Novel methods applied to security and privacy problems in future networking technologies
; ; Afaqui, M.S.
Afaqui, M.S.
Publication Date
2025-04
End of Embargo
Supervisor
Rights
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Peer-Reviewed
Yes
Open Access status
openAccess
Accepted for publication
2025-04-25
Institution
Department
Awarded
Embargo end date
Additional title
Abstract
The rapid development of future networking technologies, such as 5G, 6G, blockchain, the Internet of Things (IoT), cloud computing, and Software-Defined Networking (SDN) is set to revolutionize our methods of connection, communication, and data sharing. While these technologies facilitate more efficient communication and enable the creation of previously unimaginable applications and services, they also pose significant security and privacy challenges. These include expanded attack surfaces, new attack vectors, evolving threats, and concerns over data privacy and user trust. Addressing these challenges is crucial to ensuring that future networking technologies can be utilized safely and securely while realizing their full potential.
This Special Issue is particularly timely, as it highlights cutting-edge research and solutions aimed at overcoming these security and privacy challenges. Recent advancements in networking technologies and security frameworks have laid a strong foundation for tackling long-standing issues in secure communication and data privacy. By showcasing both theoretical innovations and practical applications, the Special Issue aims to inspire further advancements in the field. The objective is to bridge the gap between theory and practice, promoting collaboration across various disciplines to develop more resilient and secure networking infrastructures that can address the emerging security and privacy concerns of our digital future.
In this Special Issue on cybersecurity, we received 19 submissions, each carefully evaluated by at least one of the Guest Editors to ensure relevance to the theme of securing emerging technologies. Submissions considered relevant underwent a comprehensive review process involving at least two external reviewers, while those that did not meet the necessary criteria were rejected. After a rigorous peer-review process, 11 articles were selected for publication. These contributions explore critical topics such as the development of robust cybersecurity strategies for emerging technologies, including 5G, blockchain, IoT, cloud computing, and SDN, as well as Zero Trust frameworks. The articles provide innovative insights into how these technologies can be safeguarded against evolving security threats, addressing issues such as expanded attack surfaces, data privacy concerns, label-flipping attacks, and user trust issues. Key technologies such as Convolutional Neural Networks (CNNs), Generative Adversarial Networks (GANs), Deep Reinforcement Learning (DRL), and blockchain for identity management, along with Zero Trust principles for enhancing security, are applied to tackle cybersecurity challenges. A summary of the findings and conclusions from each article is presented below, offering a diverse range of solutions for securing these rapidly advancing technologies in the face of complex cyber threats
Version
Published version
Citation
Awan IU, Qureshi A and Afaqui MS (2025) Novel methods applied to security and privacy problems in future networking technologies. 14(9): 1816.
Link to publisher’s version
Link to published version
Link to Version of Record
Type
Article