Security Challenges for the Internet of Things and Mobile Networks
A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".
Deadline for manuscript submissions: closed (30 December 2023) | Viewed by 4706
Interests: network security; privacy-preserving; cryptography; authentication; artificial intelligence; blockchain
Interests: underwater acoustic communication networks; wireless ad hoc networks; cross-layer design; medium access control protocols; network routing protocols; underwater network node localization; underwater sensor networks
In this era of technological innovation, the Internet of Things (IoT) is one of the most popular technologies. As devices and technologies become smarter and more connected, they face increasing security problems and vulnerabilities. As many smart devices are resource-constrained and have limited computing power, they cannot run strong and resource-intensive security protections and may have more vulnerabilities than non-IoT devices. Insecure communication is another serious problem in IoT networks. Most existing security mechanisms were originally designed for desktop computers and are difficult to implement on resource-constrained IoT devices. IoT devices are extremely vulnerable to various forms of attack, including man-in-the-middle attacks, if the device does not use secure encryption and authentication mechanisms. Unfortunately, traditional encryption and authentication mechanisms are not suitable for resource-limited IoT devices. The issue of privacy leakage is one of the serious security problems of IoT. Attackers can easily obtain unencrypted sensitive information, such as location information, bank account details and health records from IoT devices. Malware risk and cyberattacks are two other concerns for IoT security. If attackers find a way to inject malware into IoT systems, they could alter their functionality, collect personal data and launch other attacks. IoT suffers from denial of service attacks, denial of sleep attacks, device spoofing attacks, physical intrusion and other network attacks. Due to the bandwidth, energy and computational constraints in IoT systems, efficient novel methods are required to reach the required security level. The purpose of this Special Issue is to advance this effort by inviting contributions addressing security problems, mitigations and tools in IoT. Topics of interest include but are not limited to the following areas:
- Lightweight cryptography, key management, authentication and authorization for IoT;
- Security and privacy enhancing tools for IoT;
- Lightweight security protocols for IoT;
- IoT systems and network security;
- Intrusion and vulnerability anomaly detection in IoT systems;
- Artificial intelligence (AI)-based security and data protection for IoT;
- Hardware and firmware security for IoT.
Dr. Xiaofen Wang
Dr. Ruiqin Zhao
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- Internet of Things (IoT)
- privacy protection
- man-in-middle attacks
- denial of service attacks
- denial of sleep attacks
- device spoofing attacks
- key management
- intrusion and vulnerability detection