Wireless Communication: Applications, Security and Reliability—2nd Edition

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 30 November 2024 | Viewed by 491

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electromagnetic Compatibility, Laboratory of Military Communication Institute–State Research Institute, Warszawska 22A St., 05-130 Zegrze Poludniowe, Poland
Interests: electromagnetic eavesdropping; TEMPEST; sensitive emission; protection of information; data acquisition; digital image and signal processing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Telecommunications and Teleinformatics Department, Wroclaw University of Technology, 50-370 Wroclaw, Poland
Interests: electromagnetic compatibility; electromagnetic disturbances; antennas and propagations; telecommunication systems; radiolocation; MIMO; wireless communication
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland
Interests: antenna theory and techniques; smart beamforming; reconfigurable antennas; radio over fiber techniques; materials characterization (including ferroelectric ceramic-polymers composites investigation up to subterahertz frequency)

Special Issue Information

Dear Colleagues,

Technology application in civilian and military applications is crucial to support peace enforcement around the world. The pace of technological advancement in commercial products is very fast; however, military procurement processes are characterized by an R&D phase prolonged by careful verification procedures and a long equipment operation cycle.

Sustaining the life of soldiers on the battlefield depends heavily on communication means, and the three main pillars of security, i.e., confidentiality, integrity and availability, as well as an additional aspect, the early detection of threats. The two fields of technology, i.e., military communications and security issues, obtain their inspiration from general scientific achievements; however, the application area poses additional challenges and requirements on the mechanisms and solutions. Military applications require an innovative approach, long life support and special consideration of means that support survival in the battlefield.

Wireless communications are widely used today, but new areas of implementation are still being discovered. New applications are possible as a result of progress in many fields of science and technology. Exchanging large amounts of vital data among multiple nodes simultaneously, in a dynamically changing environment, for example, between groups of moving vehicles, imposes strict requirements on latency, the reliability of information delivery and the capacity of the communication system.

Information security is a very important area of radio communication. TRANSEC and COMSEC mechanisms require pseudo-random sequence generators to perform encryption and hopping functions. This Special Issue presents one of the possible solutions based on Galois NLFSRs and multiple de Bruijn sequences.

All devices, to ensure a secure processing of information, should be safe in terms of immunity from electromagnetic disturbances. Such devices have to meet several EMC requirements, but immunity from electromagnetic fields is the most important, as it is connected with the possibilities of use of electromagnetic weapons, and the insufficient immunity of a device to such exposure can be the cause of many serious accidents threatening information security.

Today’s solutions in the area of broadly understood military security involve post-quantum cryptographic algorithms, efficient authentication schemes, vulnerabilities recognition and threat and attack detection, as well as failover, high availability and survivability.

This Special Issue is dedicated to the presentation of various issues that affect the extension of areas of wireless communication applications, its security and reliability. Particularly interesting are techniques supporting autonomous systems, wideband communication in different frequency bands, the efficient use of spectrum, channel sensing and acquisition, radio environment map construction techniques, the protection of information in the aspect of cryptography and the selection of test methods of new IT devices from the point of view of immunity from electromagnetic fields.

Taking this into account, we would like to invite you to propose novel research in the area of communications and security that can be efficiently applied in the military domain, which would be interesting to the wide audience of the prestigious journal Applied Sciences.

Prof. Dr. Ireneusz Kubiak
Prof. Dr. Tadeusz Wieckowski
Prof. Dr. Yevhen Yashchyshyn
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • wireless communication
    • frequency allocation and assignment
    • cognitive radio
    • radio environment map
    • spectrum monitoring
    • sensing
    • channel acquisition
    • wideband waveforms
    • RF propagation
    • vehicular communications
    • platooning
    • spatial interpolation
    • inverse distance weighing
    • kriging
    • 5G
    • hybrid FSO/RF systems
    • UOWC (underwater optical wireless communication)
    • optical transmission sources and detectors
    • reliability of radio communications
    • system availability
  • cryptography
    • cryptography
    • pseudo-random generators
    • cross-join method
  • cybersecurity
    • attack detection
    • graph analysis
    • attack graphs
    • risk assessment survivability
    • failover
    • high availability
    • efficient communications
    • AI
    • machine learning
    • post-quantum cryptography
    • SDN
    • NFV
    • cloud infrastructure
  • electromagnetic immunity
    • electromagnetic field
    • electromagnetic disturbance
    • techniques for measuring of electromagnetic immunity
    • immunity of IT devices on electromagnetic field
    • electromagnetic eavesdropping

Related Special Issue

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 14405 KiB  
Article
Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security
by Andrzej Firlej, Slawomir Musial and Ireneusz Kubiak
Appl. Sci. 2024, 14(13), 5854; https://doi.org/10.3390/app14135854 - 4 Jul 2024
Viewed by 378
Abstract
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by [...] Read more.
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by the need to bring the data carrier close to the system reader. Due to the possibility of transmitting sensitive data in this type of system, an important problem seems to be the electromagnetic security of the transmitted data between the cards (tags) and the reader and within the system. In most of the available research studies, the security of RFID systems comes down to the analysis of the effectiveness of encryption of transmitted data or testing the range of communication between the reader and the identifier. In this research, however, special attention is paid to the so-called electromagnetic information security without the analysis of cryptographic protection. In some cases (e.g., data retransmission), encryption may not be an effective method of securing data (because, e.g., encrypted data might be used to open and start a car with a keyless system). In addition, the research draws attention to the fact that the data from the identifier can be accessed not only from the identifier, but also from the control system (reader, wiring, controller, etc.) from which the data can be radiated (unintentionally) at a much greater distance than the communication range between the identifier and the reader. In order to determine the security of the transmitted data in the HF-band RFID systems, a number of tests were carried out with the use of specialized equipment. During the measurements, both the data carriers themselves (cards, key fobs, stickers, tags) and exemplary systems for reading data from the media (a writable card reader, a mobile phone with NFC function, and an extensive access control system) were tested. The experiments carried out made it possible to determine the safety of NFC and MIFARE systems during their use and only storage (e.g., the ability to read data from an identification card stored in a pocket). Full article
Show Figures

Figure 1

Back to TopTop