Security, Privacy and Trustworthiness of Wireless Communications and Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 January 2021) | Viewed by 16116

Special Issue Editors


E-Mail Website
Guest Editor
Department of Convergence Security Engineering, Sungshin University, Seoul 02844, Korea
Interests: information security; communications and networks; IoT; security and privacy; machine learning; artificial intelligence
Special Issues, Collections and Topics in MDPI journals
Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
Interests: statistical signal processing; communication theory; cognitive radio; physical layer security; 5G systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electronics Engineering, Hankuk University of Foreign Studies, Yongin 17035, Republic of Korea
Interests: wireless security; machine learning; interference management; channel quantization; game theory; signal processing techniques in wireless communication systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The purpose of this Special Issue of Electronics is to present the new advances and challenges in security research and development for wireless communications and networks. Topics of interest include discoveries of emerging security issues and threats that are encountered during the system design and development of wireless communications and networks as well as new security countermeasures and design methodologies. Relevant topics include, but are not limited to, the following:

  • Threat and attack model in wireless communications and networks
  • Security risk analysis in wireless communications and networks
  • Security solutions in wireless communications and networks
  • Machine-learning-based security in wireless communications and networks
  • Security and trust of machine learning or artificial intelligence technologies in wireless communications and networks
  • Privacy-preserving technology in wireless communications and networks
  • Blockchain-based security solutions in wireless communications and networks
  • Authentication and access control in wireless communications and networks
  • Technologies for trustworthiness in wireless communications and networks
  • Secure PHY/MAC protocols in wireless communications and networks
  • Physical layer security in wireless communications and networks
  • Cross layer design for trust, security and privacy in wireless communications and networks

Prof. Dr. Il-Gu Lee
Prof. Dr. Heejung Yu
Prof. Dr. Jung Hoon Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security
  • privacy
  • trustworthiness
  • wireless communications
  • networks

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

19 pages, 645 KiB  
Article
A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
by Hana Rhim, Damien Sauveron, Ryma Abassi, Karim Tamine and Sihem Guemara
Electronics 2021, 10(11), 1244; https://doi.org/10.3390/electronics10111244 - 24 May 2021
Cited by 3 | Viewed by 1680
Abstract
Wireless sensor networks (WSNs) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use [...] Read more.
Wireless sensor networks (WSNs) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use of their resources. In this case, a subset of nodes, the cluster heads (CHs), is entrusted with transmitting messages from cluster nodes to the base station (BS). However, the existence of selfish or pollution attacker nodes in the network causes data transmission failure and damages the network availability and integrity. Mainly, when critical nodes like CH nodes misbehave by refusing to forward data to the BS, by modifying data in transit or by injecting polluted data, the whole network becomes defective. This paper presents a secure protocol against selfish and pollution attacker misbehavior in clustered WSNs, known as (SSP). It aims to thwart both selfish and pollution attacker misbehaviors, the former being a form of a Denial of Service (DoS) attack. In addition, it maintains a level of confidentiality against eavesdroppers. Based on a random linear network coding (NC) technique, the protocol uses pre-loaded matrices within sensor nodes to conceive a larger number of new packets from a set of initial data packets, thus creating data redundancy. Then, it transmits them through separate paths to the BS. Furthermore, it detects misbehaving nodes among CHs and executes a punishment mechanism using a control counter. The security analysis and simulation results demonstrate that the proposed solution is not only capable of preventing and detecting DoS attacks as well as pollution attacks, but can also maintain scalable and stable routing for large networks. The protocol means 100% of messages are successfully recovered and received at the BS when the percentage of lost packets is around 20%. Moreover, when the number of misbehaving nodes executing pollution attacks reaches a certain threshold, SSP scores a reception rate of correctly reconstructed messages equal to 100%. If the SSP protocol is not applied, the rate of reception of correctly reconstructed messages is reduced by 90% at the same case. Full article
Show Figures

Figure 1

14 pages, 6081 KiB  
Article
Fast Packet Inspection for End-To-End Encryption
by So-Yeon Kim, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae and Il-Gu Lee
Electronics 2020, 9(11), 1937; https://doi.org/10.3390/electronics9111937 - 17 Nov 2020
Cited by 4 | Viewed by 3227
Abstract
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the [...] Read more.
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes. Full article
Show Figures

