Recent Advances in Next Generation Cybersecurity Technologies
1Zhengzhou University, Zhengzhou, China
2University of Missouri - St. Louis, St. Louis, USA
3Chongqing University of Posts and Telecommunications, Chongqing, China
4Waseda University, Tokyo, Japan
Recent Advances in Next Generation Cybersecurity Technologies
Description
The rapid development of AIoT technologies brings great convenience to daily life. However, it also raises new security issues in specific scenarios such as the internet of vehicles (IoV), internet of health (IoH), etc. Against the background of the severe global cybersecurity situation, this research needs more attention.
From the perspective of attackers, threats of cybersecurity can be divided into sniffing attacks, Man-in-the-Middle (MITM) attacks, and DoS/DDoS attacks. In terms of cyberspace itself, security threats could come from the abuse of API, identity management and access control of mass equipment, rogue cloud service providers, etc. In the next generation networks, there are possibilities to solve these cybersecurity issues with advanced technologies such as Artificial Intelligence, machine learning and deep learning, cloud computing and big data analysis, blockchain, and physical layer authentication.
The aim of this Special Issue is to highlight next generation cybersecurity and explore proper and practical methods to guarantee the confidentiality, availability, and integrity of cyberspace. Original research and review articles are welcome.
Potential topics include but are not limited to the following:
- Endogenous security approach for the next generation cybersecurity
- Zero Trust Network Architecture (ZTNA) approach for the next generation cybersecurity
- Blockchain-based key storage and management for the next generation cybersecurity
- Digital Identity and trust model for the next generation cybersecurity
- Access control security technologies for the next generation cybersecurity
- AI-based authority management for the next generation cybersecurity
- AI-based threats and intrusion detection technologies for the next generation cybersecurity
- Cryptography-based encryption and secure transmission for the next generation cybersecurity
- SDN/NFV based security technologies for the next generation cybersecurity
- Situation awareness and assessment for the next generation cybersecurity
- Data anti-tampering technologies for the next generation cybersecurity
- Security defence/protection mechanism for the next generation cybersecurity
- API management / Data leakage protection technologies for the next generation cybersecurity
- Malicious information detection and identification for the next generation cybersecurity
- Resilient security architecture for the next generation cybersecurity
- Innovative architecture, protocols, algorithms, and models for the next generation cybersecurity