Special Issue "Emerging Trends in Cyber Security for Communication Networks"

Submission Deadline: 30 January 2021
Submit to Special Issue
Guest Editors
Prof. Srinath Doss, Botho University, Botswana.
Prof. Suseendran. G, Vels University, India.
Prof. Noor Zaman Jhanjhi, Taylors University, Malaysia.
Prof. Pushpita Chatterjee, Old Dominion University, USA.
Prof. Muhammad Nabi Talib, PNG University of technology, Papua New Guinea.


This Special Session focuses on the most recent advancement in interdisciplinary research areas encompassing advances in cyber security areas including network security, cryptography, cyber security, security protocols, wireless networks, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms. The landscape of cyber security continues to change rapidly, with new threats and attack paths that seemingly appear almost daily. At the same time, advances on the technology side have accelerated. In particular, the Internet of Things (IoT) and miniature cyber-physical systems are bringing information security concerns to every aspect of life. This Special Issue will solicit papers on various disciplines of Cyber Security for IoT and Communication networks.

Full length original and unpublished research papers based on theoretical or experimental contributions related to the below mentioned tracks are invited for submission in this special session but are not limited to:
• Secure and resilient communication and control architectures
• Secure smart metering
• Cryptography, key management, authorization and access control
• Security threat and vulnerability assessment and measurement
• Cyber-physical security information and event management
• Trust and privacy
• Security design and verification tools
• Simulation and performance analysis of security operations and services
• Network and cyber security
• Secure and resilient communication and control architectures
• Secure smart metering
• IoT Applications
• Sensing Techniques
• Communication Techniques
• Middleware Techniques
• Data Analysis Techniques

Published Papers
  • Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform
  • Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly, and that can be solved… More
  •   Views:54       Downloads:61        Download PDF

  • Load Balancing Algorithm for Migrating Switches in Software-Defined Vehicular Networks
  • Abstract In Software-Defined Networks (SDN), the divergence of the control interface from the data plane provides a unique platform to develop a programmable and flexible network. A single controller, due to heavy load traffic triggered by different intelligent devices can not handle due to it’s restricted capability. To manage this, it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness. The flow of data through the multiple controllers also varies, resulting in an unequal distribution of load between different controllers. One major drawback of the multiple controllers is their constant configuration of the… More
  •   Views:78       Downloads:53        Download PDF