Special Issues
Table of Content

Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs

Submission Deadline: 30 June 2021 (closed) View: 182

Guest Editors

Dr. Korhan Cengiz, Trakya University, Turkey.
Dr. Sedat Akleylek, Ondokuz Mayis University, Turkey.
Dr. Jaroslav Frnda, University of Zilina, Slovakia.

Summary

Nowadays, cyber threats are getting more and more complex. The impact and consequences of these threats are not perceptible on the protocol stack as they do not induce network behavior that seems to be explicitly malevolent. At the same time, developments on the technology side have accelerated. In particular, the Internet of Things (IoT), Narrow Band IoT (NB-IoT), Software Defined Networking and novel cyber-physical techniques are bringing information security concerns to every aspect of life. Therefore, the editors of this special issue are looking forward to recent advances in the related research, not limited to the following topics, providing a platform for researchers from both academia and industry to exchange their innovative ideas, theories, and applications.

 

Topics of Interest include, but are not limited to:

• Secure wireless communication protocols

• Secure physical layer solutions

• Cryptography, key management and authorization in IoT

• Secure information fusion and processing

• Trust and privacy software solutions for SDN architectures

• Authentication and verification tools for IoT Environments

• Simulation and performance analysis of secure novel protocols and algorithms

• Secure Sensing Techniques for WSNs and Ad-hoc networks

• Secure Data Analysis Techniques

• Security in 5G Networks

• Secure Solutions for IoT Based Health Care Systems

• Security in Narrow Band IoT Systems (NB-IoT)


Keywords

Security, Cyber Security, IoT, SDN and Wireless Communications

Published Papers


  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash, Kishore Balasubramanian, Rossilawati Sulaiman, Mohammad Kamrul Hasan, B. D. Parameshachari, Celestine Iwendi
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269
    (This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)
    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient… More >

  • Open Access

    ARTICLE

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali, Mohd Yamani Idna Idris, Jaroslav Frnda, Mohamad Nizam Bin Ayub, Roobaea Alroobaea, Fahad Almansour, Nura Modi Shagari, Insaf Ullah, Ihsan Ali
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800
    (This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)
    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In… More >

  • Open Access

    ARTICLE

    Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System

    S. Zulaikha Beevi, Abdullah Alabdulatif
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4107-4122, 2022, DOI:10.32604/cmc.2022.020292
    (This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)
    Abstract The wireless sensor network (WSN) is a growing sector in the network domain. By implementing it many industries developed smart task for different purposes. Sensor nodes interact with each other and this interaction technique are handled by different routing protocol. Extending the life of the network in WSN is a challenging issue because energy in sensor nodes are quickly drained. So the overall performance of WSN are degraded by this limitation. To resolve this unreliable low power link, many researches have provided various routing protocols to make the network as dependable and sustainable as possible.… More >

Share Link