Cybersecurity for Wireless Networking

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (31 December 2020) | Viewed by 32520

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science and Informatics, Cardiff University, Queen's Buildings, 5 The Parade, Newport Road, Cardiff CF24 3AA, UK
Interests: cyber security; cellular communication; human-centric security; Internet of Things; smart grid security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, University of Sheffield, Sheffield S1 4DP, UK
Interests: cyber security; smart grid security; wireless sensor networks and IoT security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Illinois at Singapore Pte Ltd., Advanced Digital Sciences Center, Singapore, Singapore
Interests: cyber-physical systems security; smart grid; privacy
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Today’s connected world is full of internet-connected devices. These devices often talk to each other with or without human involvement. With a rapid increase in the number of these devices, it is paramount to implement security and privacy solutions to minimize their attack against potential exploits. Internet-connected devices also often collect personal information, compromise communicated or stored data, and steal identities over insecure wireless networks. Hardware- and/or software-based solutions help in securing wireless networks against advanced cyberattacks. The main aim of this Special Issue is to report on recent high-quality research that addresses the key issues with novel and state-of-the-art solutions that could provide the right level of security to wireless networking. Topics of interest include but are not limited to the following:

  • Authentication techniques for IoT and sensor networks;
  • Access control techniques for IoT and sensor networks;
  • Techniques for securing software-defined networking;
  • Cloud-computing based techniques for secure networking;
  • Identity and data privacy in IoT and sensor networks;
  • Techniques for securing industrial control systems infrastructure;
  • Techniques for securing RFID based systems;
  • AI/ML-driven techniques for securing IoT and sensor networks.

Dr. Neetesh Saxena 
Dr. Prosanta Gope
Dr. Daisuke Mashima
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at mdpi.longhoe.net by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cyber security
  • IoT networks
  • Wireless sensor networks
  • Cloud security
  • Industrial control systems

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 650 KiB  
Article
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
by Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim and Muhammad Akmal Chaudhary
Electronics 2021, 10(7), 790; https://doi.org/10.3390/electronics10070790 - 26 Mar 2021
Cited by 13 | Viewed by 2346
Abstract
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service [...] Read more.
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service support (QoS). Healthcare service providers host multi-servers to ensure seamless services are provided to the end-users. By supporting a multi-server environment, healthcare medical sensors produce many data transmitted via servers, which is impossible in a single-server architecture. To ensure data security, secure online communication must be considered since the transmitted data are sensitive. Hence, the adversary may try to interrupt the transmission and drop or modify the message. Many researchers have proposed an authentication scheme to secure the data, but the schemes are vulnerable to specific attacks (modification attacks, replay attacks, server spoofing attacks, Man-in-the middle (MiTM) attacks, etc.). However, the absence of an authentication scheme that supports a multi-server security in such a comprehensive development in a distributed server is still an issue. In this paper, a secure authentication scheme using wireless medical sensor networks for a multi-server environment is proposed (Cross-SN). The scheme is implemented with a smart card, password, and user identity. Elliptic curve cryptography is utilized in the scheme, and Burrows–Abadi–Needham (BAN) logic is utilized to secure mutual authentication and to analyse the proposed scheme’s security. It offers adequate protection against replies, impersonation, and privileged insider attacks and secure communication in multi-server parties that communicate with each other. Full article
(This article belongs to the Special Issue Cybersecurity for Wireless Networking)
Show Figures

Figure 1

23 pages, 1280 KiB  
Article
Optimized Authentication System with High Security and Privacy
by Uttam Sharma, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena and Robin Singh Bhadoria
Electronics 2021, 10(4), 458; https://doi.org/10.3390/electronics10040458 - 13 Feb 2021
Cited by 11 | Viewed by 2669
Abstract
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database [...] Read more.
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique. Full article
(This article belongs to the Special Issue Cybersecurity for Wireless Networking)
Show Figures

Figure 1

28 pages, 6259 KiB  
Article
Counteracting UDP Flooding Attacks in SDN
by Yung-Hao Tung, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena and Chia-Mu Yu
Electronics 2020, 9(8), 1239; https://doi.org/10.3390/electronics9081239 - 1 Aug 2020
Cited by 5 | Viewed by 4151
Abstract
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In [...] Read more.
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time. Full article
(This article belongs to the Special Issue Cybersecurity for Wireless Networking)
Show Figures

Figure 1

Review

Jump to: Research

29 pages, 295 KiB  
Review
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
by Neetesh Saxena, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo and Pete Burnap
Electronics 2020, 9(9), 1460; https://doi.org/10.3390/electronics9091460 - 7 Sep 2020
Cited by 39 | Viewed by 22368
Abstract
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges [...] Read more.
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation’s critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed. Full article
(This article belongs to the Special Issue Cybersecurity for Wireless Networking)
Back to TopTop