Security in Internet of Things: Issues, Challenges and Solutions

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (31 October 2023) | Viewed by 2221

Special Issue Editor

Department of Computer Engineering, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Interests: computer engineering; electronics engineering; communication network; wireless communications

Special Issue Information

Dear Colleagues,

Recently, Internet of Things (IoT) networks have been extensively addressed in the literature by scholars from both the industry and academia. With the extensive applications and business potential of the IoT industry, i.e., smart cities, smart grid, Internet of Vehicles Things (IoVT), Internet of Medical Things (IoMT), Internet of Social Things (IoST), Internet of Underground Things (IoUT), Internet of Space Things (IoST), Internet of Underwater Things (IoUWT), etc. IoT technology is expected to contribute to the global economy industry by more than USD 14 trillion by 2030, and is widely recognized as an integral part of the Fourth Industrial Revolution (4IR, or Industry 4.0). This great potential comes with many challenges and problematic issues, especially in terms of security. The purpose of this Special Issue is to identify threats that could challenge the privacy, integrity, authentication, confidentiality, denial of service (DoS), malware, data anomaly, eavesdropping and other potential vulnerabilities that authors may wish to study. Additionally, this Special Issue intends to propose new novel solutions for IoT vulnerabilities, i.e., cyber-physical techniques, blockchain, hardware security approaches, novel cryptographic techniques, etc. The SI will help the industry to identify major new security issues that may arise after deploying the IoT network and the potential solutions to these challenges.

Prof. Dr. Rashid A. Saeed
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things network
  • security
  • physical and hardware security
  • cyber security
  • blockchain

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 2358 KiB  
Article
Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
by Nahla Ibrahim and Johnson Agbinya
Appl. Sci. 2023, 13(7), 4398; https://doi.org/10.3390/app13074398 - 30 Mar 2023
Viewed by 1688
Abstract
We propose an ultra-lightweight cryptographic scheme called “Small Lightweight Cryptographic Algorithm (SLA)”. The SLA relies on substitution–permutation network (SPN). It utilizes 64-bit plaintext and supports a key length of 80/128-bits. The SLA cipher includes nonlinear layers, XOR operations, and round permutation layers. The [...] Read more.
We propose an ultra-lightweight cryptographic scheme called “Small Lightweight Cryptographic Algorithm (SLA)”. The SLA relies on substitution–permutation network (SPN). It utilizes 64-bit plaintext and supports a key length of 80/128-bits. The SLA cipher includes nonlinear layers, XOR operations, and round permutation layers. The S-box serves to introduce nonlinearity in the entire scheme design. It plays a vital role in increasing the complexity and robustness of the design. The S-box can thwart attacks such as linear and differential attacks. The scheme makes it possible to breed many active S-boxes in a short number of rounds, hindering analytical attacks on the cipher. When compared to other currently used ciphers, SLA has a higher throughput. Additionally, we demonstrate the SLA’s performance as an ultra-lightweight compact cipher, and its security analysis. The SLA cipher’s design is well suited for applications where small-scale embedded system dissipation is critical. The SLA algorithm is implemented using Python. Full article
(This article belongs to the Special Issue Security in Internet of Things: Issues, Challenges and Solutions)
Show Figures

Figure 1

Back to TopTop