Recent Trends and Applications in Cybersecurity

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (20 April 2021) | Viewed by 10021

Special Issue Editors


E-Mail Website
Guest Editor
Cybersecurity Research Lab, Ryerson University, Toronto, ON M5B 2K3, Canada
Interests: cybersecurity; quantum cryptography; cryptanalysis; information security and data hiding, IoT security; cloud security; blockchain; quantum communication and computation; computer and network security; evolutionary computation; intelligent systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Engineering and Physical Sciences (CEPS), University of New Hampshire, Durham, NH 03824, USA
Interests: system modeling; simulation and control; simulation, control, and security of cyber-physical systems

Special Issue Information

Dear Colleagues,

In the last decade, cybersecurity has become very topical and attracted much attention from both researchers and engineers. Since the number of cybersecurity threats grows over time, scientists and scholars are required to build new robust and secure systems to protect information, communication, networks, and cyber-physical systems from potential attacks. However, building cybersecurity systems is not an easy task for several reasons, for example, the complexity of the threats or attacks, the heterogeneity of networks and communications, the increased number of interconnected nodes, and so on.

The necessity of building new and developed information systems, communication networks, and computing architectures, such as wireless networks, cloud/fog computing, mobile computing, blockchain and decentralized ledgers, internet of things, vehicular networks and satellite communication, cyber-physical systems, human–computer interaction systems, cyber logistics and transportation architectures, requires more research and investigations on recent trends and applications of cybersecurity.

This Special Issue invites researchers to contribute both original research articles and reviews that highlight security issues and challenges in recent trends and applications in cybersecurity and provide innovative solutions to overcome such security issues.

Dr. Hussein Abulkasim
Dr. Bingxian Mu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Quantum and post-quantum cryptography;
  • Cryptography and data hiding;
  • IoT, networks and cloud security;
  • Blockchain and cybersecurity;
  • Cyber logistics and transportation security;
  • Cybersecurity and resilience of physical systems;
  • Forensics, auditing, and accountability;
  • Security engineering for cyber-physical systems;
  • Cybersecurity for infrastructure and industry;

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 784 KiB  
Article
Grover on PIPO
by Kyungbae Jang, Gyeongju Song, Hyeokdong Kwon, Siwoo Uhm, Hyunji Kim, Wai-Kong Lee and Hwajeong Seo
Electronics 2021, 10(10), 1194; https://doi.org/10.3390/electronics10101194 - 17 May 2021
Cited by 11 | Viewed by 2204
Abstract
The emergence of quantum computers is threatening the security of cryptography through various quantum algorithms. Among them, the Grover search algorithm is known to be efficient in accelerating brute force attacks on block cipher algorithms. To utilize the Grover’s algorithm for brute force [...] Read more.
The emergence of quantum computers is threatening the security of cryptography through various quantum algorithms. Among them, the Grover search algorithm is known to be efficient in accelerating brute force attacks on block cipher algorithms. To utilize the Grover’s algorithm for brute force attacks, block ciphers must be implemented in quantum circuits. In this paper, we present optimized quantum circuits of the SPN (Substitution Permutation Network) structured lightweight block cipher, namely the PIPO block cipher. In particular, the compact design of quantum circuits for the 8-bit Sbox is investigated. These optimization techniques are used to implement other cryptographic operations as quantum circuits. Finally, we evaluate quantum resources of Grover search algorithm for the PIPO block cipher in ProejctQ, a quantum simulator provided by IBM. Full article
(This article belongs to the Special Issue Recent Trends and Applications in Cybersecurity)
Show Figures

Figure 1

21 pages, 931 KiB  
Article
Research on Integrated Learning Fraud Detection Method Based on Combination Classifier Fusion (THBagging): A Case Study on the Foundational Medical Insurance Dataset
by Jibing Gong, Hekai Zhang and Weixia Du
Electronics 2020, 9(6), 894; https://doi.org/10.3390/electronics9060894 - 27 May 2020
Cited by 3 | Viewed by 3148
Abstract
In recent years, the number of fraud cases in basic medical insurance has increased dramatically. We need to use a more efficient method to identify the fraudulent users. Therefore, we deploy the cloud edge algorithm with lower latency to improve the security and [...] Read more.
In recent years, the number of fraud cases in basic medical insurance has increased dramatically. We need to use a more efficient method to identify the fraudulent users. Therefore, we deploy the cloud edge algorithm with lower latency to improve the security and enforceability in the operation process. In this paper, a new feature extraction method and model fusion technology are proposed to solve the problem of basic medical insurance fraud identification. The feature second-level extraction algorithm proposed in this paper can effectively extract important features and improve the prediction accuracy of subsequent algorithms. In order to solve the problem of unbalanced simulation allocation in the medical insurance fraud identification scenario, a sample division method based on the idea of sample proportion equilibrium is proposed. Based on the above methods of feature extraction and sample division, a new training and fitting model fusion algorithm (tree hybrid bagging, THBagging) is proposed. This method makes full use of the balanced idea of the tree model algorithm based on Boosting to fuse, and finally achieves the effect of improving the accuracy of basic medical insurance fraud identification. Full article
(This article belongs to the Special Issue Recent Trends and Applications in Cybersecurity)
Show Figures

Figure 1

15 pages, 3539 KiB  
Article
Delay-Based True Random Number Generator in Sub-Nanomillimeter IoT Devices
by Maulana Randa, Mohammad Samie and Ian K. Jennions
Electronics 2020, 9(5), 817; https://doi.org/10.3390/electronics9050817 - 15 May 2020
Cited by 1 | Viewed by 4085
Abstract
True Random Number Generators (TRNGs) use physical phenomenon as their source of randomness. In electronics, one of the most popular structures to build a TRNG is constructed based on the circuits that form propagation delays, such as a ring oscillator, shift register, and [...] Read more.
True Random Number Generators (TRNGs) use physical phenomenon as their source of randomness. In electronics, one of the most popular structures to build a TRNG is constructed based on the circuits that form propagation delays, such as a ring oscillator, shift register, and routing paths. This type of TRNG has been well-researched within the current technology of electronics. However, in the future, where electronics will use sub-nano millimeter (nm) technology, the components become smaller and work on near-threshold voltage (NTV). This condition has an effect on the timing-critical circuit, as the distribution of the process variation becomes non-gaussian. Therefore, there is an urge to assess the behavior of the current delay-based TRNG system in sub-nm technology. In this paper, a model of TRNG implementation in sub-nm technology was created through the use of a specific Look-Up Table (LUT) in the Field-Programmable Gate Array (FPGA), known as SRL16E. The characterization of the TRNG was presented and it shows a promising result, in that the delay-based TRNG will work properly, with some constraints in sub-nm technology. Full article
(This article belongs to the Special Issue Recent Trends and Applications in Cybersecurity)
Show Figures

Figure 1

Back to TopTop