Security, Privacy and Trust in the Next Generation Distributed Systems and Networks

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (30 November 2020) | Viewed by 7924

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Information Technology and Communication Sciences, Tampere University, Tampere‎, Finland
Interests: wireless communications; information security; authentication; distributed systems; blockchain; resource-constrained devices; wearable technology
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics, Alexander Technological Educational Institute of Thessaloniki (ATEITHE) International Hellenic University, ‎Thessaloniki, Greece
Interests: standardization; Internet of Things; Industry 4.0

E-Mail Website
Guest Editor
Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89100 Reggio Calabria, Italy
Interests: 5G; D2D; MTC/M2M; Internet of Things
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A growing number of devices followed by new services and architectures is paving the way towards novel distributed paradigms. From the perspective of information security, the next digital revolution would face several challenges due to unavoidable growth in the complexity of systems. To date, conventional security approaches tend to be limited when applied to decentralized architectures, mainly due to the lack of constantly present trusted authorities or coordination nodes. The cooperation between distributed systems as well as their symbiosis with the conventional centralized ones are the main focus of this Special Issue.

The objective of this Special Issue is to highlight the innovative developments, breakthrough technologies, and challenges related to next-generation systems and communication networks security. We are soliciting original contributions that have not been published and are not currently under consideration by any other journals. Particular emphasis is placed on radically new concepts related to the distributed systems operation. For this Special Issue, we invite regular papers, short letters, and reviews while encouraging authors to submit multimedia materials and/or open datasets, if applicable.

The topics of interest include, but not limited to the following:

  • 6G networks security aspects
  • Advanced authentication strategies
  • Attacks on distributed systems
  • Cloud, edge, and fog systems security
  • Communication systems security
  • Data privacy assurance aspects
  • Device-to-Device (D2D) security
  • Distributed Ledger Technology operation aspects
  • Distributed systems security for Public Protection and Disaster Relief (PPDR) scenarios
  • Enablers for MTC secure operation
  • New consensus algorithms for blockchain
  • New emerging architectures for security and privacy in IoT applications
  • Open issues and trends in blockchain-based systems
  • Peer-to-Peer (P2P) systems security
  • PHY-layer attacks on 5G New Radio (5G NR)
  • Prototypes of the distributed systems and related performance evaluation
  • SDN, NFV, Network Slicing security aspects
  • State-of-the-art and new security concepts and protocols for distributed systems
  • Systems vulnerability analysis and penetration testing
  • Wearable devices security

Dr. Aleksandr Ometov
Dr. Periklis Chatzimisios
Dr. Giuseppe Araniti
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

distributed systems security; 6G security; distributed ledger security; blockchain; communication systems security; distributed trust; distributed privacy; cloud, edge, and fog security; SDN/NFV security; attacks on distributed systems; security protocols; wearables security.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Other

15 pages, 4076 KiB  
Article
Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
by Oleg Evsutin and Kristina Dzhanashia
Cryptography 2020, 4(4), 35; https://0-doi-org.brum.beds.ac.uk/10.3390/cryptography4040035 - 06 Dec 2020
Cited by 2 | Viewed by 3514
Abstract
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect confidential information. [...] Read more.
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect confidential information. The presented algorithm makes use of the Chinese remainder theorem and adaptive embedding to achieve good imperceptibility along with the possibility of hiding a decent amount of confidential information. The algorithm is evaluated via computing experiments and evaluation results, as well as comparison with similar works, demonstrate good imperceptibility qualities of the proposed scheme. Full article
Show Figures

Figure 1

Other

Jump to: Research

11 pages, 734 KiB  
Letter
On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
by Sergey Bezzateev, Vadim Davydov and Aleksandr Ometov
Cryptography 2020, 4(4), 34; https://0-doi-org.brum.beds.ac.uk/10.3390/cryptography4040034 - 01 Dec 2020
Cited by 7 | Viewed by 3454
Abstract
Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based [...] Read more.
Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide the required levels of flexibility and pro-activity of the access procedures, thus, the concept of threshold-based multi-factor authentication (MFA) was introduced, in which some of the factors may be missing, but the access can still be granted. In turn, secret sharing is a crucial component of the MFA systems, with Shamir’s schema being the most widely known one historically and based on Lagrange interpolation polynomial. Interestingly, the older Newtonian approach to the same problem is almost left without attention. At the same time, it means that the coefficients of the existing secret polynomial do not need to be re-calculated while adding a new factor. Therefore, this paper investigates this known property of Newton’s interpolation formula, illustrating that, in specific MFA cases, the whole system may become more flexible and scalable, which is essential for future authentication systems. Full article
Back to TopTop