entropy-logo

Journal Browser

Journal Browser

Information Security and Privacy: From IoT to IoV II

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: 30 April 2024 | Viewed by 171

Special Issue Editors

School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Interests: cryptography; blockchain; cybersecurity; information society
Special Issues, Collections and Topics in MDPI journals
Department of Computer Science, Kansas State University, Manhattan, KS 66506, USA
Interests: artificial intelligence; computer vision; parallel computing; embedded systems; secure and trustworthy systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

There are several challenges associated with the implementation of digital infrastructures, which often surface when security and privacy issues are not prioritized in the initial stages of infrastructure development. In the endeavours to design secure systems, the integration of digital trust at each level (from electronic circuits to the highest level of data storage), primarily the integration of citizens’ trust by ensuring the privacy of their data, is of paramount importance.

The rapid expansion of cyberattacks has highlighted the dire need to adopt cyber threat intelligence (CTI) systems for the early detection of threats and to enable efficient defence against them. It is possible to automatically extract low-level cyber threat behaviours from publicly accessible CTI sources to support quick defensive decision making. Furthermore, to analyse texts in the cybersecurity field, researchers can apply the metrics of entropy and mutual information using information theory, and other novel schemes as well.

This Special Issue aims to collate papers that focus on the key areas of privacy, resilience, trust, entropy and mutual information, utilising concepts/methods related to entropy or information theory. Key areas include the following:

  • Privacy-respecting systems. This includes research related to the investigation of privacy-respecting methods that can be used to preserve the rights of citizens to privacy, such as machine learning, data analytics and cybersecurity.
  • Trust, privacy and resilience with smart cities. This includes research related to the integration of people, devices and systems into a smart city environment. Areas may include the IoV (Internet of Vehicles), trust with IoT infrastructures, and the cyber-reliance of smart cites.
  • Citizen identity and rights in digital governance. This includes models of integrating self-sovereign identities into the IoT, IoV and/or smart city environments.
  • Hardware-based security. This includes papers that highlight how hardware-based security solutions can be leveraged to build security into the silicon, and thus provide a hardware root of trust. These hardware-based security solutions include, but are not limited to, physically unclonable functions, true random number generators, hardware metering, digital watermarking, hardware Trojan detection, countermeasures against side-channel attacks and hardware implementation of cryptographic functions.
  • Artificial intelligence (AI) safety and security. Today, AI has proliferated in almost every domain, ranging from smart cities, agriculture, defence and transportation systems to healthcare. Although AI has also been used to assist and develop some security solutions, such as intrusion detection systems, AI itself is vulnerable to security attacks, often referred to as adversarial examples. We invite papers related to all aspects of AI safety and security, ranging from finding vulnerabilities in AI systems to developing approaches for mitigating attacks on AI systems.
  • Lightweight encryption. Papers addressing lightweight encryption system, whose goal is to enable security for devices with limited resources by using less memory, less computational power and less energy are invited.
  • Cyber documents and CTI reports. Cyber documents can be used for the calculation of entropy and mutual information, which in turn can be applied in CTI systems. We invite papers proposing novel strategies to develop CTI systems.

Prof. Dr. Bill William Buchanan
Dr. Arslan Munir
Dr. Jawad Ahmad
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • blockchain
  • hardware-based security
  • artificial intelligence, computer vision
  • chaos
  • image encryption
  • cyber threat intelligence
  • information theory
  • entropy

Related Special Issue

Published Papers

This special issue is now open for submission.
Back to TopTop