Security and Privacy for Modern Wireless Communication Systems, 2nd Edition

Huang, Tao, and Jusak, Jusak (2025) Security and Privacy for Modern Wireless Communication Systems, 2nd Edition. Electronics, 14 (12). 2379.

[img]
Preview
PDF (Published Version) - Published Version
Available under License Creative Commons Attribution.

Download (146kB) | Preview
View at Publisher Website: https://doi.org/10.3390/electronics14122...
 
1


Abstract

Wireless communication systems are undergoing rapid transformation, driven by the advent of 6G technologies, the proliferation of Internet of Things (IoT) devices, and the growing reliance on intelligent and connected infrastructure. As wireless networks expand in complexity and capability, ensuring security and privacy becomes increasingly vital—not only to protect sensitive data but also to maintain trust, system integrity, and operational reliability in critical applications such as remote healthcare, autonomous vehicles, and smart manufacturing.

This Special Issue, titled “Security and Privacy for Modern Wireless Communication Systems, 2nd Edition”, aims to address urgent challenges by highlighting the latest innovations in protocols, architectures, software, and hardware solutions designed to enhance the security and privacy of contemporary wireless networks. Unlike traditional systems, modern wireless environments must accommodate a diverse array of resource-constrained devices, ultra-low-latency applications, and emerging vulnerabilities introduced by technologies such as intelligent reflective surfaces, blockchain, edge/fog/cloud computing, and artificial intelligence (AI).

The 12 papers published in this Special Issue discuss a wide range of research topics. Several contributions focus on lightweight and quantum-resistant cryptography. These include discussions on the use of the CHERI architecture to create memory-safe intrusion detection systems and MLWE-based key exchange methods for post-quantum secure authentication. Other papers address network-level threats, proposing innovative solutions such as hybrid communication architectures, blockchain-based security for supply chains, and frameworks for cyber insurance to handle catastrophic cyber incidents. Additionally, this Special Issue highlights advancements in physical-layer security and edge security, including methods for physical-layer fingerprinting of LoRa devices, detection of covert communications, and the development of trust models within 6G edge–node–cloud ecosystems. Practical aspects of cybersecurity are also examined; several studies explore log-based forensic analysis, testbed validation, and real-time monitoring to detect remote access and file exfiltration.

Item ID: 86106
Item Type: Article (Editorial)
ISSN: 2079-9292
Keywords: wireless technology; internet of things; blockchain; cloud computing; security
Related URLs:
Copyright Information: © 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Date Deposited: 15 Jul 2025 01:56
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4606 Distributed computing and systems software > 460603 Cyberphysical systems and internet of things @ 50%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460407 System and network security @ 50%
SEO Codes: 22 INFORMATION AND COMMUNICATION SERVICES > 2201 Communication technologies, systems and services > 220103 Mobile technologies and communications @ 50%
22 INFORMATION AND COMMUNICATION SERVICES > 2201 Communication technologies, systems and services > 220104 Network security @ 50%
Downloads: Total: 1
Last 12 Months: 1
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page