Emerging Security Solutions for IoT and Mobile Network

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (30 June 2023) | Viewed by 2953

Special Issue Editors


E-Mail Website
Guest Editor
Department of Information Management, National Chi Nan University, Nantou 54561, Taiwan
Interests: cryptography; Internet of Things security; 5G security; ontology applications; development of IoT systems; herb and essential oils applications; machine learning applied on food safety challenge
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan
Interests: applied cryptology; information and communication security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Medical Informatics, Tzu Chi University, Hualien 97004, Taiwan
Interests: cryptography; medical information security; wireless network; network security; sensor networks and HIPAA privacy/security regulations
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Internet of Things (IoT) and mobile networks are two of the key technologies that simultaneously advance the industry progress and boom the potential growth of economics. With the integration of the two technology areas, the communications not only reach much wider areas, but also boom new applications and business opportunities; however, it also incurs more security threats and the infected potentials of the connected systems.

IoT technologies have been widely applied in agriculture areas, vehicles, factories, communications, transportation, armies, critical intra-structures, etc. The advancement of mobile systems (such as 4G, 5G, 6G, Starlink, etc.) cover much wider areas and the transmissions are much more efficient. However, the integration of these systems involves more diversities in technologies and in devices. Some of them are powerful systems with some enforced protections while others being weaker components with obvious vulnerabilities. To enhance the security protection of the system and deter possible threats, it needs diverse security mechanisms and the orchestration of the various security mechanisms. Therefore, this Special Issue aims at inviting all security solutions that could tackle some security issues in the integrated systems.

Some security mechanisms and topics are listed as follows. IoT authentication, intrusion detection, machine learning, block chains, mobile system infra-structures and integration, inverse engineering, Over-the-Air activation, etc.

In this regard, we need both the specific security solutions for each specific application/sub-system and the integration/framework that federate the various security functions.

Original contributions, not currently under review to another journal or conference, are solicited for this Special Issue. We hope to attract a diverse group of researchers, academics, designers, and others to discuss these issues from a broad range of perspectives. Potential topics include, but are not limited to:

  • Mobile systems with security and privacy considerations;
  • IoT systems with security and privacy considerations;
  • Big data analytics tools and techniques in mobile systems/5G/IoT security;
  • Big data analytics for mobile systems/5G/IoT security;
  • Lightweight cryptographic algorithms and protocols;
  • Wireless virtualization and slicing security;
  • Authentication, authorization, and accounting (AAA) for mobile system security;
  • Secure integration of IoT/mobile systems/5G;
  • Security and privacy in cloud/fog/edge computing;
  • Secure device-to-device communications;
  • Over-the-Air activation;
  • Intrusion detection/prevention techniques for mobile systems/5G/IoT;
  • Cross-layer/cross-domain/cross-service security in mobile systems/5G/IoT;
  • Blockchain-based service and applications for mobile systems/5G/IoT;
  • Secure data storage, communications, and computing;
  • Heterogeneous system modeling for 5G security;
  • Secure sensing and computing techniques in 5G;
  • Machine learning applied in IoT systems or mobile systems;
  • Trust models and trust handling for federating 5G-IoT security.

Prof. Dr. Hung-Yu Chien
Prof. Dr. Chun-I Fan
Dr. Chunhua Su
Prof. Dr. Tian-Fu Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 513 KiB  
Article
Aggregate Entity Authentication Identifying Invalid Entities with Group Testing
by Shoichi Hirose and Junji Shikata
Electronics 2023, 12(11), 2479; https://doi.org/10.3390/electronics12112479 - 31 May 2023
Viewed by 592
Abstract
It is common to implement challenge-response entity authentication with a MAC function. In such an entity authentication scheme, aggregate MAC is effective when a server needs to authenticate many entities. Aggregate MAC aggregates multiple tags (responses to a challenge) generated by entities into [...] Read more.
It is common to implement challenge-response entity authentication with a MAC function. In such an entity authentication scheme, aggregate MAC is effective when a server needs to authenticate many entities. Aggregate MAC aggregates multiple tags (responses to a challenge) generated by entities into one short aggregate tag so that the entities can be authenticated simultaneously regarding only the aggregate tag. Then, all associated entities are valid if the pair of a challenge and the aggregate tag is valid. However, a drawback of this approach is that invalid entities cannot be identified when they exist. To resolve the drawback, we propose group-testing aggregate entity authentication by incorporating group testing into entity authentication using aggregate MAC. We first formalize the security requirements and present a generic construction. Then, we reduce the security of the generic construction to that of aggregate MAC and group testing. We also enhance the generic construction to instantiate a secure scheme from a simple and practical but weaker aggregate MAC scheme. Finally, we show some results on performance evaluation. Full article
(This article belongs to the Special Issue Emerging Security Solutions for IoT and Mobile Network)
Show Figures

Figure 1

13 pages, 3804 KiB  
Article
A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security
by Hung-Yu Chien and Nian-Zu Wang
Electronics 2022, 11(23), 3899; https://doi.org/10.3390/electronics11233899 - 25 Nov 2022
Cited by 7 | Viewed by 1819
Abstract
Over-the-air (OTA) updating is a critical mechanism for secure internet of things (IoT) systems for remotely updating the firmware (or keys) of IoT devices. Message queue telemetry transport (MQTT) is a very popular internet of things (IoT) communication protocol globally. Therefore, MQTT also [...] Read more.
Over-the-air (OTA) updating is a critical mechanism for secure internet of things (IoT) systems for remotely updating the firmware (or keys) of IoT devices. Message queue telemetry transport (MQTT) is a very popular internet of things (IoT) communication protocol globally. Therefore, MQTT also becomes popular in facilitating the OTA mechanism in many IoT platforms, such as the Amazon IoT platform. In these IoT platforms, the MQTT broker acts as the message broker and as an OTA server simultaneously; in these broker-based OTA architectures, it is quite common that an IoT application manager not only uploads the new firmware/software to the broker but also delegates his signing authority on the firmware/software to the same broker. If the broker is secure and trusted, this OTA model works well; however, it incurs lots of security concerns if the broker is not fully trusted or if it is curious. Many MQTT deployments do not own their own brokers, but rely on a third-party broker, which sometimes is a freeware program or is maintained by a curious third party. Therefore, a secure OTA process should protect privacy against these brokers. This paper designs a novel MQTT-based OTA model in which an IoT application manager can fully control the OTA process through an end-to-end (E2E) channel. We design the model using MQTT 5.0’s new features and functions. The analysis shows that the new model greatly enhances security and privacy properties while maintaining high efficiency. Full article
(This article belongs to the Special Issue Emerging Security Solutions for IoT and Mobile Network)
Show Figures

Figure 1

Back to TopTop