sensors-logo

Journal Browser

Journal Browser

Data Protection and Privacy in Industry 4.0 Era

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 30 June 2024 | Viewed by 1255

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics and Telecommunications, University of Ioannina, 45110 Ioannina, Greece
Interests: security; privacy; VR; AI; data structures; machine learning; industry 4.0
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Industrial Systems Institute, 26504 Athena, Greece
Interests: cybersecurity; incident response; data security; intrusion detection and malware analysis social media account
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics & Telecommunications, University of Ioannina, 45110 Ioannina, Greece
Interests: system cryptanalysis; system security; trust management; pseudorandom generators; algorithm engineering; number theory; wireless sensor networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Industry 4.0 includes many technological aspects that have led to an integrated digital manufacturing environment. The thoroughly interconnected ecosystem of Industry 4.0 has to meet many security challenges and threats for each component. Preserving security plays a crucial role in Industry 4.0, and it is vital for its existence; the key issue is how to ensure the confidentiality, integrity, and availability of the information shared among the Industry 4.0 components.

In addition to this, the significant and rapid inclusion of the Internet of Things (IoT) in our daily lives, together with the rapidly increasing number of cyber security incidents, further stress the need to strengthen cyber resilience and preserving users’ privacy for protecting the information of individuals from exposure in the IoT environment. The large attack surface in terms of connected devices and the complex processes involved in the IoT ecosystem can lead to more sophisticated physical attacks on IoT systems.

With such a wide attack surface, these innovative and emerging infrastructures and applications based on IoT can effectively serve their purpose only if privacy and security challenges are addressed.

This Special Issue aims to solicit high-quality research articles addressing key challenges and state-of-the-art solutions for security and privacy issues related to Industry 4.0 technologies and applications.

Prof. Dr. Chrysostomos Stylios
Dr. Kyriakos Stefanidis
Dr. Vasiliki Liagkou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity and privacy in industrial environments
  • security in cyber–physical environments
  • cryptography in I4.0
  • security and privacy in industrial control systems
  • IoT security and privacy
  • IoT system and network security
  • privacy protection and privacy-by-design
  • blockchains and smart contracts for IoT
  • trust issues in intelligent IoT devices
  • IoT threat detection and risk management
  • incident response and vulnerability management in IoT infrastructures
  • IoT privacy protection
  • secure data management and trading in industrial environments
  • privacy-enhancing technologies for ΙοΤ devices
  • IoT Identity management
  • artificial intelligence (AI)-based security
  • machine learning and data protection for I4.0
  • standardization activities for I4.0 security
  • quantum and post-quantum I4.0 cryptography
  • IoT side-channel attacks

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 1498 KiB  
Article
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
by Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou and Euripides Glavas
Sensors 2024, 24(5), 1676; https://doi.org/10.3390/s24051676 - 05 Mar 2024
Viewed by 665
Abstract
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently [...] Read more.
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender. The methodology implemented in this paper augments the authentication mechanisms within business emails by employing a multi-layered validation process, which includes a MAC address as an identity token, QR code generation, and the integration of timestamps as unique identifiers. The BEC-Defender algorithm was implemented and evaluated in a laboratory environment, exhibiting promising results against BEC attacks by adding an extra layer of authentication. Full article
(This article belongs to the Special Issue Data Protection and Privacy in Industry 4.0 Era)
Show Figures

Figure 1

Back to TopTop