Security Requirements and Challenges of Distributed Intelligent Devices and Applications

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 800

Special Issue Editors

Dr. Yu Jiang
E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
Interests: IoT security; physical layer security
College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
Interests: IoT security; privacy protection; big data security; secure deep learning
Special Issues, Collections and Topics in MDPI journals
Dr. Shang Gao
E-Mail Website
Guest Editor
Department of Computing, The Hong Kong Polytechnic University, Hong Kong 000000, China
Interests: zero-knowledge proofs; zkSNARK; recursive SNARK
Dr. Yuexiu Xing
E-Mail Website
Guest Editor
The School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Interests: physical layer security; radio frequency fingerprint; authentication; network security

Special Issue Information

Dear Colleagues,

Distributed and centralized resources exhibit symmetric and asymmetric characteristics. Distributed resource scenarios are wide-ranging, but there is a lack of security protection in the whole process of distributed resource aggregation and centralized regulation. Therefore, we encourage the submission of contributions in areas such as access authentication, data security or device vulnerabilities.

Dr. Yu Jiang
Prof. Dr. Jinbo Xiong
Dr. Shang Gao
Dr. Yuexiu Xing
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • distributed device security
  • physical security of intelligent devices
  • power terminal security
  • device vulnerabilities
  • device data security
  • secure machine learning technique for data analysis
  • access authentication for distributed device
  • multi-agent devices security
  • new security challenges in distributed devices

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 2093 KiB  
Article
Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis
Symmetry 2024, 16(2), 249; https://doi.org/10.3390/sym16020249 - 17 Feb 2024
Viewed by 342
Abstract
Industrial control terminals play an important role in industrial control scenarios. Due to the special nature of industrial control networks, industrial control terminal systems are vulnerable to malicious attacks, which can greatly threaten the stability and security of industrial production environments. Traditional security [...] Read more.
Industrial control terminals play an important role in industrial control scenarios. Due to the special nature of industrial control networks, industrial control terminal systems are vulnerable to malicious attacks, which can greatly threaten the stability and security of industrial production environments. Traditional security protection methods for industrial control terminals have coarse detection granularity, and are unable to effectively detect and prevent attacks, lacking real-time responsiveness to attack events. Therefore, this paper proposes a real-time dynamic credibility evaluation mechanism based on program behavior, which integrates the matching and symmetry ideas of credibility evaluation. By conducting a real-time dynamic credibility evaluation of function call sequences and system call sequences during program execution, the credibility of industrial control terminal application program behavior can be judged. To solve the problem that the system calls generated during program execution are unstable and difficult to measure, this paper proposes a partition-based dynamic credibility evaluation method, dividing program behavior during runtime into function call behavior and system call behavior within function intervals. For function call behavior, a sliding window-based function call sequence benchmark library construction method is proposed, which matches and evaluates real-time measurement results based on the benchmark library, thereby achieving symmetry between the benchmark library and the measured data. For system call behavior, a maximum entropy system call model is constructed, which is used to evaluate the credibility of system call sequences. Experiment results demonstrate that our method performs better in both detection success rate and detection speed compared to the existing methods. Full article
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: 3C-Authentication: A Cross-Domain, Certificateless, and Consortium Blockchain Based Authentication Method for V2G Networks in Smart Grid
Authors: Qianhao Miao, Yinan Zhong, Yanjiao Chen
Affiliation: Zhejiang University
Abstract: As an important component of the smart grid, Vehicle-to-Grid (V2G) networks can deliver diverse auxiliary services and enhance the overall resilience of electrical power systems. However, V2G networks face two main challenges due to a large number of devices that connect to it. First, V2G networks suffer from serious security threats, such as doubtful authenticity and privacy leakage. Second, the efficiency will decrease significantly due to the massive requirements of authentication. To tackle these problems, this paper proposes a cross-domain authentication scheme for V2G networks based on consortium blockchain and certificateless signature technology. Featuring decentralized, open, and transparent transactions that cannot be tampered with, this scheme achieves good performance on both security and efficiency, which proves to be suitable for V2G scenarios in the smart grid.

Title: DF-TDNN: A TDNN Based Device Fingerprint Extraction Method Using Behavior Data
Authors: Yinan Zhong, Wenyuan Xu
Affiliation: Zhejiang University
Abstract: The past few years have witnessed a wider adoption of Internet of Things (IoT) devices. Since IoT devices are usually deployed in open and uncertain environment, device authentication is of great importance. However, traditional device fingerprint (DF) extraction methods have several disadvantages. First, existing DF extraction methods need private information of devices to compute DF, which puts the privacy of devices at steak. Second, the manually designing features-based methods suffer from poor performance. To tackle these limitations, we propose a Time Delay Neural Network (TDNN) based DF extraction method, named DF-TDNN, which utilizes behavior data in the network traffic pcap file to generate DF. It is verified by simulation that our method achieves better performance while protecting the privacy of the device.

Back to TopTop