Intrusion Detection Systems in IoT Networks

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: 13 July 2024 | Viewed by 424

Special Issue Editor

Department of Computer Science, Memorial University of Newfoundland, St. John's, NL A1B 3X5, Canada
Interests: machine learning; data mining; IDS in IoT

Special Issue Information

Dear Colleagues,

We are pleased to announce a forthcoming Special Issue, upcoming for publication in the journal of Information. We aim to cover a broad range of subjects related to intrusion detection systems (IDS) in IoT networks, and hope that we will be joined in this endeavor by research leaders in this field.

IoT is a type of network that connects all sorts of different applications based
on the convergence of smart objects and the Internet. In recent years, IoT has penetrated every aspect of life, including the human body, home, and the living environment. Moreover, it is increasingly being adapted to a higher level of usage by various private and public sectors, such as military and nuclear facilities, civilian institutions/organizations, and governmental bodies. The aim is to improve their capacity in terms of environmental management, decision making, intelligence, among other goals. Such vast and vital applications come with security risks and threats.

An IoT network provides powerful computations, as well as valuable and sensitive data collected from interconnected devices within the corresponding IoT network. These devices are usually developed based on specific types of functionalities, which are based in turn on low cost and limited resources in computational capabilities, power, and storage. As a result, such networks are vulnerable to a wide array of security threats. Securing IoT networks is vital due to the importance and sensitivity of the data they collect.

The nature of IoT networks, such as interconnecting a large number of devices with limited resources, and heterogeneity between various IoT networks, raises security challenges. As a result, traditional security methods, such as cryptography, are less effective against IoT cyberattacks. Accordingly, different methodologies and technologies are needed for detecting cyberattacks in IoT networks.

We invite researchers to submit scholarly articles on a range of topics including, but not limited to the following topics:

  • Data confidentiality and authentication in IoT networks
  • Access control within the IoT networks
  • Privacy and trust among users and things
  • Enforcement of security and privacy policies
  • Strategies for hosting IDS agents in IoT devices
  • Methodologies of adapting IDS to IoT architectures
  • Taxonomy of IDS for IoT networks
  • Placement of IDS in IoT networks
  • Comparison of different IDSs
  • Validation strategies
  • Secure alert traffic and management
  • Network administrations for IoT in the presence of IDS
  • Autonomic IDSs
  • Incorporating machine learning strategies for IDS in IoT networks

Dr. Jian Tang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers

This special issue is now open for submission.
Back to TopTop