Security and Communication Networks

Cryptography and Security Tools and Techniques for Networked Embedded Systems


Publishing date
01 Oct 2019
Status
Closed
Submission deadline
24 May 2019

Lead Editor

1Politecnico di Milano, Milano, Italy

2Sorbonne Université, Paris, France

3University of Patras, Patras, Greece

4Universidade de Lisboa, Lisbon, Portugal

This issue is now closed for submissions.
More articles will be published in the near future.

Cryptography and Security Tools and Techniques for Networked Embedded Systems

This issue is now closed for submissions.
More articles will be published in the near future.

Description

The diffusion of complex embedded systems poses several challenges related to the security of such systems. Adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially dangerous behaviours, or can exploit implementation-specific vulnerabilities arising from the observation of side channel information and/or the malicious fault injections to recover secret information. Untrustworthy third party software and hardware can create openings for such attacks. Effective countermeasures need to be designed that can be effectively applied even in resource-constrained systems, which are typically among those exposed to such implementation attacks.

Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. Such tools need to take into account and leverage the modern tools employed for designing and developing systems at the hardware and software level, including High Level Synthesis tools and compilers, and allow the developer to consider security not in isolation, but as one of the possible design dimensions. For instance, the interactions of security measures with fault-tolerance measures need to be explored.

This special issue encourages the submission of research and review articles related to these topics.

Potential topics include but are not limited to the following:

  • Compiler and runtime support for security
  • Cryptography in embedded and reconfigurable systems
  • Design automation and verification of security
  • Efficient cryptography through embedded multi/many core systems
  • Fault attacks and countermeasures, including interactions with fault-tolerance measures applied in critical and mixed-critical embedded systems
  • Hardware architecture and extensions for cryptography
  • Hardware/software security techniques
  • Hardware Trojans detection and prevention in low-cost computing devices suitable for use in embedded systems
  • Reverse engineering as a tool for implementation attacks against cryptographic primitives
  • Physical unclonable functions
  • Reliability and privacy in embedded systems
  • Security of cyberphysical systems
  • Security of networks-on-chips and multicore architectures
  • Side channel attacks and countermeasures for smart cards and industrial embedded systems
  • Engineering and efficient implementation of postquantum cryptographic primitives
Security and Communication Networks
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.