Advances in Mathematical Cryptography and Information Security toward Industry 5.0

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Engineering Mathematics".

Deadline for manuscript submissions: 1 November 2024 | Viewed by 2722

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering, University of Mount Union, Alliance, OH 44601-3993, USA
Interests: ML/federated learning in wireless systems; heterogeneous networks; massive MIMO; reconfigurable intelligent surface-assisted networks; mmWave communication networks; energy harvesting; full-duplex communications; cognitive radio; small cell; non-orthogonal multiple access (NOMA); physical layer security; UAV networks; visible light communication; IoT system
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

As we gradually move toward Industry 5.0, which is envisioned as a complex network integrating information technology and massive industrial production processes, the need to protect security-critical systems from unauthorized access becomes imperative. However, due to the proliferation of massive devices in such a complex system, designing a secure user authentication scheme for achieving the desired forward secrecy poses several challenges. The preliminary authentication schemes have not addressed the problem by considering the resource-limited sensor nodes. Most of these schemes have not provided forward secrecy, and only a few achieve forward secrecy at high computational costs. Generally, the sensor nodes deployed in a typical industrial setting are resource-limited devices. In particular, their storage and computation resources are limited. Additionally, sensitive user data in the industry 5.0 applications need to be well secured from a multitude of sophisticated adversaries that proliferate cyber-space. As a result, it becomes expedient to authenticate and secure sensitive user information transmitted via sensor nodes from all intruders. In order to achieve this objective, a suitable authentication protocol and a session key are desirable to grant access to only the authorized users of the application. Cryptography relies on mathematics and logic to design strong security schemes. Modern cryptography and information security emphasize the mathematics behind the theory of these cryptosystems. This Special Issue calls for original contributions to designing and developing advanced mathematical cryptographic schemes for information security toward Industry 5.0.

The topics of interest include but are not limited to the following:

  • Advanced mathematical cryptography in the Industry 5.0 era.
  • Information security in Industry 5.0 for societal good.
  • Sustainable cryptographic models for secured systems in Industry 5.0.
  • Secured digital twins enabling smart systems in Industry 5.0.
  • Novel security architectures for smart systems in Industry 5.0.
  • Lightweight authentication schemes based on extended Chebyshev chaotic maps.
  • Machine learning aiding the design and development of advanced cryptographic schemes for information security.
  • Security and privacy challenges for designing and developing advanced cryptographic schemes for information security toward Industry 5.0.
  • Experimentation and deployment of advanced cryptographic schemes for information security.
  • Machine learning and blockchain technology enabling the design of novel advanced cryptographic schemes and information security.
  • Case studies and recommendations for designing and developing advanced cryptographic schemes for information security.

This Special Issue will provide novel contributions that will drive cutting-edge research, leading to the development of advanced mathematical cryptography and information security toward Industry 5.0. Quality submissions from academia and industry are highly welcome.

Prof. Dr. Cheng-Chi Lee
Dr. Dinh-Thuan Do
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • lightweight schemes
  • energy-efficient protocols
  • authentication
  • information security
  • forward secrecy
  • wireless sensor nodes
  • biometrics
  • machine learning
  • Internet of Things
  • blockchain technology
  • security and privacy
  • chaotic communications
  • artificial intelligence
  • Industry 5.0
  • wireless security systems
  • discrete logarithms
  • factorization algorithms
  • probability theory
  • collision algorithms
  • lattice-based cryptography
  • chaos-based cryptography

