Feature Papers on Computer and Electrical Engineering 2022

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708). This special issue belongs to the section "Network Services and Applications".

Deadline for manuscript submissions: closed (30 December 2022) | Viewed by 4879

Special Issue Editor


E-Mail Website
Guest Editor
College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China
Interests: Internet of Things; mobile computing; network security

Special Issue Information

Dear Colleagues,

Computer engineering programs were largely developed in engineering departments with a focus on electrical engineering. Today, the influence of computers has become more revolutionary than that of electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, driven by a natural and convenient interface between computers and electrical systems, as well as significant improvements in speed and efficiency.

The aim of this Special Issue is to publish outstanding papers presenting the latest research and scientific results related to computer and electrical engineering topics.

This Special Issue will also contain selected papers from The 2022 15th International Conference on Computer and Electrical Engineering (ICCEE 2022). The conference will be held at and sponsored by Shenzhen University, China, on 24–26 June 2022 (http://www.iccee.org/).

ICCEE was started in Phuket Island, Thailand, in the year 2008, and after the success of the first edition, it has been held annually in Dubai (UAE), Chengdu (China), Singapore, Hong Kong, Paris (France), Geneva (Switzerland), Paris (France), Barcelona (Spain), Edmonton (Canada), Tokyo (Japan), TU Delft, and the Netherlands. 

Prof. Dr. Chengwen Luo
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • electrical systems
  • electronic systems
  • Internet of Things
  • computer engineering

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

25 pages, 6086 KiB  
Article
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques
by Iman Qays Abduljaleel, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma and Vincent Omollo Nyangaresi
J. Sens. Actuator Netw. 2022, 11(4), 66; https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11040066 - 17 Oct 2022
Cited by 7 | Viewed by 2277
Abstract
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work [...] Read more.
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead. Full article
(This article belongs to the Special Issue Feature Papers on Computer and Electrical Engineering 2022)
Show Figures

Figure 1

16 pages, 1731 KiB  
Article
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks
by Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Iman Qays Abduljaleel and Abdulla J. Y. Aldarwish
J. Sens. Actuator Netw. 2022, 11(3), 55; https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11030055 - 19 Sep 2022
Cited by 3 | Viewed by 1875
Abstract
Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas [...] Read more.
Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas of these smart devices include military surveillance and healthcare monitoring. Since the data collected and transmitted to the users are highly sensitive and private, any leakages can have adverse effects. As such, strong entity authentication should be implemented before any access is granted in these wireless networks. Although numerous protocols have been developed for this purpose, the simultaneous attainment of robust security and privacy at low latencies, execution time and bandwidth remains a mirage. In this paper, a session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks is presented. This protocol amalgamates fuzzy extraction with extended Chebyshev chaotic maps to boost the integrity of the exchanged payload. The security analysis shows that this scheme offers entity anonymity and backward and forward key secrecy. In addition, it is demonstrated to be robust against secret ephemeral leakage, side-channeling, man-in-the-middle and impersonation attacks, among other security threats. From the performance perspective, the proposed scheme requires the least communication overheads and a relatively low execution time during the authentication process. Full article
(This article belongs to the Special Issue Feature Papers on Computer and Electrical Engineering 2022)
Show Figures

Figure 1

Back to TopTop