Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 April 2024) | Viewed by 1730

Special Issue Editor


E-Mail Website
Guest Editor
Faculty of Information and Communication Technology, Wrocław University of Science and Technology, 50-370 Wrocław, Poland
Interests: cybersecurity; threat intelligence; cybersecurity of big data; cybersecurity of AI; cyber–physical cybersecurity; anonymity and confidentiality; distributed systems; anomaly detection; novelty discovery

Special Issue Information

Dear Colleagues,

The purpose of this Special Issue is to present the latest research results in the field of cybersecurity and IoT systems. We encourage the publication of original research and review articles on various aspects of IoT and cybersecurity. Topics of interest include, but are not limited to, the design and implementation of secure IoT systems, the application of machine learning and artificial intelligence to IoT security, privacy issues in IoT, and the development of new IoT security protocols and standards. In addition, other related topics such as IoT security architectures, protocols and standards, IoT security assessment, testing and verification, IoT security management, monitoring and auditing, IoT security analytics, forensics and incident response, IoT security applications and case studies in various fields such as smart cities, healthcare, transportation, and energy, and IoT security challenges and opportunities in emerging technologies such as artificial intelligence, blockchain, edge computing, and 5G are also welcome.

In this Special Issue, we encourage submissions of articles that propose innovative solutions to enhance IoT device and network security, mitigate threats, and protect user privacy. Research that provides insight into the current state of IoT security is also welcome.

The goal of this publication is to provide the knowledge necessary to address cybersecurity challenges, while enabling readers to take advantage of the opportunities offered by IoT technologies.

Dr. Grzegorz Kołaczek
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT security
  • IoT privacy
  • machine learning for IoT security
  • secure IoT architectures and protocols
  • IoT security assessment and testing
  • IoT security applications and case studies
  • IoT security challenges and opportunities in emerging technologies

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 1119 KiB  
Article
Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV
by Qi Xie and Juanjuan Huang
Appl. Sci. 2024, 14(6), 2451; https://doi.org/10.3390/app14062451 - 14 Mar 2024
Viewed by 409
Abstract
In Internet of Vehicles (IoV), the secure data transmission between vehicles and transportation infrastructure effectively ensures the safety and fast driving of vehicles, while authentication and key agreement protocols between vehicles and transportation infrastructure (V2I) play an important role in ensuring data security [...] Read more.
In Internet of Vehicles (IoV), the secure data transmission between vehicles and transportation infrastructure effectively ensures the safety and fast driving of vehicles, while authentication and key agreement protocols between vehicles and transportation infrastructure (V2I) play an important role in ensuring data security and user privacy. However, how to design a provably secure and lightweight V2I authentication protocol for IoV is a challenge. Recently, Kumar et al. proposed a conditional privacy-preserving and desynchronization-resistant authentication protocol for IoV, but we find that Kumar et al.’s scheme is vulnerable to identity guessing attacks, impersonation attacks, and a lack of session key secrecy once the attacker obtains data stored in smart card through side-channel attacks. We also point out that Kumar et al.’s protocol is vulnerable to Roadside Unit (RSU) captured attacks and lacks perfect forward secrecy. Therefore, we propose an improved V2I authentication protocol for IoV, which uses the Physical Unclonable Function (PUF) to resist RSU captured attacks, and designed a three-factor secrecy strategy to resist side-channel attacks; a conditional privacy-preserving strategy was also adopted to achieve anonymity and malicious user tracking. Furthermore, the proposed protocol is provably secure under the random oracle model and has low computation and communication costs. Full article
Show Figures

Figure 1

17 pages, 4621 KiB  
Article
Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function Tree
by Antony Taurshia, Jaspher W. Kathrine, J. Andrew and Jennifer Eunice R
Appl. Sci. 2024, 14(6), 2405; https://doi.org/10.3390/app14062405 - 13 Mar 2024
Viewed by 478
Abstract
Group management is practiced to deploy access control and to ease multicast and broadcast communication. However, the devices that constitute the Internet of Things (IoT) are resource-constrained, and the network of IoT is heterogeneous with variable topologies interconnected. Hence, to tackle heterogeneity, SDN-aided [...] Read more.
Group management is practiced to deploy access control and to ease multicast and broadcast communication. However, the devices that constitute the Internet of Things (IoT) are resource-constrained, and the network of IoT is heterogeneous with variable topologies interconnected. Hence, to tackle heterogeneity, SDN-aided centralized group management as a service framework is proposed to provide a global network perspective and administration. Group management as a service includes a group key management function, which can be either centralized or decentralized. Decentralized approaches use complex cryptographic primitives, making centralized techniques the optimal option for the IoT ecosystem. It is also necessary to use a safe, scalable approach that addresses dynamic membership changes with minimal overhead to provide a centralized group key management service. A group key management strategy called a one-way Function Tree (OFT) was put forth to lower communication costs in sizable dynamic groups. The technique, however, is vulnerable to collusion attacks in which an appending and withdrawing device colludes and conspires to obtain unauthorized keys for an unauthorized timeline. Several collusion-deprived improvements to the OFT method are suggested; however, they come at an increased cost for both communication and computation. The Modified One-Way Function Tree (MOFT), a novel technique, is suggested in this proposed work. The collusion resistance of the proposed MOFT system was demonstrated via security analysis. According to performance studies, MOFT lowers communication costs when compared to the original OFT scheme. In comparison to the OFT’s collusion-deprived upgrades, the computation cost is smaller. Full article
Show Figures

Figure 1

Back to TopTop