Security and Privacy on the Internet of Things: Opportunities, Challenges and Solutions

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (31 May 2022) | Viewed by 11577

Special Issue Editors


E-Mail Website
Guest Editor
School of IT, Melbourne Institute of Technology, Melbourne, VIC 3000, Australia
Interests: cybercrime and cyber security; network security; data science; digital forensics; machine learning and data mining; mobile computing; cloud computing; IoT security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of School of Information Technology, Federation University, Ballarat, VIC 3350, Australia
Interests: cybercriminal network analysis using data-mining techniques; cybercrime prevention and detection; profiling cybercrime victims; malware analysis

E-Mail Website
Guest Editor
School of IT, Melbourne Institute of Technology, Melbourne, VIC 3000, Australia
Interests: computer networks; network security; cyber security; data analytics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Today, the industrial internet, smart grids, smart homes, military applications, smart water networks, and intelligent transportation are infrastructure systems that connect our world more than we ever thought possible. The common vision of such systems is typically associated with the Internet of Things (IoT), where through the use of sensors, the entire physical infrastructure is closely connected with information and communication technologies, and where intelligent monitoring and management can be achieved via the usage of networked-embedded devices. Sensors allow all “things” to communicate directly with each sensor to share vital information, allowing us to monitor everything and leading to better services. Trillion-scale IoT devices including sensors and actuators are predicted to be installed in “things” such as machines, humans, vehicles, buildings, and environments in the near future. Unfortunately, this evolution of IoT devices has attracted the attention of cybercriminals who attempt to attack the defence of these devices to carry out malicious activities. Compromising the restricted resources of IoT devices opens the door to a possible attack on the end-users, including unauthorised access and exploitation of personal information. The promise of the IoT is based on the security connectivity, and when connected with large collections of connected devices, significant advantages can accrue. The success of these connected devices mainly depends on the network of the IoT architecture, with the importance of the security techniques applied in it, where issues related to security and privacy are essential.

The Special Issue at hand aims to promote the dissemination of the latest methodologies, protocols, policies, frameworks, solutions, and case studies of IoT security and privacy issues in remote sensing.

Researchers and practitioners all over the world, from both academia and industry, working in the areas of IoT and cyber physical systems are invited to discuss state-of-the-art solutions, novel issues, recent developments, applications, methodologies, architecture, algorithms, techniques, experience reports, and tools for handling information flows from/to a number of devices.

Possible topics of interest in this Special Issue include but are not limited to:

  • Access control mechanism in IoT
  • Privacy-preserving computation in IoT
  • Trust and reputation issues in IoT
  • Security architecture for IoT
  • Key management in fog computing
  • Intrusion detection in IoT
  • Security and privacy in heterogeneous IoT
  • Secure and privacy-preserving data mining and aggregation in IoT applications
  • Cross‐domain trust management in smart networks
  • Secure authentication of IoT devices
  • MAC layer security protocols for IoT applications
  • IoT security mechanisms targeting application layer protocols

Dr. Ammar Alazab
Prof. Dr. Mamoun Alazab
Dr. Ansam Khraisat
Prof. Dr. Savitri Bevinakoppa
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 4667 KiB  
Article
Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
by Karam Eddine Bilami and Pascal LORENZ
Future Internet 2022, 14(5), 158; https://doi.org/10.3390/fi14050158 - 23 May 2022
Cited by 5 | Viewed by 2377
Abstract
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their implementation on resource-constrained devices. In this paper, [...] Read more.
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their implementation on resource-constrained devices. In this paper, we discuss the architectures deployed for M2M communications and the security challenges, as well as the vulnerabilities and solutions to counter possible attacks. We present a lightweight design based on a private blockchain to secure wireless M2M communications at the device domain level. Blockchain integration provides secure storage of data while preserving integrity traceability and availability. Besides, the evaluation and experimentations under NS3 simulator of the proposed scheme show that the authentication mechanism is lightweight, and presents better performances comparatively to other protocols in terms of key parameters as communication and computational overheads, average delay and energy consumption. Full article
Show Figures

Figure 1

43 pages, 897 KiB  
Article
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
by Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni
Future Internet 2021, 13(8), 198; https://doi.org/10.3390/fi13080198 - 31 Jul 2021
Cited by 23 | Viewed by 7442
Abstract
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In [...] Read more.
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research. Full article
Show Figures

Figure 1

Back to TopTop