IoT: Security, Privacy and Best Practices 2024

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 3770

Special Issue Editor


E-Mail Website
Guest Editor
Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA
Interests: security; information assurance and privacy; crypto-resilient attacks; applied cryptography; blockchain and cryptocurrency; IoT security and privacy; cyberphysical systems and WBAN security; steganography; lightweight cryptographic algorithms and protocols; cloud-computing security; ad hoc and WSNs; ecure remote patient monitoring systems; computer networks protocols and QoS; wireless networks coexistence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

IoT devices have penetrated through a multitude of fields beyond those originally expected. In business, the IoT is used for product optimization. IoT-based solutions are being introduced on the factory floor, where they are having a dramatic impact on quality control through the detection of substandard production and material use. This promotes brand value by ensuring adherence to product specifications. Additionally, we are seeing the use of the IoT in financial decision processes, by providing real-time information of a holistic enterprise view that is complemented by data from resource planning and accounting systems. In academia, the IoT can be used to automatically track and deliver data records. Local governments are exploiting the IoT to increase the efficiency and safety of services provided to their population. The use of the IoT is integral to successful traffic management and mass transportation control. Accompanied by the increase in popularity and usage/reliance comes an increased possibility of cyberattacks. It is a widely accepted theory that, in many cases, malicious actors target popular devices for susceptible attack surfaces to amplify the effect of successful exploitation. Therefore, it is crucial to assess, understand, and, if possible, improve the protocols and security measures used in the devices and endpoints in an endeavor to create a safe environment for the user. A layered approach will provide optimal network and device defense. The perimeter security of an IoT network is essential for preventing breaches. Perimeter defense techniques include firewalls, IDS/IPSs, physical access controls, and network access control lists.

The Special Issue aims to gather innovative security solutions for IoT. We aim for security solutions for the whole IoT family including, but not limited to, wireless sensor networks (WSN), wireless body area networks (WBANs), etc. Topics of interest include but are not limited to:

  • IoT privacy and security;
  • WSN security;
  • WBAN privacy and security;
  • Cloud-based IoT security;
  • Machine learning for IoT security;
  • IoT hardware security;
  • Blockchain for IoT security;
  • Industrial IoT security;
  • Medial IoT privacy and security;
  • Cryptography in IoT;
  • Layered security principles and ways to enhance perimeter defense in the IoT;
  • IoT gateway vulnerabilities and best practices of defense;
  • The malicious impact on IoT, Thingbots, Hivenets;
  • Forensics in IoT;
  • Law, Policy, and Privacy in IoT.

Prof. Dr. Thaier Hayajneh
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

10 pages, 373 KiB  
Article
PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication
by Fayez Gebali and Mohamed K. Elhadad
Computers 2023, 12(11), 233; https://doi.org/10.3390/computers12110233 - 14 Nov 2023
Viewed by 1357
Abstract
Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a [...] Read more.
Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. The multifaceted protocols proposed herein encompass comprehensive security considerations, ranging from authentication and anonymity to the imperative aspects of the proof of presence, freshness, and ephemeral session key exchanges. This paper provides a systematic and comprehensive framework for enhancing security in VANs, which is of paramount importance in the context of modern smart transportation systems. The contributions of this work are multifarious and can be summarized as follows: (1) Presenting an innovative and robust approach to secure key generation based on PUFs, ensuring the dynamic nature of the authentication. (2) Defining trust metrics reliant on PUFs to ascertain the authenticity and integrity of proximate vehicles. (3) Using the proposed framework to enable seamless transitions between different communication protocols, such as the migration from 5G/6G to Wi-Fi, by introducing the concept of multimodal authentication, which accommodates a wide spectrum of vehicle capabilities. Furthermore, upholding privacy through the encryption and concealment of PUF responses safeguards the identity of vehicles during communication. Full article
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices 2024)
Show Figures

Figure 1

Review

Jump to: Research

27 pages, 1519 KiB  
Review
Security Issues on Industrial Internet of Things: Overview and Challenges
by Maoli Wang, Yu Sun, Hongtao Sun and Bowen Zhang
Computers 2023, 12(12), 256; https://doi.org/10.3390/computers12120256 - 08 Dec 2023
Viewed by 1948
Abstract
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportation, and smart grids. However, security is becoming increasingly challenging due [...] Read more.
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportation, and smart grids. However, security is becoming increasingly challenging due to the vulnerability of the IIoT to various malicious attacks. In this paper, the security issues of the IIoT are reviewed from the following three aspects: (1) security threats and their attack mechanisms are presented to illustrate the vulnerability of the IIoT; (2) the intrusion detection methods are listed from the attack identification perspectives; and (3) some defense strategies are comprehensively summarized. Several concluding remarks and promising future directions are provided at the end of this paper. Full article
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices 2024)
Show Figures

Figure 1

Back to TopTop