Security management of 5G and IoT ecosystems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (30 April 2021) | Viewed by 9376

Special Issue Editors


E-Mail Website
Guest Editor
Foundation for Research and Technology – Hellas (FORTH), Institute of Computer Science, Vassilika Vouton, 70013 Heraklion, Greece
Interests: My research interests include information systems security, cyber-security training, Internet-of-Things (IoT), Cyber-Physical Systems (CPS), SDN/NFV, Big Data analysis, blockchaining and forensics, ambient intelligence and disaster mitigation planning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Electrical and Computer Engineering, Technical University of Crete, Akrotiri Campus, 731 00 Chania, Greece
Interests: systems and network security; security policy; privacy; high-speed networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Sphynx Analytics Ltd. 108, Nicosia Business Centre, 33 Neas Engomis, Nicosia 2409, Cyprus
Interests: security; dependability and sustainability challenges in next generation networking infrastructures; various privacy and trust concerns in Internet of Things (IoT); pertinent security management issues
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Nowadays, the world is faced with economic and societal challenges such as ageing of population, ensuring societal cohesion, and sustainable development. The introduction of digital technologies in economic and societal processes is key to address these challenges and, while fifth generation (5G) mobile communications are already upon us, the next steps in their evolution will be key in supporting this societal transformation while also leading to a fourth industrial revolution that will impact multiple sectors. 5G is expected to transform our lives and unleash enormous economic potential. There is now the opportunity to define and develop 5G networks technologies with long term and sustainable support of new and diverse connected devices and services, towards the realization of the pervasive computing vision.

Nevertheless, some important challenges and complexities will have to be addressed on the way towards the provision of pervasive mobile 5G services, such as: sustaining massively generated network traffic with heterogeneous requirements; providing networking infrastructures featuring end-to-end connectivity, security and resource self-configuration; enabling trusted information sharing between tenants and hosts systems, and, ultimately; enabling new services and applications (e.g., communications with smart vehicles, high-speed trains, drones, industrial robots). These present diverse and often-conflicting needs for high bandwidth, lower latency, better reliability, massive connection density and improved energy efficiency. Moreover, this increasing complexity of smart environments and the unprecedented levels of data sharing and cyber systems interoperability have also led to increasingly sophisticated, stealthy, targeted, and multi-faceted cyber-attacks. In light of the latter, the provision of effective management of the associated cyber security risks in organizations and enterprises is becoming even more important, due to the sheer complexity of cyber systems that need to be secured and the ever-increasing number and level of sophistication of cyber-attacks. The provision of effective and comprehensive security training in organizations and enterprises is becoming even more important due to the sheer complexity of cyber systems that need to be secured and the ever-increasing number and level of sophistication of cyber-attacks.

We invite submissions of full research and survey papers on topics related to cybersecurity.

Dr. George Hatzivasilis
Prof. Dr. Sotiris Ioannidis
Dr. Konstantinos Fysarakis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Security, privacy, dependability, and interoperability of 5G-enabled IoT environments
  • Smart Object Semantic interoperability techniques
  • Industrial Internet of Things and Critical infrastructures
  • IoT and 5G communication technologies and applications as enablers for a sustainable, Circular Economy
  • Self-Sovereign Identify management and Blockchaining
  • AI-driven defenses
  • System assurance verification and validation (V&V)
  • Cyber-ranges and security training
  • Smart device security
  • Digital forensics for modern IoT systems

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

28 pages, 2123 KiB  
Article
CYRA: A Model-Driven CYber Range Assurance Platform
by Michail Smyrlis, Iason Somarakis, George Spanoudakis, George Hatzivasilis and Sotiris Ioannidis
Appl. Sci. 2021, 11(11), 5165; https://doi.org/10.3390/app11115165 - 2 Jun 2021
Cited by 9 | Viewed by 4107
Abstract
Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for individuals and organisations. Cyber Range emerges as a [...] Read more.
Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for individuals and organisations. Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects. A Training Programme is considered adequate only if it can adapt to the scope of the attacks they cover and if the trainees apply the learning material to the operational system. Therefore, this study introduces the model-driven CYber Range Assurance platform (CYRA). The solution allows a trainee to be trained for known and new cyber-attacks by adapting to the continuously evolving threat landscape and examines if the trainees transfer the acquired knowledge to the working environment. Furthermore, this paper presents a use case on an operational backend ICT system, showing how the CYRA platform was utilised to increase the security posture of the organisation. Full article
(This article belongs to the Special Issue Security management of 5G and IoT ecosystems)
Show Figures

Figure 1

41 pages, 7111 KiB  
Article
Towards a Collection of Security and Privacy Patterns
by Manos Papoutsakis, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis and Konstantina Koloutsou
Appl. Sci. 2021, 11(4), 1396; https://doi.org/10.3390/app11041396 - 4 Feb 2021
Cited by 11 | Viewed by 3639
Abstract
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building [...] Read more.
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees. Full article
(This article belongs to the Special Issue Security management of 5G and IoT ecosystems)
Show Figures

Figure 1

Back to TopTop