Special Issues
Table of Content

Emerging Trends in Cyber Security for Communication Networks

Submission Deadline: 30 January 2021 (closed) View: 140

Guest Editors

Prof. Srinath Doss, Botho University, Botswana.
Prof. Suseendran. G, Vels University, India.
Prof. Noor Zaman Jhanjhi, Taylors University, Malaysia.
Prof. Pushpita Chatterjee, Old Dominion University, USA.
Prof. Muhammad Nabi Talib, PNG University of technology, Papua New Guinea.

Summary

This Special Session focuses on the most recent advancement in interdisciplinary research areas encompassing advances in cyber security areas including network security, cryptography, cyber security, security protocols, wireless networks, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms. The landscape of cyber security continues to change rapidly, with new threats and attack paths that seemingly appear almost daily. At the same time, advances on the technology side have accelerated. In particular, the Internet of Things (IoT) and miniature cyber-physical systems are bringing information security concerns to every aspect of life. This Special Issue will solicit papers on various disciplines of Cyber Security for IoT and Communication networks.


Keywords

Full length original and unpublished research papers based on theoretical or experimental contributions related to the below mentioned tracks are invited for submission in this special session but are not limited to:
• Secure and resilient communication and control architectures
• Secure smart metering
• Cryptography, key management, authorization and access control
• Security threat and vulnerability assessment and measurement
• Cyber-physical security information and event management
• Trust and privacy
• Security design and verification tools
• Simulation and performance analysis of security operations and services
• Network and cyber security
• Secure and resilient communication and control architectures
• Secure smart metering
• IoT Applications
• Sensing Techniques
• Communication Techniques
• Middleware Techniques
• Data Analysis Techniques

Published Papers


  • Open Access

    ARTICLE

    OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing

    Tae Woo Kim, Yi Pan, Jong Hyuk Park
    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1035-1049, 2022, DOI:10.32604/cmc.2022.015546
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract In the current era, anyone can freely access the Internet thanks to the development of information and communication technology. The cloud is attracting attention due to its ability to meet continuous user demands for resources. Additionally, Cloud is effective for systems with large data flow such as the Internet of Things (IoT) systems and Smart Cities. Nonetheless, the use of traditional networking technology in the cloud causes network traffic overload and network security problems. Therefore, the cloud requires efficient networking technology to solve the existing challenges. In this paper, we propose one-time password-based software-defined cloud… More >

  • Open Access

    ARTICLE

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    Tariq Mahmood Butt, Rabia Riaz, Chinmay Chakraborty, Sanam Shahla Rizvi, Anand Paul
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1877-1898, 2021, DOI:10.32604/cmc.2021.014966
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks.… More >

  • Open Access

    ARTICLE

    Remote Health Monitoring Using IoT-Based Smart Wireless Body Area Network

    Farhan Aadil, Bilal Mehmood, Najam Ul Hasan, Sangsoon Lim, Sadia Ejaz, Noor Zaman
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2499-2513, 2021, DOI:10.32604/cmc.2021.014647
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract A wireless body area network (WBAN) consists of tiny health-monitoring sensors implanted in or placed on the human body. These sensors are used to collect and communicate human medical and physiological data and represent a subset of the Internet of Things (IoT) systems. WBANs are connected to medical servers that monitor patients’ health. This type of network can protect critical patients’ lives due to the ability to monitor patients’ health continuously and remotely. The inter-WBAN communication provides a dynamic environment for patients allowing them to move freely. However, during patient movement, the WBAN patient nodes… More >

  • Open Access

    ARTICLE

    LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

    Rabie A. Ramadan, Bassam W. Aboshosha, Kusum Yadav, Ibrahim M. Alseadoon, Munawar J. Kashout, Mohamed Elhoseny
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.015519
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms… More >

  • Open Access

    ARTICLE

    Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform

    Mohammed Alshehri
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 917-931, 2021, DOI:10.32604/cmc.2021.014848
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly,… More >

  • Open Access

    ARTICLE

    Load Balancing Algorithm for Migrating Switches in Software-Defined Vehicular Networks

    Himanshi Babbar, Shalli Rani, Mehedi Masud, Sahil Verma, Divya Anand, Nz Jhanjhi
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1301-1316, 2021, DOI:10.32604/cmc.2021.014627
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract In Software-Defined Networks (SDN), the divergence of the control interface from the data plane provides a unique platform to develop a programmable and flexible network. A single controller, due to heavy load traffic triggered by different intelligent devices can not handle due to it’s restricted capability. To manage this, it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness. The flow of data through the multiple controllers also varies, resulting in an unequal distribution of load between different controllers. One major drawback of the multiple controllers is… More >

Share Link