Special lssues
Table of Content

Innovative Security for the Next Generation Mobile Communication and Internet Systems

Submission Deadline: 01 March 2024 Submit to Special Issue

Guest Editors

Prof. Ilsun You, Kookmin University, South Korea.
Prof. Francesco Palmieri, University of Salerno, Italy.
Prof. Karl Anderson, Luleå University of Technology, Sweden.

Summary

Over the past two decades, mobile communication and internet technologies have experienced significant growth and have brought about a paradigm shift in our lives. However, this revolution has also opened the door to various security threats that must be addressed to ensure that mobile communication and internet systems (MCIS) remain secure and trustworthy. Furthermore, emerging technologies such as 5GB/6G networks, Generative AI, Quantum Computing, autonomous driving, and others, have introduced new and complex security challenges that require attention.

 

The purpose of this special issue is to bring together academic and industry experts to exchange ideas and explore novel ideas and new research directions for addressing these challenges.

 

We welcome high-quality papers that focus on various theories and practical applications related to cybersecurity in the next generation MCIS.


Keywords

- Vulnerabilities and security threats in MCIS
- Cryptography and security protocols for MCIS
- Cryptographic software and hardware optimization for MCIS
- Privacy and trust for MCIS
- Post-Quantum cryptography for MCIS
- Security architectures and designs for MCIS
- Deployment and automation of security management for MCIS
- IoT/CPS security for MCIS
- Machine learning and AI Security for MCIS
- Blockchain security for MCIS
- Intrusion detection and prevention for MCIS

Published Papers


  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee, Hanna Lee, Seong Chan Lee, Hyun Kwon
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s… More >

  • Open Access

    ARTICLE

    Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation

    Yuzheng Yang, Zhe Tu, Ying Liu, Huachun Zhou
    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3163-3184, 2023, DOI:10.32604/cmc.2023.043974
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract Currently, data security and privacy protection are becoming more and more important. Access control is a method of authorization for users through predefined policies. Token-based access control (TBAC) enhances the manageability of authorization through the token. However, traditional access control policies lack the ability to dynamically adjust based on user access behavior. Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility. As a result, this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control. The TBAC system divides the access control process… More >

  • Open Access

    ARTICLE

    Electromyogram Based Personal Recognition Using Attention Mechanism for IoT Security

    Jin Su Kim, Sungbum Pan
    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1663-1678, 2023, DOI:10.32604/cmc.2023.043998
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract As Internet of Things (IoT) technology develops, integrating network functions into diverse equipment introduces new challenges, particularly in dealing with counterfeit issues. Over the past few decades, research efforts have focused on leveraging electromyogram (EMG) for personal recognition, aiming to address security concerns. However, obtaining consistent EMG signals from the same individual is inherently challenging, resulting in data irregularity issues and consequently decreasing the accuracy of personal recognition. Notably, conventional studies in EMG-based personal recognition have overlooked the issue of data irregularities. This paper proposes an innovative approach to personal recognition that combines a siamese fusion network with an auxiliary… More >

  • Open Access

    ARTICLE

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    Rui Qiao, Shi Dong
    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2505-2527, 2023, DOI:10.32604/cmc.2023.043476
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains. Therefore, this paper proposes a new consortium chain generation model, deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes, and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security. Furthermore, the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived. When either of the… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu, Qian He, Baokang Zhao, Biao Guo, Zhongyi Zhai
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    Malicious Traffic Compression and Classification Technique for Secure Internet of Things

    Yu-Rim Lee, Na-Eun Park, Seo-Yi Kim, Il-Gu Lee
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3465-3482, 2023, DOI:10.32604/cmc.2023.041196
    (This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract With the introduction of 5G technology, the application of Internet of Things (IoT) devices is expanding to various industrial fields. However, introducing a robust, lightweight, low-cost, and low-power security solution to the IoT environment is challenging. Therefore, this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment. The first method, compressed sensing and learning (CSL), compresses an event log in a bitmap format to quickly detect attacks. Then, the attack log is detected using a machine-learning classification model. The second method, precise re-learning after CSL (Ra-CSL), comprises a… More >

Share Link