Security Mechanisms for Wireless Sensor Networks in Cyber-Physical Systems

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (15 December 2023) | Viewed by 1751

Special Issue Editors


E-Mail Website
Guest Editor
Department of Information Security and Communication Technology, Norwegian University of Science and Technology, N-2815 Gjøvik, Norway
Interests: cybersecurity; risk management; threat analysis; critical infrastructure protection; cyber physical systems security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Security and Communication Technology, Norwegian University of Science and Technology (NTNU), NO-2802 Gjovik, Norway
Interests: information and cyber security; intrusion detection; privacy; blockchain
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless sensor networks (WSN) are key components in cyber-physical system (CPS) infrastructures as they contribute to monitoring and controlling CPSs through sensors and actuators. As CPSs proliferate and increasingly interconnect and interact with other CPSs and with humans, the attack surface of composite and complex CPSs increases. WSNs in particular are susceptible to cyber-attacks, such as flooding and denial-of-service attacks. Therefore, selecting, designing, developing, implementing, and assessing the effectiveness of security mechanisms specific to WSNs within CPS environments become of paramount importance.

The main focus of this Special Issue is to investigate novel methodologies, theories, technologies, techniques, processes, and solutions for security mechanisms in WSNs in CPSs. In this Special Issue, original research articles and reviews that present innovative ideas, proofs of concept, use cases, and results from a variety of topics relevant to security mechanisms in WSNs in CPSs environments are welcome. Topics that may be addressed in submissions include but are not limited to:

  • Attacks on WSNs in CPS environments;
  • Risk management for WSNs in CPS environments;
  • Security controls for WSNs in CPS environments;
  • Lightweight protocols for WSN and CPS environments;
  • Secure communication in WSNs in CPS environments;
  • Security by design for WSN environments;
  • Vulnerability analysis of WSNs in CPS environments;
  • Threat intelligence for WSNs in CPS environments.

We look forward to receiving your contributions.

Dr. Georgios Kavallieratos
Dr. Georgios Spathoulas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • wireless sensor network security
  • cyber-physical systems
  • cybersecurity
  • critical infrastructure security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 2089 KiB  
Article
Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection
by Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho
Future Internet 2023, 15(9), 297; https://0-doi-org.brum.beds.ac.uk/10.3390/fi15090297 - 1 Sep 2023
Cited by 2 | Viewed by 1157
Abstract
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks pose significant risks, as they can render [...] Read more.
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks pose significant risks, as they can render websites and servers inaccessible to their intended users. Conventional intrusion detection methods encounter substantial challenges in effectively identifying and mitigating these attacks due to their widespread nature, intricate patterns, and computational complexities. However, by harnessing the power of deep learning-based techniques, our proposed dense channel-spatial attention model exhibits exceptional accuracy in detecting and classifying DoS and DDoS attacks. The successful implementation of our proposed framework addresses the challenges posed by imbalanced data and exhibits its potential for real-world applications. By leveraging the dense channel-spatial attention mechanism, our model can precisely identify and classify DoS and DDoS attacks, bolstering the cybersecurity defenses of websites and servers. The high accuracy rates achieved across different datasets reinforce the robustness of our approach, underscoring its efficacy in enhancing intrusion detection capabilities. As a result, our framework holds promise in bolstering cybersecurity measures in real-world scenarios, contributing to the ongoing efforts to safeguard against cyber threats in an increasingly interconnected digital landscape. Comparative analysis with current intrusion detection methods reveals the superior performance of our model. We achieved accuracy rates of 99.38%, 99.26%, and 99.43% for Bot-IoT, CICIDS2017, and UNSW_NB15 datasets, respectively. These remarkable results demonstrate the capability of our approach to accurately detect and classify various types of DoS and DDoS assaults. By leveraging the inherent strengths of deep learning, such as pattern recognition and feature extraction, our model effectively overcomes the limitations of traditional methods, enhancing the accuracy and efficiency of intrusion detection systems. Full article
Show Figures

Figure 1

Back to TopTop