Figure 1

21 pages, 1198 KiB  
Article
Avoiding the Privacy Paradox Using Preference-Based Segmentation: A Conjoint Analysis Approach
by Marija Kuzmanovic and Gordana Savic
Electronics 2020, 9(9), 1382; https://doi.org/10.3390/electronics9091382 - 27 Aug 2020
Cited by 6 | Viewed by 3020
Abstract
Personal privacy on online social networks (OSN) is becoming increasingly important. The collection and misuse of personal information can affect people’s behavior and can have a broader impact on civil society. The aim of this paper is to explore the privacy paradox phenomenon [...] Read more.
Personal privacy on online social networks (OSN) is becoming increasingly important. The collection and misuse of personal information can affect people’s behavior and can have a broader impact on civil society. The aim of this paper is to explore the privacy paradox phenomenon on OSNs that is reflected in the gap between OSN users’ privacy concerns and behavior and to introduce a new segmentation framework based on preference data from conjoint analysis. For the purpose of the study, an online survey on four dimensions of OSNs has been conducted. Conjoint analysis has been employed on collected data to reveal users’ preferences, followed by two-step cluster analysis for the preference-based segmentation. The characteristics of the resulting clusters were compared with self-reported behavior and privacy concerns, as well as the results of the Westin Privacy Segmentation approach. The results suggest that conjoint analysis can improve users’ segmentation and consequently provide better solutions for avoiding the gap between users’ concerns, attitudes, and behavior. Full article
Show Figures

Figure 1

30 pages, 451 KiB  
Article
Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things
by Zeeshan Ali Khan and Ubaid Abbasi
Electronics 2020, 9(3), 415; https://doi.org/10.3390/electronics9030415 - 29 Feb 2020
Cited by 16 | Viewed by 3589
Abstract
Internet of Things (IoT) networks consist of tiny devices with limited processing resources and restricted energy budget. These devices are connected to the world-wide web (www) using networking protocols. Considering their resource limitations, they are vulnerable to security attacks by numerous entities on [...] Read more.
Internet of Things (IoT) networks consist of tiny devices with limited processing resources and restricted energy budget. These devices are connected to the world-wide web (www) using networking protocols. Considering their resource limitations, they are vulnerable to security attacks by numerous entities on the Internet. The classical security solutions cannot be directly implemented on top of these devices for this reason. However, an Intrusion Detection System (IDS) is a classical way to protect these devices by using low-cost solutions. IDS monitors the network by introducing various metrics, and potential intruders are identified, which are quarantined by the firewall. One such metric is reputation management, which monitors the behavior of the IoT networks. However, this technique may still result in detection error that can be optimized by combining this solution with honeypots. Therefore, our aim is to add some honeypots in the network by distributing them homogeneously as well as randomly. These honeypots will team up with possible maliciously behaving nodes and will monitor their behavior. As per the simulation results, this technique reduces the error rate within the existing IDS for the IoT; however, it costs some extra energy. This trade-off between energy consumption and detection accuracy is studied by considering standard routing and MAC protocol for the IoT network. Full article
Show Figures

Figure 1

Review

Jump to: Research

24 pages, 1227 KiB  
Review
Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions
by Gaurav Pathak, Jairo Gutierrez and Saeed Ur Rehman
Electronics 2020, 9(8), 1195; https://doi.org/10.3390/electronics9081195 - 25 Jul 2020
Cited by 20 | Viewed by 3862
Abstract
The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally [...] Read more.
The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally useful for IoT applications. The nodes use energy-efficient mechanisms for long-range data transmission (10–20 km), lasting in hostile environments for years and making them suitable for IoT applications such as environmental monitoring, automated billing systems, smart homes, smart offices, and patient monitoring. However, LPWAN devices have minimal resources, which makes it challenging to provide promising security to devices and data in the network. In this paper, we discuss the security mechanisms used in current LPWAN technologies along with their vulnerabilities and possible attacks on them. A detailed literature review is conducted on existing solutions on the security of constrained IoT networks similar to LPWAN using different networking frameworks. The reviewed literature is then compared based on various network security measures addressed by them. In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed. Full article
Show Figures

Figure 1

Back to TopTop