Special Issue "Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs"

Submission Deadline: 30 June 2021 (closed)
Guest Editors
Dr. Korhan Cengiz, Trakya University, Turkey.
Dr. Sedat Akleylek, Ondokuz Mayis University, Turkey.
Dr. Jaroslav Frnda, University of Zilina, Slovakia.


Nowadays, cyber threats are getting more and more complex. The impact and consequences of these threats are not perceptible on the protocol stack as they do not induce network behavior that seems to be explicitly malevolent. At the same time, developments on the technology side have accelerated. In particular, the Internet of Things (IoT), Narrow Band IoT (NB-IoT), Software Defined Networking and novel cyber-physical techniques are bringing information security concerns to every aspect of life. Therefore, the editors of this special issue are looking forward to recent advances in the related research, not limited to the following topics, providing a platform for researchers from both academia and industry to exchange their innovative ideas, theories, and applications.


Topics of Interest include, but are not limited to:

• Secure wireless communication protocols

• Secure physical layer solutions

• Cryptography, key management and authorization in IoT

• Secure information fusion and processing

• Trust and privacy software solutions for SDN architectures

• Authentication and verification tools for IoT Environments

• Simulation and performance analysis of secure novel protocols and algorithms

• Secure Sensing Techniques for WSNs and Ad-hoc networks

• Secure Data Analysis Techniques

• Security in 5G Networks

• Secure Solutions for IoT Based Health Care Systems

• Security in Narrow Band IoT Systems (NB-IoT)

Security, Cyber Security, IoT, SDN and Wireless Communications

Published Papers
  • Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
  • Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More
  •   Views:376       Downloads:301        Download PDF

  • Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
  • Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a… More
  •   Views:576       Downloads:467        Download PDF

  • Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System
  • Abstract The wireless sensor network (WSN) is a growing sector in the network domain. By implementing it many industries developed smart task for different purposes. Sensor nodes interact with each other and this interaction technique are handled by different routing protocol. Extending the life of the network in WSN is a challenging issue because energy in sensor nodes are quickly drained. So the overall performance of WSN are degraded by this limitation. To resolve this unreliable low power link, many researches have provided various routing protocols to make the network as dependable and sustainable as possible. While speeding up the data… More
  •   Views:563       Downloads:469        Download PDF