Security Challenges and Opportunities of Mobile System/5G/Internet of Things (IoT) Scenarios

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (28 February 2022) | Viewed by 17155

Special Issue Editors


E-Mail Website
Guest Editor
Department of Information Management, National Chi Nan University, Nantou 54561, Taiwan
Interests: cryptography; Internet of Things security; 5G security; ontology applications; development of IoT systems; herb and essential oils applications; machine learning applied on food safety challenge
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan
Interests: applied cryptology; information and communication security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the advances and prevalence of conventional mobile systems, 5G, and Internet of Things, they not only significantly boom new applications and business opportunities but also incur many new security challenges. For those systems that consist of the geographical-widely deployed IoT devices, no matter whether static devices or mobile devices, it is cost-effective to choose public mobile systems as their backbone to leverage the advantages of the ubiquitous coverage, high reliability, and very competitive cost. The integration of mobile systems (including 5G) with IoT systems further amplifies the complexities and diversities for both the systems and the security functions. Blockchain technology is bringing in the next generation of billing, security, trusted cross-carrier payment systems and identity management. Network equipment can be associated with a Blockchain so that it is impossible to fake its identity. Using a decentralised Blockchain protects these identities through the use of asymmetric cryptography and secure hashing algorithms. Novel applications and integration of Blockchain with other security services in mobile systems/5G/IoT enhance the function and prevalence of each technology and improve all the services. 

In this regard, we need both the specific security solutions for each specific application/sub-system and the integration/framework that federate the various security functions. 

Original contributions, not currently under review to another journal or conference, are solicited for this Special Issue. We hope to attract a diverse group of researchers, academics, designers and others to discuss these issues from a broad range of perspectives. Potential topics include, but are not limited to:

    • Mobile systems with security and privacy considerations;
    • 5G architecture with security and privacy considerations;
    • IoT systems with security and privacy considerations;
    • Big data analytics tools and techniques in mobile systems/5G/IoT security;
    • Big data analytics for mobile systems/5G/IoT security;
    • Lightweight cryptographic algorithms and protocols;
    • Wireless virtualization and slicing security;
    • Authentication, authorization, and accounting (AAA) for 5G security;
    • 5G security standardization;
    • Secure integration of IoT/mobile systems/5G;
    • Security and privacy in cloud/fog/edge computing;
    • Secure device-to-device communications;
    • Secure integration of IoT /5G and other networks;
    • Intrusion detection/prevention techniques for mobile systems/5G/IoT;
    • Cross-layer/cross-domain/cross-service security in mobile systems/5G/IoT;
    • Blockchain-based service and applications for mobile systems/5G/IoT;
    • Blockchain-based security services for mobile systems/5G/IoT;
    • Secure data storage, communications and computing;
    • Heterogeneous system modeling for 5G security;
    • Secure sensing and computing techniques in 5G;
    • Unified framework for federating integrated 5G-IoT security;
    • Trust models and trust handling for federating 5G-IoT security;
    • Unified framework for federating direct-device-to-device model/edge-computing model/cloud-computing model security;

Prof. Dr. Hung-Yu Chien
Prof. Dr. Chun-I Fan
Prof. Dr. Chunhua Su
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

15 pages, 1250 KiB  
Article
A Multiple End-Devices Authentication Scheme for LoRaWAN
by Chun-I Fan, Er-Shuo Zhuang, Arijit Karati and Chun-Hui Su
Electronics 2022, 11(5), 797; https://doi.org/10.3390/electronics11050797 - 03 Mar 2022
Cited by 6 | Viewed by 2601
Abstract
With the advancement of the Internet of Things, the LoRa Alliance produced the Long-Range Wide-Area Network (LoRaWAN) Specification, allowing end-devices to transit through a gateway and join the LoRa network after completing a join procedure. When an end-device joins the LoRaWAN network, it [...] Read more.
With the advancement of the Internet of Things, the LoRa Alliance produced the Long-Range Wide-Area Network (LoRaWAN) Specification, allowing end-devices to transit through a gateway and join the LoRa network after completing a join procedure. When an end-device joins the LoRaWAN network, it must send a join request message to the network server and wait for the network server to verify such request under the current LoRaWAN join protocol. However, as the number of end-devices grows exponentially, network server verification messages will grow linearly with the number of end-devices. This paper proposes an authentication system for multiple end-devices that complies with the LoRa Alliance’s specifications and decreases the joining latency imposed by the network server verifying messages. The proposed authentication system is formally secure against the server and end-device impersonation. In addition, we assess the authentication overhead and compare it to the standard approach. Full article
Show Figures

