Applied Information Security and Cryptography

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (30 April 2023) | Viewed by 7990

Special Issue Editors


E-Mail Website1 Website2
Guest Editor
1. School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Yuseong-gu, Daejoen 34141, Korea
2. International Research Institute for Cyber Security (IRCS), Bundang-gu, Seongnam 13591, Korea
Interests: theory and practices of information security and cryptography; AI for security; post-quantum cryptography

E-Mail Website
Guest Editor
Technopreneur-Ship Centre, School of Computer Science and Engineering and Director of the Nanyang, Nanyang Technological University (NTU), Singapore 639798, Singapore
Interests: privacy-preserving deep learning; security; cryptography

Special Issue Information

Dear Colleagues,

Information security and cryptogaphy are of the utmost importance in order to provide confidentiality, integrity and availability in information technologies. This poses new challenges with the advancement of quantum computers and regarding Metabus and NFTs.

Therefore, in this Special Issue we intend to present new ideas and experimental results in the field of applied information security and cryptography, ranging from design to service, theory and practical use. 

Areas relevant to applied information security and cryptography include but are not limited to secure computation, novel cryptographic algorithms and protocols, application to new fields, privacy-preserving machine learning, deep learning for security and cryptography, secure smart devices, and secure industrial control systems, etc. Post-quantum cryptography which is inevitably necessary to achieve long-term security against emerging quantum attacks, techniques for security engineering in the context of distributed systems, and lightweight cryptography are also topics of interest.

This Special Issue will publish high-quality original research papers in the overlapping fields of:

  • Applied information security;
  • Privacy-preserving machine learning;
  • Applied cryptography;
  • Side-channel attacks;
  • Post-quantum cryptography;
  • AI for security;
  • Crypto-currency;
  • Blockchain.

Prof. Dr. Kwangjo Kim
Prof. Dr. Kwok-Yan Lam
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information security
  • computer security
  • IoT security
  • network security
  • smart devices and security
  • quantum security

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 2115 KiB  
Article
Fully Homomorphic Encryption with Optimal Key Generation Secure Group Communication in Internet of Things Environment
by Ashwag Albakri, Reem Alshahrani, Fares Alharbi and Saahira Banu Ahamed
Appl. Sci. 2023, 13(10), 6055; https://0-doi-org.brum.beds.ac.uk/10.3390/app13106055 - 15 May 2023
Cited by 2 | Viewed by 1375
Abstract
The Internet of Things or “IoT” determines the highly interconnected network of heterogeneous devices where each type of communication seems to be possible, even unauthorized. Consequently, the security requirement for these networks became crucial, while conventional Internet security protocol was identified as unusable [...] Read more.
The Internet of Things or “IoT” determines the highly interconnected network of heterogeneous devices where each type of communication seems to be possible, even unauthorized. Consequently, the security requirement for these networks became crucial, while conventional Internet security protocol was identified as unusable in these types of networks, especially because of some classes of IoT devices with constrained resources. Secure group communication (SGC) in the IoT environment is vital to ensure the confidentiality, integrity, and availability (CIA) of data swapped within a collection of IoT devices. Typically, IoT devices were resource-constrained with limited memory, processing, energy, and power, which makes SGC a difficult task. This article designs a Fully Homomorphic Encryption with Optimal Key Generation Secure Group Communication (FHEOKG-SGC) technique in the IoT environment. The presented FHEOKG-SGC technique mainly focuses on the encryption and routing of data securely in the IoT environment via group communication. To accomplish this, the presented FHEOKG-SGC technique initially designs an FHE-based encryption technique to secure the data in the IoT environment. Next, the keys in the FHE technique are chosen optimally using the sine cosine algorithm (SCA). At the same time, the plum tree algorithm (PTA) is applied for the identification of the routes in the IoT network. Finally, the FHEOKG-SGC technique employs a trust model to improve the secure communication process, and the key management center is used for optimal handling of the keys. The simulation analysis of the FHEOKG-SGC technique is tested using a series of experiments, and the outcomes are studied under various measures. An extensive comparative study highlighted the improvement of the FHEOKG-SGC algorithm over other recent approaches. Full article
(This article belongs to the Special Issue Applied Information Security and Cryptography)
Show Figures

