Cryptography in Network Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 16 August 2024 | Viewed by 467

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, University of North Florida, Jacksonville, FL 32224, USA
Interests: cryptographic; computer security; energy-aware computing; algorithms

E-Mail Website
Guest Editor
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Interests: controller area networks; learning (artificial intelligence); security of data; vehicular ad hoc networks; Internet of Things; computer network security; convolutional neural nets; crack detection

Special Issue Information

Dear Colleagues,

Cryptography is the basic theory of network security and mainly provides security services such as confidentiality, integrity, and availability for information systems.

In actual cryptographic applications, common problems include key leaks, implementation loopholes in cryptographic algorithms and protocols, and privacy leaks. Particulrly in new environments such as the Internet of Things, the Industrial Internet, and the Internet of Vehicles, special research is needed to adapt the theory and technology of cryptography.

In this context, this  Special Issue on “Cryptography in Network Security” invites the submission of both original research articles and reviews. Research areas may include (but are not limited to) the following topics:

  • cryptographic algorithm design
  • applied cryptography
  • cryptographic protocol analysis
  • homomorphic cryptography
  • emerging cryptographic techniques
  • quantum cryptography
  • vulnerability mining and exploitation in cryptography applications
  • authentication and biometric security/privacy
  • blockchain security/privacy
  • Internet of Things, the Industrial Internet, and the Internet of Vehicles security/privacy
  • distributed security and consensus protocols
  • security/privacy of systems based on ML and AI

We look forward to receiving your contributions.

Dr. Swapnoneel Roy
Dr. Guosheng Xu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic algorithm
  • applied cryptography
  • cryptographic protocol analysis
  • privacy

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 993 KiB  
Article
A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles
by Jihu Zheng, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu and Rui Fang
Electronics 2024, 13(10), 1939; https://doi.org/10.3390/electronics13101939 - 15 May 2024
Viewed by 279
Abstract
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue [...] Read more.
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue vehicle operators acting within a valid period can achieve mutual authentication from a designated processor, while access for mismatched, revoked, or expired users is denied. However, the current alternatives fail to ensure session key forward secrecy, entities’ mutual authentication, and user anonymity, thereby compromising users’ privacy and the security of communications. Moreover, executing too many time-consuming operations on vehicles’ resource-constrained devices inevitably degrades the performance of the authentication protocol. Balancing security and performance in the design of an authentication protocol with access control presents a significant challenge. To address this, a more efficient and robust authentication with access control has been designed. The proposed protocol ensures user anonymity through dynamic pseudonym allocation, achieves forward secrecy by excluding the long-term key from session key generation, and obtains mutual authentication by verifying the integrity of the messages exchanged. According to the security and performance analysis, it is demonstrated that the proposal is a robust, efficient, and cost-effective solution. In particular, the proposal can reduce the computational overhead by 66% compared to recent alternatives. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Back to TopTop