Security and Privacy for Modern Wireless Communication Systems, 2nd Edition
Huang, Tao, and Jusak, Jusak (2025) Security and Privacy for Modern Wireless Communication Systems, 2nd Edition. Electronics, 14 (12). 2379.
|
PDF (Published Version)
- Published Version
Available under License Creative Commons Attribution. Download (146kB) | Preview |
Abstract
Wireless communication systems are undergoing rapid transformation, driven by the advent of 6G technologies, the proliferation of Internet of Things (IoT) devices, and the growing reliance on intelligent and connected infrastructure. As wireless networks expand in complexity and capability, ensuring security and privacy becomes increasingly vital—not only to protect sensitive data but also to maintain trust, system integrity, and operational reliability in critical applications such as remote healthcare, autonomous vehicles, and smart manufacturing.
This Special Issue, titled “Security and Privacy for Modern Wireless Communication Systems, 2nd Edition”, aims to address urgent challenges by highlighting the latest innovations in protocols, architectures, software, and hardware solutions designed to enhance the security and privacy of contemporary wireless networks. Unlike traditional systems, modern wireless environments must accommodate a diverse array of resource-constrained devices, ultra-low-latency applications, and emerging vulnerabilities introduced by technologies such as intelligent reflective surfaces, blockchain, edge/fog/cloud computing, and artificial intelligence (AI).
The 12 papers published in this Special Issue discuss a wide range of research topics. Several contributions focus on lightweight and quantum-resistant cryptography. These include discussions on the use of the CHERI architecture to create memory-safe intrusion detection systems and MLWE-based key exchange methods for post-quantum secure authentication. Other papers address network-level threats, proposing innovative solutions such as hybrid communication architectures, blockchain-based security for supply chains, and frameworks for cyber insurance to handle catastrophic cyber incidents. Additionally, this Special Issue highlights advancements in physical-layer security and edge security, including methods for physical-layer fingerprinting of LoRa devices, detection of covert communications, and the development of trust models within 6G edge–node–cloud ecosystems. Practical aspects of cybersecurity are also examined; several studies explore log-based forensic analysis, testbed validation, and real-time monitoring to detect remote access and file exfiltration.