Cryptography in Network Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 16 August 2024 | Viewed by 1359

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, University of North Florida, Jacksonville, FL 32224, USA
Interests: cryptographic; computer security; energy-aware computing; algorithms

E-Mail Website
Guest Editor
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Interests: controller area networks; learning (artificial intelligence); security of data; vehicular ad hoc networks; Internet of Things; computer network security; convolutional neural nets; crack detection

Special Issue Information

Dear Colleagues,

Cryptography is the basic theory of network security and mainly provides security services such as confidentiality, integrity, and availability for information systems.

In actual cryptographic applications, common problems include key leaks, implementation loopholes in cryptographic algorithms and protocols, and privacy leaks. Particulrly in new environments such as the Internet of Things, the Industrial Internet, and the Internet of Vehicles, special research is needed to adapt the theory and technology of cryptography.

In this context, this  Special Issue on “Cryptography in Network Security” invites the submission of both original research articles and reviews. Research areas may include (but are not limited to) the following topics:

  • cryptographic algorithm design
  • applied cryptography
  • cryptographic protocol analysis
  • homomorphic cryptography
  • emerging cryptographic techniques
  • quantum cryptography
  • vulnerability mining and exploitation in cryptography applications
  • authentication and biometric security/privacy
  • blockchain security/privacy
  • Internet of Things, the Industrial Internet, and the Internet of Vehicles security/privacy
  • distributed security and consensus protocols
  • security/privacy of systems based on ML and AI

We look forward to receiving your contributions.

Dr. Swapnoneel Roy
Dr. Guosheng Xu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic algorithm
  • applied cryptography
  • cryptographic protocol analysis
  • privacy

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 553 KiB  
Article
Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks
by Yijing Li, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang and Xiangping Jing
Electronics 2024, 13(12), 2372; https://doi.org/10.3390/electronics13122372 - 17 Jun 2024
Viewed by 343
Abstract
With the rapid development of wireless communication technology, positioning technology, and modern smart devices, Internet of Vehicles (IoVs) smart vehicles have brought great convenience to human production and life. Meanwhile, privacy and security issues are becoming extremely serious, with serious consequences if sensitive [...] Read more.
With the rapid development of wireless communication technology, positioning technology, and modern smart devices, Internet of Vehicles (IoVs) smart vehicles have brought great convenience to human production and life. Meanwhile, privacy and security issues are becoming extremely serious, with serious consequences if sensitive data such as vehicle location and trip patterns are leaked. This paper focuses on the demands for vehicular network security, especially privacy protection and existing privacy-protection techniques, including common cryptography methods and cryptography-based advanced technologies. At the same time, this paper also analyzes the advantages and challenges of these technologies in protecting privacy and network security in the Internet of Vehicles, such as the challenges of computational resource requirements and security efficiency in the implementation process, as well as the complexity of realizing effective privacy protection in the interactions among different entities. Finally, this paper envisions the development of privacy-preserving application scenarios and the prospects for crypotography-based privacy-preserving technologies. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

20 pages, 991 KiB  
Article
A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles
by Jihu Zheng, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu and Rui Fang
Electronics 2024, 13(10), 1939; https://doi.org/10.3390/electronics13101939 - 15 May 2024
Viewed by 706
Abstract
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue [...] Read more.
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue vehicle operators acting within a valid period can achieve mutual authentication from a designated processor, while access for mismatched, revoked, or expired users is denied. However, the current alternatives fail to ensure session key forward secrecy, entities’ mutual authentication, and user anonymity, thereby compromising users’ privacy and the security of communications. Moreover, executing too many time-consuming operations on vehicles’ resource-constrained devices inevitably degrades the performance of the authentication protocol. Balancing security and performance in the design of an authentication protocol with access control presents a significant challenge. To address this, a more efficient and robust authentication with access control has been designed. The proposed protocol ensures user anonymity through dynamic pseudonym allocation, achieves forward secrecy by excluding the long-term key from session key generation, and obtains mutual authentication by verifying the integrity of the messages exchanged. According to the security and performance analysis, it is demonstrated that the proposal is a robust, efficient, and cost-effective solution. In particular, the proposal can reduce the computational overhead by 66% compared to recent alternatives. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

Back to TopTop