Figure 1

16 pages, 1458 KiB  
Article
A Searchable Encryption with Forward/Backward Security and Constant Storage
by Suzhen Cao, Junjian Yan, Zixuan Fang and Caifen Wang
Appl. Sci. 2023, 13(4), 2181; https://0-doi-org.brum.beds.ac.uk/10.3390/app13042181 - 08 Feb 2023
Viewed by 1149
Abstract
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data. However, cloud servers with dynamically updatable data are vulnerable to information abuse and file injection attacks, and current public key-based dynamic searchable encryption algorithms [...] Read more.
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data. However, cloud servers with dynamically updatable data are vulnerable to information abuse and file injection attacks, and current public key-based dynamic searchable encryption algorithms are often complicated in construction and high in computational overhead, which is not efficient for practical applications. In addition, the client’s storage costs grow linearly with the number of keywords in the database, creating a new bottleneck when the size of the keyword set is large. To solve the above problems, a dynamic searchable encryption scheme that uses a double-layer structure, while satisfying forward and backward security, is proposed. The double-layer structure maintains a constant client-side storage cost while guaranteeing forward and backward security and further reduces the algorithm overhead by avoiding bilinear pairings in the encryption and decryption operations. The analysis results show that the scheme is more advantageous in terms of security and computational efficiency than the existing dynamic searchable encryption scheme under the public key cryptosystem. It is also suitable for the big data communication environment. Full article
(This article belongs to the Special Issue Applied Information Security and Cryptography)
Show Figures

Figure 1

26 pages, 1433 KiB  
Article
PriSign, A Privacy-Preserving Single Sign-On System for Cloud Environments
by Rui Shi, Yang Yang, Huiqin Xie, Huamin Feng, Guozhen Shi and Jianyi Zhang
Appl. Sci. 2023, 13(2), 727; https://0-doi-org.brum.beds.ac.uk/10.3390/app13020727 - 04 Jan 2023
Cited by 1 | Viewed by 1648
Abstract
Anonymous single sign-on systems allow users to use a single credential to access multiple services protected by verifiers without revealing their personal information, which is especially important due to privacy regulations such as GDPR. In this paper, we introduce a new strong privacy-preserving [...] Read more.
Anonymous single sign-on systems allow users to use a single credential to access multiple services protected by verifiers without revealing their personal information, which is especially important due to privacy regulations such as GDPR. In this paper, we introduce a new strong privacy-preserving single sign-on scheme, dubbed PriSign, based on our proposed attribute-based credential with traceability (ABCT), attribute-based credential with blindness (ABCB), and threshold inner-product functional encryption (TIPFE). Compared with the existing state-of-the-art solutions, PriSign presents three improvements: (1) users can obtain different types of tickets according to the attribute disclosure policies enforced by the ticket issuer to support fine-grained access control; (2) users can hide access tokens and designate a verifier for tokens according to a verifier’s policy jointly issued by multiple policymakers, meaning that non-designated verifiers cannot obtain any information about the tokens; (3) we innovatively use a threshold approach to issue policy keys online in order for verifiers to achieve proxy re-verification services in an unstable cloud environment. We implement PriSign and compare the performance with other ASSO systems in the personal laptop, and the results prove its practicability. Full article
(This article belongs to the Special Issue Applied Information Security and Cryptography)
Show Figures

Figure 1

28 pages, 6199 KiB  
Article
Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning
by F. Zahra, N. Z. Jhanjhi, N. A. Khan, Sarfraz Nawaz Brohi, Mehedi Masud and Sultan Aljahdali
Appl. Sci. 2022, 12(22), 11598; https://0-doi-org.brum.beds.ac.uk/10.3390/app122211598 - 15 Nov 2022
Cited by 3 | Viewed by 2975
Abstract
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been suggested for its application in other contexts, such as [...] Read more.
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been suggested for its application in other contexts, such as smart hospitals, etc. Although these networks offer efficient routing, the lack of active security features in RPL makes them vulnerable to attacks. The types of attacks include protocol-specific ones and those inherited by wireless sensor networks. They have been addressed by a number of different proposals, many of which have achieved substantial prominence. However, concurrent handling of both types of attacks is not considered while developing a machine-learning-based attack detection model. Therefore, the ProSenAD model is proposed for addressing the identified gap. Multiclass classification has been used to optimize the light gradient boosting machine model for the detection of protocol-specific rank attacks and sensor network-inherited wormhole attacks. The proposed model is evaluated in two different scenarios considering the number of attacks and the benchmarks for comparison in each scenario. The evaluation results demonstrate that the proposed model outperforms with respect to the metrics including accuracy, precision, recall, Cohen’s Kappa, cross entropy, and the Matthews correlation coefficient. Full article
(This article belongs to the Special Issue Applied Information Security and Cryptography)
Show Figures

Figure 1

Back to TopTop