Advances on Networks and Cyber Security

A special issue of Network (ISSN 2673-8732).

Deadline for manuscript submissions: closed (30 September 2023) | Viewed by 35751

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Science and Engineering, Plymouth University, Drake Circus, Plymouth PL4 8AA, UK
Interests: computer networks; wireless networks; network performance; network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics and Telecommunications, University of the Peloponnese, 221 31 Tripoli, Greece
Interests: cyber-security; game-theoretic security; autonomous security; privacy; risk management; cryptography; blockchain; post-quantum cryptography; coding theory; IoT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue will include a selection of papers covering a range of subjects, focusing on topical areas of computer networks and security, with a specific emphasis on novel environments, ranging from 5G and virtualized infrastructures to Internet of Things, smart environments and cyber security issues.

Networking represents the underlying core of current IT systems, providing the necessary communication support for complex infrastructures. Recent years have witnessed a number of novel concepts moving from theory to large scale implementations, such as software defined networking, network function virtualization, 5G, smart environments, and IoT. These concepts fundamentally change the paradigms used in traditional networking, with a number of areas, such as network routing and system or business security, having to adjust or redesign to accommodate them. While the benefits are clear, through the advent of new applications, use cases, improved user interaction and experience, they also introduce new challenges for generic network architectures, mobility, security and traffic engineering.

This is a joint special issue with Electronics.

Dr. Stavros Shiaeles
Dr. Bogdan Ghita
Dr. Nicholas Kolokotronis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Network is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • traffic engineering and network management
  • pervasive networks
  • network-enabled devices
  • smart city
  • smart grid
  • smart home
  • NFV
  • SDN
  • 5G
  • routing
  • network and service management
  • traffic engineering
  • congestion control
  • security and privacy: authentication and access control
  • network security
  • intrusion detection and response
  • digital forensics

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

28 pages, 921 KiB  
Article
Arithmetic Study about Efficiency in Network Topologies for Data Centers
by Pedro Juan Roig, Salvador Alcaraz, Katja Gilly, Cristina Bernad and Carlos Juiz
Network 2023, 3(3), 298-325; https://doi.org/10.3390/network3030015 - 26 Jun 2023
Cited by 1 | Viewed by 1805
Abstract
Data centers are getting more and more attention due the rapid increase of IoT deployments, which may result in the implementation of smaller facilities being closer to the end users as well as larger facilities up in the cloud. In this paper, an [...] Read more.
Data centers are getting more and more attention due the rapid increase of IoT deployments, which may result in the implementation of smaller facilities being closer to the end users as well as larger facilities up in the cloud. In this paper, an arithmetic study has been carried out in order to measure a coefficient related to both the average number of hops among nodes and the average number of links among devices for a range of typical network topologies fit for data centers. Such topologies are either tree-like or graph-like designs, where this coefficient provides a balance between performance and simplicity, resulting in lower values in the coefficient accounting for a better compromise between both factors in redundant architectures. The motivation of this contribution is to craft a coefficient that is easy to calculate by applying simple arithmetic operations. This coefficient can be seen as another tool to compare network topologies in data centers that could act as a tie-breaker so as to select a given design when other parameters offer contradictory results. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

22 pages, 3405 KiB  
Article
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach
by Shaharyar Khan and Stuart Madnick
Network 2022, 2(4), 606-627; https://doi.org/10.3390/network2040035 - 02 Nov 2022
Cited by 1 | Viewed by 1911
Abstract
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial [...] Read more.
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial control systems (ICS) have received significantly less attention. What is very different is that industrial control systems can be made to do things that could destroy equipment or even harm people. For example, in 2021 the US encountered a cyberattack on a water treatment plant in Florida that could have resulted in serious injuries or even death. These risks are based on the unique physical characteristics of these industrial systems. In this paper, we present a holistic, integrated safety and security analysis, we call Cybersafety, based on the STAMP (System-Theoretic Accident Model and Processes) framework, for one such industrial system—an industrial chiller plant—as an example. In this analysis, we identify vulnerabilities emerging from interactions between technology, operator actions as well as organizational structure, and provide recommendations to mitigate resulting loss scenarios in a systematic manner. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

26 pages, 3495 KiB  
Article
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network
by Babatunde Ojetunde, Naoto Egashira, Kenta Suzuki, Takuya Kurihara, Kazuto Yano and Yoshinori Suzuki
Network 2022, 2(4), 519-544; https://doi.org/10.3390/network2040031 - 12 Oct 2022
Viewed by 1856
Abstract
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet [...] Read more.
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet traffic on the network, especially in the IoT network where resources are limited. It is necessary to know the status of the communication environment and the reason why network scanning failed. Therefore, this paper proposes a multimodel-based approach which can be utilized to estimate the cause of failure/delay of network scanning over wireless networks where a scan packet or its response may sometimes be dropped or delayed. Specifically, the factors that cause network scanning failure/delay were identified and categorized. Then, using a machine learning algorithm, we introduced a multimodel linear discriminant analysis (MM-LDA) to estimate the cause of scan failure/delay based on the results of network scanning. In addition, a one-to-many model and a training data filtering technique were adopted to ensure that the estimation error was drastically reduced. The goal of our proposed method was to correctly estimate the causes of scan failure/delay in IP-connected devices. The performance of the proposed method was evaluated using computer simulation assuming a cellular (LTE) network as the targeted IoT wireless network and using LTE-connected devices as the targeted IoT devices. The proposed MM-LDA correctly estimates the cause of failure/delay of the network scan at an average probability of 98% in various scenarios. In comparison to other conventional machine learning classifiers, the proposed MM-LDA outperforms various classification methods in the estimation of the cause of scan failure/delay. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Review

Jump to: Research

16 pages, 431 KiB  
Review
Cybersecurity Challenges in the Maritime Sector
by Frank Akpan, Gueltoum Bendiab, Stavros Shiaeles, Stavros Karamperidis and Michalis Michaloliakos
Network 2022, 2(1), 123-138; https://doi.org/10.3390/network2010009 - 07 Mar 2022
Cited by 26 | Viewed by 28159
Abstract
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to [...] Read more.
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to the lack of Internet connectivity and the isolated nature of ships in the sea, is showing a 900% increase in cybersecurity breaches on operational technology as it enters the digital era. Although some research is being conducted in this area, maritime cybersecurity has not been deeply investigated. Hence, this paper provides a close investigation of the landscape of cybersecurity in the maritime sector with the aim of highlighting security problems and challenges. First, it explores the systems available on ships that could be targeted by attackers, their possible vulnerabilities that an attacker could exploit, the consequences if the system is accessed, and actual incidents. Then, it describes and analyses possible mitigation actions that can be utilised in advance to prevent such attacks. Finally, several challenges and open problems are discussed for future research. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Back to TopTop