Advances in IoT Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 4043

Special Issue Editors


E-Mail Website
Guest Editor
College of Business and Law, RMIT University, Melbourne, VIC 3001, Australia
Interests: cybersecurity; blockchain; AI

Special Issue Information

Dear Colleagues,

We are delighted to announce a special issue on "Advances in IoT Security" in MDPI  Electronics. The Internet of Things (IoT) has transformed various industries by connecting numerous devices and enabling seamless communication and data exchange. However, this proliferation of interconnected devices has also raised significant security concerns, as IoT networks are susceptible to various cyber threats and attacks.

The objective of this special issue is to explore the latest advancements, challenges, and opportunities in IoT security and present innovative solutions to address the evolving cybersecurity landscape. We invite researchers and practitioners to contribute original research papers, review articles, and case studies that shed light on various aspects of IoT security.

Potential topics of interest for this special issue include, but are not limited to:

  • Threat modeling and risk assessment for IoT systems
  • Cryptographic techniques and protocols for securing IoT communications
  • Privacy protection and data integrity in IoT environments
  • Intrusion detection and prevention mechanisms for IoT networks
  • Trust and identity management in IoT ecosystems
  • Security architectures and frameworks for IoT deployments
  • Secure firmware and software update mechanisms for IoT devices
  • Machine learning and artificial intelligence for IoT security analytics
  • Blockchain-based approaches for securing IoT systems
  • Secure authentication and access control in IoT environments
  • Physical layer security techniques for IoT networks
  • Standards and regulations for ensuring IoT security and privacy

We encourage authors to present novel research findings, empirical evaluations, and practical implementations that contribute to the advancement of IoT security. All submitted manuscripts will undergo a rigorous peer-review process to ensure the highest quality and relevance to the field.

Dr. Abebe Diro
Dr. Mohiuddin Ahmed
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • IoT Security
  • anomaly detection
  • blockchain

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 1798 KiB  
Article
Drift Adaptive Online DDoS Attack Detection Framework for IoT System
by Yonas Kibret Beshah, Surafel Lemma Abebe and Henock Mulugeta Melaku
Electronics 2024, 13(6), 1004; https://doi.org/10.3390/electronics13061004 - 07 Mar 2024
Cited by 1 | Viewed by 685
Abstract
Internet of Things (IoT) security is becoming important with the growing popularity of IoT devices and their wide applications. Recent network security reports revealed a sharp increase in the type, frequency, sophistication, and impact of distributed denial of service (DDoS) attacks on IoT [...] Read more.
Internet of Things (IoT) security is becoming important with the growing popularity of IoT devices and their wide applications. Recent network security reports revealed a sharp increase in the type, frequency, sophistication, and impact of distributed denial of service (DDoS) attacks on IoT systems, making DDoS one of the most challenging threats. DDoS is used to commit actual, effective, and profitable cybercrimes. The current machine learning-based IoT DDoS attack detection systems use batch learning techniques, and hence are unable to maintain their performance over time in a dynamic environment. The dynamicity of heterogeneous IoT data causes concept drift issues that result in performance degradation and automation difficulties in detecting DDoS. In this study, we propose an adaptive online DDoS attack detection framework that detects and adapts to concept drifts in streaming data using a number of features often used in DDoS attack detection. This paper also proposes a novel accuracy update weighted probability averaging ensemble (AUWPAE) approach to detect concept drift and optimize zero-day DDoS detection. We evaluated the proposed framework using IoTID20 and CICIoT2023 dataset containing benign and DDoS traffic data. The results show that the proposed adaptive online DDoS attack detection framework is able to detect DDoS attacks with an accuracy of 99.54% and 99.33% for the respective datasets. Full article
(This article belongs to the Special Issue Advances in IoT Security)
Show Figures

Figure 1

15 pages, 4143 KiB  
Article
Traffic Fingerprints for Homogeneous IoT Traffic Based on Packet Payload Transition Patterns
by Mingrui Fan, Jiaqi Gao, Yaru He, Weidong Shi and Yueming Lu
Electronics 2024, 13(5), 930; https://doi.org/10.3390/electronics13050930 - 29 Feb 2024
Viewed by 526
Abstract
Traffic fingerprint was considered an effective security protection mechanism in IoT scenarios because it can be used to automatically identify accessed devices. However, the results of replication experiments show that the classic traffic fingerprints based on simple network traffic attribute features have a [...] Read more.
Traffic fingerprint was considered an effective security protection mechanism in IoT scenarios because it can be used to automatically identify accessed devices. However, the results of replication experiments show that the classic traffic fingerprints based on simple network traffic attribute features have a significantly lower ability to identify accessed devices in real 5G IoT scenarios compared to what was stated in traditional IoT scenarios. The growing homogenization of IoT traffic caused by the application of 5G is believed to be the reason for the poor ability of traditional traffic fingerprints to identify 5G IoT terminals. Studying an enhanced traffic fingerprint is necessary to accommodate the homogeneous Internet of Things traffic. In addition, during the reproducing experiments, we noticed that the solution of overlap is a key factor that restricts the recognition ability of one-vs-all multi-classifiers, and the efficiency of existing methods still has some room for optimization. Based on targeted improvements to these two issues, we proposed an enhanced IoT terminal traffic fingerprint based on packet payload transition patterns to improve the device recognition ability in homogeneous IoT traffic. Additionally, we designed an improved solution for overlap based on density centers to expedite decision making. According to the experimental results, when compared with the existing traffic fingerprint, the proposed traffic fingerprint in this study demonstrated a Macro-Average Precision of close to 90% for network traffic from real 5G IoT terminals. The proposed overlap solution based on the density centers reduced the decision-making time from hundreds of seconds to tens of seconds while ensuring decision-making accuracy. Full article
(This article belongs to the Special Issue Advances in IoT Security)
Show Figures

