Cybersecurity and Cryptography in the Internet of Things (IoT)

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 15 March 2024 | Viewed by 1315

Special Issue Editors

Center for Digital Safety and Security, AIT Austrian Institute of Technology, 1210 Vienna, Austria
Interests: cybersecurity; safety; automotive; cyber-physical systems; IoT
Center for Digital Safety and Security, AIT Austrian Institute of Technology, 1210 Vienna, Austria
Interests: virtualisation techniques
Department of Machine Design, KTH Royal Institute of Technology, SE 100 44 Stockholm, Sweden
Interests: systems theory; architecture design; ontological engineering; domain-specific language; logic programming; anomaly detection; safety engineering
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) has become a part of our daily lives, and it has changed our ways of working, studying, consuming entertainment, etc. It enables massive connectivity, automation, and self-decision-making processes in different situations. IoT devices could be different in their behaviors and roles. Each IoT device has a particular task: gathering data, processing data, communicating, and acting. For example, IoT sensors play an essential role in collecting a massive amount of data from different places under different conditions; then, the processing units act as smart units for processing data in order to reply to particular actions. The actions could be transferred as data transmission over a network channel using communication modules or directly transferred to actuators such as motors, robotic arms, etc.

Cybersecurity is considered one of the most essential topics in IoT, as a cyber-attack to a system could lead to severe impact. For example, "hijacking" the connection between an IoT and the other communicated terminals could give the attacker the possibility of stealing data packets and replacing them with compromised ones. That could impact confidentiality, integrity, or the availability of data or system assets, and has undesirable consequences for safety, operation, or privacy. Furthermore, cybersecurity plays an essential role in IoT, defining procedures and strategies to support building safe, secure, and reliable applications. It also protects sensitive data, prevents unauthorized access, and reaches the main security objectives for protecting data, assets, and other sensitive information from malicious activity.

In this Special Issue, we aim to cover cybersecurity topics related to IoT applications in order to find new innovative approaches and strategies to build a secure IoT application for future use. We welcome theoretical and experimental approaches in our Special Issue to provide the research community with new innovative discoveries in cybersecurity.

Potential topics to be covered:

  1. Security-by-design;
  2. Cryptographic mechanisms;
  3. Security communication protocols;
  4. Security policies;
  5. Threat modeling;
  6. Risk management;
  7. Data protection and privacy;
  8. Security requirements;
  9. Security testing;
  10. Security verification and validation;
  11. Transportation cybersecurity (e.g., automotive, railway, avionics, etc.).

Dr. Abdelkader Magdy Shaaban
Dr. Oliver Jung
Dr. Dejiu Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 1897 KiB  
Article
An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain
Appl. Sci. 2023, 13(18), 10477; https://doi.org/10.3390/app131810477 - 19 Sep 2023
Viewed by 801
Abstract
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based [...] Read more.
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Security Modules (HSMs) to provide required cryptographic primitives through a Near-Field Communication (NFC) connection. In our approach, each transfer of the assets is authenticated, verified, and recorded in the blockchain through the HSM. Transaction entries are signed, thus providing a guarantee of ownership and authenticity. The proposed infrastructure has been subject of an exhaustive security analysis and proved resilient against counterfeiting attempts, stakeholder repudiations, and misleading information. Full article
(This article belongs to the Special Issue Cybersecurity and Cryptography in the Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop