sensors-logo

Journal Browser

Journal Browser

IoT Cybersecurity

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: 20 August 2024 | Viewed by 4114

Special Issue Editors


E-Mail Website
Guest Editor
School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Bentley, WA 6100, Australia
Interests: networking; Internet of Things; cybersecurity; AI; machine learning for networking/security

E-Mail Website
Guest Editor
Discipline of Computer Science and Engineering, Indian Institute of Technology, Indore 453552, India
Interests: network security; system security; software-defined networking and fault detection

Special Issue Information

Dear Colleagues,

Internet of Things (IoT) cyber security refers to the protection of connected devices and networks. The IoT is the telecommunications network that tethers devices, objects, animals, and people to the Internet. Due to the escalating threat of cyberattacks, cybersecurity has emerged as an crucial domain in the Internet of Things (IoT). Organizations and users are able to mitigate cybersecurity risks by protecting their IoT assets and privacy via IoT cybersecurity. IoT security management can be enhanced ia the application of novel cybersecurity technologies and tools. This Special Issue aims to collect current research regarding the application of the IoT and cybersecurity technologies.

The potential topics of this Special Issue include, but are not limited to, the following:

  • security and privacy in IoT
  • Blockchain-based cybersecurity applications
  • emerging security issues and trends in IoT
  • privacy, trust, and reliability in IoT
  • cybersecurity and data privacy in IoT scenarios
  • security information in IoT environment
  • The role of AI and machine learning in IoT cybersecurity
  • The role of government and industry in promoting IoT security standards and best practices

Dr. Himanshu Agrawal
Dr. Neminath Hubballi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 425 KiB  
Article
Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare
by Francisco J. Jaime, Antonio Muñoz, Francisco Rodríguez-Gómez and Antonio Jerez-Calero
Sensors 2023, 23(21), 8944; https://doi.org/10.3390/s23218944 - 03 Nov 2023
Cited by 3 | Viewed by 1823
Abstract
Biomedical Microelectromechanical Systems (BioMEMS) serve as a crucial catalyst in enhancing IoT communication security and safeguarding smart healthcare systems. Situated at the nexus of advanced technology and healthcare, BioMEMS are instrumental in pioneering personalized diagnostics, monitoring, and therapeutic applications. Nonetheless, this integration brings [...] Read more.
Biomedical Microelectromechanical Systems (BioMEMS) serve as a crucial catalyst in enhancing IoT communication security and safeguarding smart healthcare systems. Situated at the nexus of advanced technology and healthcare, BioMEMS are instrumental in pioneering personalized diagnostics, monitoring, and therapeutic applications. Nonetheless, this integration brings forth a complex array of security and privacy challenges intrinsic to IoT communications within smart healthcare ecosystems, demanding comprehensive scrutiny. In this manuscript, we embark on an extensive analysis of the intricate security terrain associated with IoT communications in the realm of BioMEMS, addressing a spectrum of vulnerabilities that spans cyber threats, data manipulation, and interception of communications. The integration of real-world case studies serves to illuminate the direct repercussions of security breaches within smart healthcare systems, highlighting the imperative to safeguard both patient safety and the integrity of medical data. We delve into a suite of security solutions, encompassing rigorous authentication processes, data encryption, designs resistant to attacks, and continuous monitoring mechanisms, all tailored to fortify BioMEMS in the face of ever-evolving threats within smart healthcare environments. Furthermore, the paper underscores the vital role of ethical and regulatory considerations, emphasizing the need to uphold patient autonomy, ensure the confidentiality of data, and maintain equitable access to healthcare in the context of IoT communication security. Looking forward, we explore the impending landscape of BioMEMS security as it intertwines with emerging technologies such as AI-driven diagnostics, quantum computing, and genomic integration, anticipating potential challenges and strategizing for the future. In doing so, this paper highlights the paramount importance of adopting an integrated approach that seamlessly blends technological innovation, ethical foresight, and collaborative ingenuity, thereby steering BioMEMS towards a secure and resilient future within smart healthcare systems, in the ambit of IoT communication security and protection. Full article
(This article belongs to the Special Issue IoT Cybersecurity)
Show Figures

Figure 1

Review

Jump to: Research

28 pages, 1300 KiB  
Review
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
by Taimur Bakhshi, Bogdan Ghita and Ievgeniia Kuzminykh
Sensors 2024, 24(2), 708; https://doi.org/10.3390/s24020708 - 22 Jan 2024
Cited by 2 | Viewed by 1980
Abstract
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting [...] Read more.
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting IoT-enabled platforms, specifically device firmware vulnerabilities, often overlooked during development and deployment. A comprehensive security strategy aiming to mitigate IoT firmware vulnerabilities would entail auditing the IoT device firmware environment, from software components, storage, and configuration, to delivery, maintenance, and updating, as well as understanding the efficacy of tools and techniques available for this purpose. To this effect, this paper reviews the state-of-the-art technology in IoT firmware vulnerability assessment from a holistic perspective. To help with the process, the IoT ecosystem is divided into eight categories: system properties, access controls, hardware and software re-use, network interfacing, image management, user awareness, regulatory compliance, and adversarial vectors. Following the review of individual areas, the paper further investigates the efficiency and scalability of auditing techniques for detecting firmware vulnerabilities. Beyond the technical aspects, state-of-the-art IoT firmware architectures and respective evaluation platforms are also reviewed according to their technical, regulatory, and standardization challenges. The discussion is accompanied also by a review of the existing auditing tools, the vulnerabilities addressed, the analysis method used, and their abilities to scale and detect unknown attacks. The review also proposes a taxonomy of vulnerabilities and maps them with their exploitation vectors and with the auditing tools that could help in identifying them. Given the current interest in analysis automation, the paper explores the feasibility and impact of evolving machine learning and blockchain applications in securing IoT firmware. The paper concludes with a summary of ongoing and future research challenges in IoT firmware to facilitate and support secure IoT development. Full article
(This article belongs to the Special Issue IoT Cybersecurity)
Show Figures

Figure 1

Back to TopTop