Security and Privacy Challenges in 5G Networks

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 10 March 2025 | Viewed by 1410

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology Taiwan, Taichung 41170, Taiwan
Interests: watermarking; cryptography; security; electronic commerce

Special Issue Information

Dear Colleagues,

In traditional mobile communications networks, the major goal is to enrich people's life through communication. Users may communicate with each other through text messages, voice calls, video calls or shared images, surf the Internet or access app/social media services via smart phones. However, 5G is no longer limited to individual users. It is not just about having a faster mobile network or having richer features in a smartphone. In the future, 5G will also provide services for vertical industries, and various new services, such as smart transport, smart manufacturing, health care, and smart homes, will emerge from this. As open network platforms, 5G networks raise serious concerns around security and privacy issues. Therefore, in order to ensure that various enterprise applications can run smoothly in the 5G environment, it is urgent and challenging to explore the security solutions required by various commercial applications and find solutions that can reduce privacy leakage. This Special Issue aims to provide an advanced method or application for researchers and engineers to contribute with original research that presents state-of-the-art research outcomes toward security and privacy solutions in the 5G environment. All submitted papers will be peer-reviewed and selected based on both their quality and relevance to the theme of this Special Issue. Potential topics include but are not limited to the cryptographic approach for privacy-preserving data transmission and data analysis; private information collection, storage, aggregation, retrieval, and transmission; security analysis; digital watermarking; forensics; information hiding; security and privacy in machine learning; security and privacy issues in the cloud service; security and privacy issues in IoT; and security and privacy in 5G applications. Please note that all submitted papers should be in the scope of the Symmetry journal.

Prof. Dr. Chia-Chen Lin
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G
  • security
  • privacy
  • cryptography
  • steganography
  • cloud service
  • IoT
  • 5G applications
  • IoT
  • forensics

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 12740 KiB  
Article
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack
by Kai Gao, Chin-Chen Chang and Chia-Chen Lin
Symmetry 2023, 15(1), 189; https://doi.org/10.3390/sym15010189 - 09 Jan 2023
Viewed by 1024
Abstract
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze [...] Read more.
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze the vulnerabilities of RDHEI based on BPCM encryption and then propose a cryptanalysis method based on the vector quantization (VQ) attack. Unlike the existing cryptanalysis method, our method does not require the help of a plaintext image instead of adopting the symmetric property between the original cover image and the encrypted cover image. To obtain the pixel-changing pattern of a block before and after co-modulation, the concept of a pixel difference block (PDB) is first defined. Then, the VQ technique is used to estimate the content of the ciphertext block. Finally, we propose a sequence recovery method to help obtain the final recovered image based on the premise that the generator is compromised. The experimental results demonstrate that when the block size is 4 × 4, our proposed cryptanalysis method can decrypt the contents of the ciphertext image well. The average similarity can exceed 75% when comparing the edge information of the estimated image and the original image. It is concluded from our study that the BPCM encryption algorithm is not robust enough. Full article
(This article belongs to the Special Issue Security and Privacy Challenges in 5G Networks)
Show Figures

Figure 1

Back to TopTop