Trustworthy Networking

A special issue of Network (ISSN 2673-8732).

Deadline for manuscript submissions: 30 September 2024 | Viewed by 1183

Special Issue Editor

Division of Wireless Communication and Radio Positioning, Department of Electrical and Computer Engineering, RPTU Kaiserslautern-Landau, Kaiserslautern, Germany
Interests: 5G/B5G/6G networks; timely and reliable communication; multi-access edge computing; network slicing; non-stationary signal processing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Empowered by the rapid development of communication, networking, and data science technologies over the past decade, especially with the Internet of Things (IoT), the fifth generation (5G) and beyond of mobile networks, artificial intelligence (AI), and data-driven applications have permeated into every corner of modern society. With the exploding volume of data traffic over telecommunication networks and the blooming diversity in the nature of such data, risks in data security and privacy are also dramatically increasing. Such risks typically include, but are not limited to, unauthorized exposure, misrepresentation, fabrication, and abuse of confidential user data. On the one hand, in the numerous data-driven services that have already been widely deployed, these attacks threaten the property, personal safety, and privacy of the users in a wide spectrum. On the other hand, the serious concerns raised by such threats hinder new data-driven solutions from being deployed, which significantly impairs the development and innovation of technology.

In response to this emerging challenge, trustworthiness is becoming an essential feature and key value indicator for future communication, networking, and multi-agent systems. As a complex application-layer feature, trust is established on top of the availability, integrity, confidentiality, authenticity, auditability, completeness, and timeliness of information. It therefore calls for a complete set of novel solutions in technological fields such as authentication, encryption, physical layer security, access control, and anomaly detection; as well as new technical–social measures in various perspectives such as standardization, legislation, regulation, and supervision. In this Special Issue, we solicit original papers including (but not limited to) the following areas:

  • Theories, architecture, and applications of trustworthy networking
  • Trust modeling, trust policies, and trust mechanisms
  • Network trust evaluation and measurement
  • Machine learning for network trust, security, and privacy
  • Blockchain and trustworthy networking
  • Trust, security, and privacy in machine learning and AI
  • Trust, security, and privacy in cloud computing and MEC
  • Trust, security, and privacy in IoT and sensor networks
  • Trust, security, and privacy in multi-agent systems
  • Trust, security, and privacy of digital twin in 6G
  • Trust, security, and privacy of wireless positioning
  • Trust, security, and privacy in social learning and social networks
  • End-to-end communication security, privacy, and trust
  • Cryptography and trustworthy networking
  • Incentive mechanisms of trust management
  • Physical layer security and trust 
  • Post-quantum cryptography
  • Regulation and standardization of security, privacy, and trust

Dr. Bin Han
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Network is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • trust
  • security
  • privacy
  • multi-agent system
  • social learning

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 1664 KiB  
Article
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach
by Jan Herbst, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps and Hans D. Schotten
Network 2024, 4(2), 133-149; https://doi.org/10.3390/network4020007 - 9 Apr 2024
Viewed by 487
Abstract
Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and correlation of physical and biological information. Along [...] Read more.
Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and correlation of physical and biological information. Along with the utilization and integration of these (sensitive) private and personal data, there are substantial requirements concerning security and privacy, as well as protection during processing and transmission. Contrary to the star topology frequently used in various standards, the overall concept of a novel low-data rate token-based WBAN framework is proposed. This work further comprises the evaluation of strategies for handling medical data with WBANs and emphasizes the importance and necessity of encryption and security strategies in the context of sensitive information. Furthermore, this work considers the recent advancements in Artificial Intelligence (AI), which are opening up opportunities for enhancing cyber resilience, but on the other hand, also new attack vectors. Moreover, the implications of targeted regulatory measures, such as the European AI Act, are considered. In contrast to, for instance, the proposed star network topologies of the IEEE 802.15.6 WBAN standard or the Technical Committee (TC) SmartBAN of the European Telecommunication Standards Institute (ETSI), the concept of a ring topology is proposed which concatenates information in the form of a ‘data train’ and thus results in faster and more efficient communication. Beyond that, the conductivity of human skin is included in the approach presented to incorporate a supplementary channel. This direct contact requirement not only fortifies the security of the system but also facilitates a reliable means of secure communication, pivotal in maintaining the integrity of sensitive health data. The work identifies different threat models associated with the WBAN system and evaluates potential data vulnerabilities and risks to maximize security. It highlights the crucial balance between security and efficiency in WBANs, using the token-based approach as a case study. Further, it sets a foundation for future healthcare technology advancements, aiming to ensure the secure and efficient integration of patient data. Full article
(This article belongs to the Special Issue Trustworthy Networking)
Show Figures

Figure 1

Back to TopTop