Figure 1

24 pages, 4705 KiB  
Article
Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
by Emanuel Ortiz-Ruiz, Juan Ramón Bermejo, Juan Antonio Sicilia and Javier Bermejo
Electronics 2024, 13(5), 824; https://doi.org/10.3390/electronics13050824 - 20 Feb 2024
Viewed by 1238
Abstract
This study investigates the application of machine learning techniques for cyberattack prevention in Internet of Things (IoT) systems, focusing on the specific context of cyberattacks in Colombia. The research presents a comparative perspective on cyberattacks in Colombia, aiming to identify the most effective [...] Read more.
This study investigates the application of machine learning techniques for cyberattack prevention in Internet of Things (IoT) systems, focusing on the specific context of cyberattacks in Colombia. The research presents a comparative perspective on cyberattacks in Colombia, aiming to identify the most effective machine learning methods for mitigating and preventing such threats. The study evaluates the performance of logistic regression, naïve Bayes, perceptron, and k-nearest neighbors algorithms in the context of cyberattack prevention. Results reveal the strengths and weaknesses of these techniques in addressing the unique challenges posed by cyberattackers in Colombia’s IoT infrastructure. The findings provide valuable insights for enhancing cybersecurity measures in the region and contribute to the broader field of IoT security. Full article
(This article belongs to the Special Issue Advances in IoT Security)
Show Figures

Figure 1

20 pages, 1618 KiB  
Article
Leveraging Artificial Intelligence and Provenance Blockchain Framework to Mitigate Risks in Cloud Manufacturing in Industry 4.0
by Mifta Ahmed Umer, Elefelious Getachew Belay and Luis Borges Gouveia
Electronics 2024, 13(3), 660; https://doi.org/10.3390/electronics13030660 - 05 Feb 2024
Viewed by 1015
Abstract
Cloud manufacturing is an evolving networked framework that enables multiple manufacturers to collaborate in providing a range of services, including design, development, production, and post-sales support. The framework operates on an integrated platform encompassing a range of Industry 4.0 technologies, such as Industrial [...] Read more.
Cloud manufacturing is an evolving networked framework that enables multiple manufacturers to collaborate in providing a range of services, including design, development, production, and post-sales support. The framework operates on an integrated platform encompassing a range of Industry 4.0 technologies, such as Industrial Internet of Things (IIoT) devices, cloud computing, Internet communication, big data analytics, artificial intelligence, and blockchains. The connectivity of industrial equipment and robots to the Internet opens cloud manufacturing to the massive attack risk of cybersecurity and cyber crime threats caused by external and internal attackers. The impacts can be severe because the physical infrastructure of industries is at stake. One potential method to deter such attacks involves utilizing blockchain and artificial intelligence to track the provenance of IIoT devices. This research explores a practical approach to achieve this by gathering provenance data associated with operational constraints defined in smart contracts and identifying deviations from these constraints through predictive auditing using artificial intelligence. A software architecture comprising IIoT communications to machine learning for comparing the latest data with predictive auditing outcomes and logging appropriate risks was designed, developed, and tested. The state changes in the smart ledger of smart contracts were linked with the risks so that the blockchain peers can detect high deviations and take actions in a timely manner. The research defined the constraints related to physical boundaries and weightlifting limits allocated to three forklifts and showcased the mechanisms of detecting risks of breaking these constraints with the help of artificial intelligence. It also demonstrated state change rejections by blockchains at medium and high-risk levels. This study followed software development in Java 8 using JDK 8, CORDA blockchain framework, and Weka package for random forest machine learning. As a result of this, the model, along with its design and implementation, has the potential to enhance efficiency and productivity, foster greater trust and transparency in the manufacturing process, boost risk management, strengthen cybersecurity, and advance sustainability efforts. Full article
(This article belongs to the Special Issue Advances in IoT Security)
Show Figures

Figure 1

Back to TopTop