Security Requirements and Challenges of Distributed Intelligent Devices and Applications
A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".
Deadline for manuscript submissions: 31 December 2024 | Viewed by 2689
Special Issue Editors
Interests: IoT security; physical layer security
Interests: IoT security; privacy protection; big data security; secure deep learning
Special Issues, Collections and Topics in MDPI journals
Interests: zero-knowledge proofs; zkSNARK; recursive SNARK
Special Issue Information
Dear Colleagues,
Distributed and centralized resources exhibit symmetric and asymmetric characteristics. Distributed resource scenarios are wide-ranging, but there is a lack of security protection in the whole process of distributed resource aggregation and centralized regulation. Therefore, we encourage the submission of contributions in areas such as access authentication, data security or device vulnerabilities.
Dr. Yu Jiang
Prof. Dr. Jinbo Xiong
Dr. Shang Gao
Dr. Yuexiu Xing
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- distributed device security
- physical security of intelligent devices
- power terminal security
- device vulnerabilities
- device data security
- secure machine learning technique for data analysis
- access authentication for distributed device
- multi-agent devices security
- new security challenges in distributed devices
Planned Papers
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Title: 3C-Authentication: A Cross-Domain, Certificateless, and Consortium Blockchain Based Authentication Method for V2G Networks in Smart Grid
Authors: Qianhao Miao, Yinan Zhong, Yanjiao Chen
Affiliation: Zhejiang University
Abstract: As an important component of the smart grid, Vehicle-to-Grid (V2G) networks can deliver diverse auxiliary services and enhance the overall resilience of electrical power systems. However, V2G networks face two main challenges due to a large number of devices that connect to it. First, V2G networks suffer from serious security threats, such as doubtful authenticity and privacy leakage. Second, the efficiency will decrease significantly due to the massive requirements of authentication. To tackle these problems, this paper proposes a cross-domain authentication scheme for V2G networks based on consortium blockchain and certificateless signature technology. Featuring decentralized, open, and transparent transactions that cannot be tampered with, this scheme achieves good performance on both security and efficiency, which proves to be suitable for V2G scenarios in the smart grid.
Title: DF-TDNN: A TDNN Based Device Fingerprint Extraction Method Using Behavior Data
Authors: Yinan Zhong, Wenyuan Xu
Affiliation: Zhejiang University
Abstract: The past few years have witnessed a wider adoption of Internet of Things (IoT) devices. Since IoT devices are usually deployed in open and uncertain environment, device authentication is of great importance. However, traditional device fingerprint (DF) extraction methods have several disadvantages. First, existing DF extraction methods need private information of devices to compute DF, which puts the privacy of devices at steak. Second, the manually designing features-based methods suffer from poor performance. To tackle these limitations, we propose a Time Delay Neural Network (TDNN) based DF extraction method, named DF-TDNN, which utilizes behavior data in the network traffic pcap file to generate DF. It is verified by simulation that our method achieves better performance while protecting the privacy of the device.