Figure 1

18 pages, 738 KiB  
Article
A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
by Yingwen Chen, Bowen Hu, Hujie Yu, Zhimin Duan and Junxin Huang
Electronics 2021, 10(19), 2359; https://doi.org/10.3390/electronics10192359 - 27 Sep 2021
Cited by 22 | Viewed by 3531
Abstract
The IoT devices deployed in various application scenarios will generate massive data with immeasurable value every day. These data often contain the user’s personal privacy information, so there is an imperative need to guarantee the reliability and security of IoT data sharing. We [...] Read more.
The IoT devices deployed in various application scenarios will generate massive data with immeasurable value every day. These data often contain the user’s personal privacy information, so there is an imperative need to guarantee the reliability and security of IoT data sharing. We proposed a new encrypted data storing and sharing architecture by combining proxy re-encryption with blockchain technology. The consensus mechanism based on threshold proxy re-encryption eliminates dependence on the third-party central service providers. Multiple consensus nodes in the blockchain network act as proxy service nodes to re-encrypt data and combine converted ciphertext, and personal information will not be disclosed in the whole procedure. That eliminates the restrictions of using decentralized network to store and distribute private encrypted data safely. We implemented a lot of simulated experiments to evaluate the performance of the proposed framework. The results show that the proposed architecture can meet the extensive data access demands and increase a tolerable time latency. Our scheme is one of the essays to utilize the threshold proxy re-encryption and blockchain consensus algorithm to support IoT data sharing. Full article
Show Figures

Graphical abstract

15 pages, 2826 KiB  
Article
Dynamic Public Key Certificates with Forward Secrecy
by Hung-Yu Chien
Electronics 2021, 10(16), 2009; https://doi.org/10.3390/electronics10162009 - 19 Aug 2021
Viewed by 3691
Abstract
Conventionally, public key certificates bind one subject with one static public key so that the subject can facilitate the services of the public key infrastructure (PKI). In PKI, certificates need to be renewed (or revoked) for several practical reasons, including certificate expiration, private [...] Read more.
Conventionally, public key certificates bind one subject with one static public key so that the subject can facilitate the services of the public key infrastructure (PKI). In PKI, certificates need to be renewed (or revoked) for several practical reasons, including certificate expiration, private key breaches, condition changes, and possible risk reduction. The certificate renewal process is very costly, especially for those environments where online authorities are not available or the connection is not reliable. A dynamic public key certificate (DPKC) facilitates the dynamic changeover of the current public–private key pairs without renewing the certificate authority (CA). This paper extends the previous study in several aspects: (1) we formally define the DPKC; (2) we formally define the security properties; (3) we propose another implementation of the Krawczyk–Rabin chameleon-hash-based DPKC; (4) we propose two variants of DPKC, using the Ateniese–Medeiros key-exposure-free chameleon hash; (5) we detail two application scenarios. Full article
Show Figures

Figure 1

11 pages, 1967 KiB  
Article
A Non-Interactive Attribute-Based Access Control Scheme by Blockchain for IoT
by Qiliang Yang, Mingrui Zhang, Yanwei Zhou, Tao Wang, Zhe Xia and Bo Yang
Electronics 2021, 10(15), 1855; https://doi.org/10.3390/electronics10151855 - 01 Aug 2021
Cited by 12 | Viewed by 2031
Abstract
As an important method of protecting data confidentiality in the Internet of Things (IoT), access control has been widely concerned. Because attribute-based access control mechanisms are dynamic, it is not only suitable to solve the dynamic access problem in IoT, but also to [...] Read more.
As an important method of protecting data confidentiality in the Internet of Things (IoT), access control has been widely concerned. Because attribute-based access control mechanisms are dynamic, it is not only suitable to solve the dynamic access problem in IoT, but also to deal with the dynamic caused by node movement and access data change. The traditional centralized attribute-based access control mechanism has some problems: due to the large number of devices in IoT, the central trusted entity may become the bottleneck of the whole system. Moreover, when a central trusted entity is under distributed denial-of-service (DDoS) attack, the entire system may crash. Blockchain is a good way to solve the above problems. Therefore, we developed a non-interactive, attribute-based access control scheme that applies blockchain technology in IoT scenarios by using PSI technology. In addition, the attributes of data user and data holder are hidden, which protects the privacy of both parties’ attributes and access policy. Furthermore, the experimental results indicate that our scheme has high efficiency. Full article
Show Figures

Figure 1

Review

Jump to: Research

25 pages, 3169 KiB  
Review
A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand
by Yen Lin, Jeng-Ywan Jeng, Yi-Yu Liu and Jheng-Jia Huang
Electronics 2022, 11(5), 678; https://doi.org/10.3390/electronics11050678 - 23 Feb 2022
Viewed by 3676
Abstract
In the Personal Computer (PC) industry, systems with updated configurations, components, and new technologies are introduced to the market each year. Resource arrangement and the prediction of market requirements for products are common challenges in each development phase of these products. Technologies such [...] Read more.
In the Personal Computer (PC) industry, systems with updated configurations, components, and new technologies are introduced to the market each year. Resource arrangement and the prediction of market requirements for products are common challenges in each development phase of these products. Technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and cloud services influence the PC industry, and product strategies must be examined to fit the requirements of the market. Common designs and market predictions can influence product line resource arrangements, and 5G applications are causing an increasing demand for 5G-enabled products in the market. However, PC systems based on PCI Express, NVMe, USB, and TPM have been introduced into the market with more secure solutions, and common designs and predictable market demand can provide more reliable strategies for navigating these issues. The research reported here is based on the serial bus system, which should simplify protocol transition between PCI Express, CXL, USB 4, and NVMe. Serial bus behavior should also influence performance and power consumption. Product strategies could be based on securing demand with power and performance in AI, the IoT, cloud storage, and high-performance computing. Based on performance and power requirements, application layer devices can use PCIe-based systems to provide secure solutions to extend 5G system reliability. Full article
Show Figures

Figure 1

Back to TopTop