sensors-logo

Journal Browser

Journal Browser

Editorial Board Members’ Collection Series: IoT Security

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (30 June 2023) | Viewed by 3159

Special Issue Editors

School of Computer Science and Informatics, Cardiff University, Cardiff CF24 3AA, UK
Interests: Internet of Things; sensing as a service; privacy; infrastructure and architectures; fog/edge computing
Special Issues, Collections and Topics in MDPI journals
École polytechnique Route de Saclay, 91128 Palaiseau, France
Interests: computer networking; Internet of Things (IoT); network security; MESH; MANET
School of Computer Science and Engineering, Nanyang Technological University, Singapore 639798, Singapore
Interests: communications; networks; AI and data science; security and privacy
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

More than half of the world's population lives in urban areas today. Urbanisation leads to urban sprawl, slum formation, dispersed jobs, and ageing infrastructure, leading to high dependency on public infrastructure. These can lead to major inefficiencies in energy use, transportation, governance, waste management, and pollution. The public and private sectors are investing heavily in smart city technologies to address these social, economic, and environmental challenges. However, the risks of deploying smart technology in critical sectors must be addressed. Attackers target smart cities for a variety of reasons. Malicious individuals may view smart cities as playgrounds to test their hacking skills. You can play with available technology to your satisfaction. For cybercriminals, connecting devices and systems in smart cities can be a way to steal money and data from citizens and local businesses. State-sponsored actors can also exploit the spread of smart city technology to launch their own espionage and hacktivist campaigns. In extreme cases, intelligent implementations can even be used for terrorist acts. Therefore, researchers and engineers must provide practical solutions and methodologies to help municipalities and urban developers to design safer smart cities.

Dr. Charith Perera
Prof. Dr. Thomas Heide Clausen
Dr. Jun Zhao
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • security
  • public infrastructure
  • cyberphysical security
  • smart city

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

26 pages, 729 KiB  
Review
Personal Data Stores (PDS): A Review
by Khalid U. Fallatah, Mahmoud Barhamgi and Charith Perera
Sensors 2023, 23(3), 1477; https://doi.org/10.3390/s23031477 - 28 Jan 2023
Cited by 3 | Viewed by 2855
Abstract
Internet services have collected our personal data since their inception. In the beginning, the personal data collection was uncoordinated and was limited to a few selected data types such as names, ages, birthdays, etc. Due to the widespread use of social media, more [...] Read more.
Internet services have collected our personal data since their inception. In the beginning, the personal data collection was uncoordinated and was limited to a few selected data types such as names, ages, birthdays, etc. Due to the widespread use of social media, more and more personal data has been collected by different online services. We increasingly see that Internet of Things (IoT) devices are also being adopted by consumers, making it possible for companies to capture personal data (including very sensitive data) with much less effort and autonomously at a very low cost. Current systems architectures aim to collect, store, and process our personal data in the cloud with very limited control when it comes to giving back to citizens. However, Personal Data Stores (PDS) have been proposed as an alternative architecture where personal data will be stored within households, giving us complete control (self-sovereignty) over our data. This paper surveys the current literature on Personal Data Stores (PDS) that enable individuals to collect, control, store, and manage their data. In particular, we provide a comprehensive review of related concepts and the expected benefits of PDS platforms. Further, we compare and analyse existing PDS platforms in terms of their capabilities and core components. Subsequently, we summarise the major challenges and issues facing PDS platforms’ development and widespread adoption. Full article
(This article belongs to the Special Issue Editorial Board Members’ Collection Series: IoT Security)
Show Figures

Figure 1

Back to TopTop