Information Security, Privacy, and Internet of Things (IoT) Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 May 2024 | Viewed by 1108

Special Issue Editors


E-Mail Website
Guest Editor
ADAPT Centre, Innovation Value Institute, Maynooth University, W23 F2H6 Maynooth, Ireland
Interests: semantic web technologies; data governance; software engineering; cyber security; AI ethics and regulatory compliance; data privacy; consent management; and distributed systems

E-Mail Website
Guest Editor
ADAPT Centre, Innovation Value Institute, Maynooth University, W23 F2H6 Maynooth, Ireland
Interests: digital service innovation; smart cities and IoT-based smart environments; service innovation; intelligent transportation systems; smart services; building information management; FinTech; data value; enterprise architecture; technology adoption; analytics; business process management
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This proposed Special Issue focuses on the dynamic interplay between Information security, privacy, and Internet of Things (IoT) security. In an ever-evolving digital landscape, the proliferation of IoT devices presents both challenges and opportunities for safeguarding sensitive data and ensuring individual privacy. This Special Issue aims to provide a comprehensive platform for researchers and practitioners to share innovative insights and advancements in these areas. It seeks to address emerging threats, develop robust solutions, and examine the impact of regulatory frameworks like GDPR (General Data Protection Regulation) and EHDS (European Health Data Space) on data protection. Additionally, it explores the role of AI (Artificial Intelligence) and consent management in enhancing the security and privacy of IoT ecosystems.

Objectives:

  1. To establish a forum for the exchange of knowledge and expertise concerning information security, privacy, and IoT security.
  2. To comprehensively analyze the distinctive challenges and vulnerabilities associated with IoT devices and networks.
  3. To foster the development of effective strategies, tools, and best practices for risk mitigation and the strengthening of security and privacy in IoT environments.
  4. To promote interdisciplinary collaboration among experts in cybersecurity, data protection, IoT technology, AI, and legal compliance.

This Special Issue will encompass a wide range of topics, including, but not limited to, the following:

  1. Threat Detection and Mitigation in IoT: Techniques and approaches for identifying and countering security threats and vulnerabilities in IoT ecosystems.
  2. Privacy-Preserving IoT: Methods for safeguarding user privacy and data protection throughout IoT data collection, storage, and transmission.
  3. Secure IoT Architectures: Design principles and architectures that bolster the security of IoT devices and networks.
  4. Access Control and Authentication in IoT: Authentication mechanisms and access control strategies to prevent unauthorized access to IoT devices and data.
  5. Cryptographic Solutions for IoT: Encryption and cryptographic protocols customized to secure IoT communications and data.
  6. Compliance and Regulations: Examination of legal and regulatory frameworks, such as GDPR and EHDS, and their implications for IoT security and data protection.
  7. IoT Security Management: Strategies for effectively managing and maintaining security in large-scale IoT deployments.
  8. Ethical Considerations: Exploration of ethical implications of IoT security and privacy practices, including data ownership and consent management.
  9. AI in IoT Security: The role of AI in enhancing threat detection, anomaly detection, and predictive security measures in IoT environments.
  10. Consent Management in IoT: Strategies and technologies for obtaining and managing user consent within IoT contexts.

We anticipate receiving contributions that shed light on the evolving landscape of these domains and their impact on the future of connected devices and technologies. Authors are encouraged to submit original research articles, case studies, and review papers that contribute to the advancement of knowledge in these areas.

We look forward to receiving original contributions that shed light on the evolving landscape of information security, privacy, and IoT security, and how they intersect to shape the future of connected devices and technologies.

Dr. Mansoor Ahmed
Prof. Dr. Markus Helfert
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • privacy by design
  • internet security
  • Internet of Things
  • GDPR
  • EHDS
  • AI ACT

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 3321 KiB  
Article
Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques
by Muhammad Irfan Khalid, Mansoor Ahmed, Markus Helfert and Jungsuk Kim
Electronics 2023, 12(24), 4973; https://doi.org/10.3390/electronics12244973 - 12 Dec 2023
Cited by 1 | Viewed by 836
Abstract
This paper explicitly focuses on utilizing blockchain technology in dynamic consent management systems with privacy considerations. While blockchain offers improved security, the potential impact on entities’ privacy must be considered. Through a critical investigation of available contributions to the present state of the [...] Read more.
This paper explicitly focuses on utilizing blockchain technology in dynamic consent management systems with privacy considerations. While blockchain offers improved security, the potential impact on entities’ privacy must be considered. Through a critical investigation of available contributions to the present state of the art of blockchain-based dynamic consent management systems, we highlight the limitations of plaintext storage and the processing of subject data/consent on the blockchain, which can compromise privacy. We stress the significance of keeping encrypted subject data/consent on the blockchain and sharing it in encrypted form with data controllers and requesters to guarantee privacy and security. Our proposed model demonstrates the usefulness of privacy-preserving techniques, underscoring the decentralization of the abstract entity data controller to enhance subject data/consent privacy. Additionally, we suggest the integration of privacy-enhancing technologies such as secure multi-party computation, homomorphic encryption, and differential privacy with blockchain to accomplish both security and privacy, aligning with the data sharing practices outlined in the General Data Protection Regulation (GDPR) in Europe. Full article
(This article belongs to the Special Issue Information Security, Privacy, and Internet of Things (IoT) Security)
Show Figures

Figure 1

Back to TopTop