamia
Dr. Samiha Ayed
Prof. Dr. Adel Ben Mnaouer
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • emerging networks technologies
  • intelligent networking systems
  • internet of things
  • network security

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 1828 KiB  
Article
A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring
by Gandeva Bayu Satrya, Yosafat Marselino Agus and Adel Ben Mnaouer
Electronics 2023, 12(18), 3824; https://doi.org/10.3390/electronics12183824 - 10 Sep 2023
Cited by 1 | Viewed by 1633
Abstract
The Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable to cybercrimes. [...] Read more.
The Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable to cybercrimes. Exploits may arise from sensor data interception en route to the intended consumer within an IoT system. The increasing integration of electronic devices interconnected via the internet has galvanized the acceptance of this technology. Nonetheless, as the number of users of this technology surges, there must be an aligned concern to ensure that security measures are diligently enforced within IoT communication systems, such as in smart homes, smart cities, smart factories, smart hospitals, and smart grids. This research addresses security lacunae in the topology and configuration of IoT energy monitoring systems using post-quantum cryptographic techniques. We propose tailored implementations of the Rivest–Shamir–Adleman (RSA), N-th degree Truncated Polynomial Ring Units (NTRU), and a suite of cryptographic primitives based on Module Learning With Rounding (Saber) as post-quantum cryptographic candidate algorithms for IoT devices. These aim to secure publisher–subscriber end-to-end communication in energy system monitoring. Additionally, we offer a comparative analysis of these tailored implementations on low-resource devices, such as the Raspberry Pi, during data transmission using the Message Queuing Telemetry Transport (MQTT) protocol. Results indicate that the customized implementation of NTRU outperforms both SABER and RSA in terms of CPU and memory usage, while Light SABER emerges as the front-runner when considering encryption and decryption delays. Full article
(This article belongs to the Special Issue Protocols and Mechanisms for Emerging Network Technologies)
Show Figures

Figure 1

20 pages, 3216 KiB  
Article
A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles
by Vincent Omollo Nyangaresi, Hend Muslim Jasim, Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar, Junchao Ma, Iman Qays Abduljaleel and Dhafer G. Honi
Electronics 2023, 12(17), 3688; https://doi.org/10.3390/electronics12173688 - 31 Aug 2023
Cited by 3 | Viewed by 1144
Abstract
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication process. Therefore, many protocols have been presented to preserve [...] Read more.
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication process. Therefore, many protocols have been presented to preserve the confidentiality and integrity of the exchanged messages. However, numerous security and performance challenges have been noted in the majority of these protocols. In this paper, an elliptic curve cryptography (ECC) and symmetric key-based protocol is presented. The choice of ECC was informed by its relatively shorter key sizes compared to other asymmetric encryption algorithms such as the Rivest–Shamir–Adleman (RSA) algorithm. Security analysis showed that this protocol provides mutual authentication, session key agreement, untraceability, anonymity, forward key secrecy, backward key secrecy, and biometric privacy. In addition, it is robust against smart card loss, password guessing, known secret session temporary information (KSSTI), privileged insider, side-channeling, impersonation, denial-of-service (DoS), and man-in-the-middle (MitM) attacks. The comparative performance evaluation showed that it has relatively low computation, storage, and communication complexities. Full article
(This article belongs to the Special Issue Protocols and Mechanisms for Emerging Network Technologies)
Show Figures

Figure 1

Back to TopTop