Advances in Security of Cyber-Physical Systems

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708). This special issue belongs to the section "Network Security and Privacy".

Deadline for manuscript submissions: closed (6 June 2023) | Viewed by 1856

Special Issue Editors


E-Mail Website
Guest Editor
Computer Science Department, School of Technology and Management, Computer Science and Communications Research Centre, Polytechnic of Leiria, Campus 2, Morro do Lena-Alto do Vieiro, Apartado 4163, 2411-901 Leiria, Portugal
Interests: Internet of Things; SMART IoT Ecosystems; Internet of Unmanned Vehicles; Industry 4.0; next-generation networks and services and ambient assisted living
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Computer Science Department, School of Technology and Management, Computer Science and Communications Research Centre, Polytechnic of Leiria, Campus 2, Morro do Lena-Alto do Vieiro, Apartado 4163, 2411-901 Leiria, Portugal
Interests: wireless sensor networks; IoT-based sensor networks; smart and intelligent detection; sensor network reliability; sensor network security

Special Issue Information

Dear Colleagues,

Cyber–physical systems (CPSs) are complex, engineered systems that integrate, interact and share data between physical and cyber environments. Their operations include monitoring, coordinating and controlling objects and structures in physical environments in real time. These systems are applied in various critical infrastructure domains, such as the smart grid, smart transportation, smart buildings, smart healthcare and industry 4.0. Due to their interconnected nature, CPSs are vulnerable to cyberattacks, which can lead to physical damage and disruptions. Therefore, it is crucial that CPSs are designed, implemented, operated and maintained with security in mind to ensure the reliable and secure operation of critical infrastructure.

This Special Issue aims to provide a forum for researchers and practitioners to share their latest findings and advances in this rapidly evolving field from various perspectives, including but not limited to:

  • CPS security architectures;
  • CPS security frameworks;
  • CPS safety and security integration;
  • CPS security protocols;
  • CPS security of components (sensors, actuators and controllers);
  • CPS security networks, communication and storage;
  • CPS security of services and mechanisms;
  • CPS resilience to cyberattacks;
  • CPS vulnerability analysis;
  • CPS threat modeling;
  • CPS intrusion detection, prevention and response;
  • CPS anomaly detection with machine learning techniques;
  • blockchain-based CPSs for security and privacy;
  • CPS and digital twin security requirements;
  • CPS forensics;
  • CPS authentication mechanisms and access controls;
  • CPS security case studies;
  • CPS security testing and validation;
  • CPS security applications (e.g., smart grid, buildings, automotives, transport, healthcare, industry, among others).

Prof. Dr. António Manuel De Jesus Pereira
Dr. Frazão Luís
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 3763 KiB  
Article
Extraction of Hidden Authentication Factors from Possessive Information
by Nilobon Nanglae, Bello Musa Yakubu and Pattarasinee Bhattarakosol
J. Sens. Actuator Netw. 2023, 12(4), 62; https://doi.org/10.3390/jsan12040062 - 11 Aug 2023
Viewed by 1482
Abstract
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones [...] Read more.
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution. Full article
(This article belongs to the Special Issue Advances in Security of Cyber-Physical Systems)
Show Figures

Figure 1

Back to TopTop