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 3128 KiB  
Article
Mathematical Model of the Process of Data Transmission over the Radio Channel of Cyber-Physical Systems
by Fazliddin Makhmudov, Andrey Privalov, Alexander Privalov, Elena Kazakevich, Gamzatdin Bekbaev, Alexey Boldinov, Kyung Hoon Kim and Young Im-Cho
Mathematics 2024, 12(10), 1452; https://doi.org/10.3390/math12101452 - 8 May 2024
Viewed by 343
Abstract
This article introduces a refined mathematical model to evaluate the quality of mobile radio channels within cyber-physical systems, employing the topological transformation of stochastic networks. The operation of the radio channel is conceptualized as a stochastic network, enabling the derivation of critical metrics [...] Read more.
This article introduces a refined mathematical model to evaluate the quality of mobile radio channels within cyber-physical systems, employing the topological transformation of stochastic networks. The operation of the radio channel is conceptualized as a stochastic network, enabling the derivation of critical metrics such as an equivalent function, mathematical expectation, variance, and the time distribution function of the implemented processes. The model uses the Gamma distribution for the initial distribution functions of random variables, enhancing its analytical precision. A significant advancement of this study is the development of a comprehensive model that describes the data transmission process through phases of connection establishment, information transmission, and connection maintenance. The innovative aspect of this research lies in applying an equivalent function to a stochastic network that includes a logical “AND” node with gamma-distributed incoming branches. The stochastic network presented in the article, which includes a logical “AND” node, helps to elucidate the mechanism for obtaining an equivalent function for such networks, allowing the application area of the GERT method to be expanded. This methodological enhancement extends the previously limited scope of topological transformation methods, which only applied to exponential distribution models for the timing of branch inputs. By integrating a Gamma distribution, the model simplifies the equivalent function and reduces the computational complexity required to assess the radio channel’s quality, ensuring the accuracy needed for engineering calculations. Moreover, the proposed method requires 25–40% fewer series members than the traditional Taylor series decomposition, while maintaining comparable computational complexity for the typical series members. Furthermore, the maximum absolute error in the calculations is capped at 9 × 10−3, which is well within acceptable limits for engineering purposes. Primarily designed for radio channels in cyber-physical systems, the model’s applicability extends to wireless communications, providing a valuable tool for evaluating channel efficiency and security in the face of increasing cyber threats. Full article
Show Figures

Figure 1

22 pages, 885 KiB  
Article
A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers
by Myeonghyun Kim, Kisung Park and Youngho Park
Mathematics 2024, 12(10), 1450; https://doi.org/10.3390/math12101450 - 8 May 2024
Viewed by 393
Abstract
As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy sources. In recent years, many blockchain-based energy trading schemes have been proposed for secure energy trading. [...] Read more.
As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy sources. In recent years, many blockchain-based energy trading schemes have been proposed for secure energy trading. However, existing schemes cannot fully solve privacy issues and security problems during energy trading. In this paper, we propose a reliable and privacy-preserving vehicular energy trading scheme utilizing decentralized identifier technology. In the proposed scheme, identity information and trading result information are not revealed publicly; this is due to the use of decentralized identifiers and verifiable credential technologies. Additionally, only parties who have successfully conducted energy trading can manage complete transaction information. We also demonstrate our method’s security and ensure privacy preservation by performing informal and formal security analyses. Furthermore, we analyze the performance and security features of the proposed scheme and related works and show that the proposed scheme has competitive performance. Full article
Show Figures

Figure 1

15 pages, 5983 KiB  
Article
Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme
by Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang and Chin-Chen Chang
Mathematics 2024, 12(9), 1332; https://doi.org/10.3390/math12091332 - 27 Apr 2024
Viewed by 634
Abstract
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers such as text, images, audio, and videos. Vector Quantization (VQ) [...] Read more.
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers such as text, images, audio, and videos. Vector Quantization (VQ) compression is a well-known method for compressing images. In previous research, most methods related to VQ compressed images have focused on hiding information in index tables, while only a few of the latest studies have explored embedding data in codebooks. We propose a data hiding scheme for VQ codebooks. With our approach, a sender XORs most of the pixel values in a codebook and then applies a threshold to control data embedding. The auxiliary information generated during this process is embedded alongside secret data in the index reordering phase. Upon receiving the stego codebook and the reordered index table, the recipient can extract the data and reconstruct the VQ-compressed image using the reverse process. Experimental results demonstrate that our scheme significantly improves embedding capacity compared to the most recent codebook-based methods. Specifically, we observe an improvement rate of 223.66% in a small codebook of size 64 and an improvement rate of 85.19% in a codebook of size 1024. Full article
Show Figures

Figure 1

14 pages, 300 KiB  
Article
On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
by Satyabrat Rath, Jothi Ramalingam and Cheng-Chi Lee
Mathematics 2024, 12(5), 713; https://doi.org/10.3390/math12050713 - 28 Feb 2024
Viewed by 431
Abstract
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have [...] Read more.
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have security vulnerabilities. This work identifies a critical flaw in a recent outsourcing protocol for RSA proposed by Hu et al. We demonstrate how this flaw compromises the security of the entire RSA system. Subsequently, we propose a robust solution that strengthens the RSA algorithm and mitigates the identified vulnerability. Furthermore, our solution remains resilient against existing lattice-based attacks. The proposed fix offers a more secure and efficient way for IoT devices to leverage the power of third-party servers while maintaining data integrity and confidentiality. An extensive performance evaluation confirms that our solution offers comparable efficiency while significantly enhancing security compared to existing approaches. Full article
Show Figures

Figure 1

Back to TopTop