Cyber Security in the New "Edge Computing + IoT" World

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 31 May 2024 | Viewed by 7799

Special Issue Editor

School of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China
Interests: data privacy and privacy preservation for large-scale data analytics; differential privacy; local differential privacy; federated learning; secure multiparty computation

Special Issue Information

Dear Colleagues,

The paradigm shift to the Internet of Things (IoT) has paved the way for a new surge of research on connecting objects, streamlining processes, and enabling intelligence on top of sensor networks that collect data from cyber, physical, and human worlds. Meanwhile, the emergence of the edge computing concept has led to benefits that traditional cloud computing cannot offer us sufficient data traffic elimination, in situ data intelligence, latency reduction, and fast responses. The integration of edge computing and the IoT would thus be promising for various future IoT application scenarios, such as smart homes, smart transportation, smart health, smart grids, and smart energy.

Such an emerging “edge computing + IoT” trend brings both challenges and opportunities to cybersecurity. For example, on the one hand, the distributed nature, resource constraints, and extensive data in edge computing and the IoT pose severe challenges for designing trustworthy, secure, and privacy-preserving mechanisms with effectiveness and efficiency. On the other hand, the emergence of a series of technologies like Machine Learning (ML), Artificial Intelligence (AI), and Blockchain has opened a door for new research directions and innovative opportunities at the intersection of the cybersecurity and “edge computing + IoT” paradigm.

This Special Issue aims to gather the recent advances and novel contributions made by academic researchers and industry practitioners in the vibrant field of cybersecurity for edge computing and the IoT, so that we may address the serious challenges and leverage the potential opportunities in the new world of edge computing and the IoT.

Dr. Xuebin Ren
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity in typical edge and IoT systems, e.g., smart grid, smart transportation
  • system security in edge and fog computing
  • security and privacy issues in edge intelligence and the IoT
  • data security and privacy in edge computing and the IoT
  • privacy-enhancing technologies in edge computing and the IoT
  • adversarial attacks in edge computing and the IoT
  • defending mechanisms in edge computing and the IoT
  • blockchain and its applications in edge computing and the IoT
  • trust management in edge computing and the IoT
  • trustworthy ML algorithms in edge computing and the IoT
  • advanced privacy-enhanced technologies for edge computing and the IoT
  • advanced cryptography techniques for a resource-constrained IoT
  • large language models (LLMs) for cybersecurity in edge computing and the IoT

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

19 pages, 1639 KiB  
Article
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
by Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
Future Internet 2024, 16(3), 85; https://doi.org/10.3390/fi16030085 - 29 Feb 2024
Viewed by 1260
Abstract
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by [...] Read more.
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure. Full article
(This article belongs to the Special Issue Cyber Security in the New "Edge Computing + IoT" World)
Show Figures

Figure 1

Review

Jump to: Research

57 pages, 2070 KiB  
Review
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
by Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Future Internet 2024, 16(2), 40; https://doi.org/10.3390/fi16020040 - 24 Jan 2024
Cited by 1 | Viewed by 6081
Abstract
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as enablers for committing a variety of [...] Read more.
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as enablers for committing a variety of crime and e-crime. Despite ongoing research and study, there remains a significant gap in the thorough analysis of security challenges, feasible solutions, and open secure problems for IoT. To bridge this gap, we provide a comprehensive overview of the state of the art in IoT security with a critical investigation-based approach. This includes a detailed analysis of vulnerabilities in IoT-based systems and potential attacks. We present a holistic review of the security properties required to be adopted by IoT devices, applications, and services to mitigate IoT vulnerabilities and, thus, successful attacks. Moreover, we identify challenges to the design of security protocols for IoT systems in which constituent devices vary markedly in capability (such as storage, computation speed, hardware architecture, and communication interfaces). Next, we review existing research and feasible solutions for IoT security. We highlight a set of open problems not yet addressed among existing security solutions. We provide a set of new perspectives for future research on such issues including secure service discovery, on-device credential security, and network anomaly detection. We also provide directions for designing a forensic investigation framework for IoT infrastructures to inspect relevant criminal cases, execute a cyber forensic process, and determine the facts about a given incident. This framework offers a means to better capture information on successful attacks as part of a feedback mechanism to thwart future vulnerabilities and threats. This systematic holistic review will both inform on current challenges in IoT security and ideally motivate their future resolution. Full article
(This article belongs to the Special Issue Cyber Security in the New "Edge Computing + IoT" World)
Show Figures

Figure 1

Back to TopTop