sensors-logo

Journal Browser

Journal Browser

Trusted IoT Ecosystem

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 March 2021) | Viewed by 5269

Special Issue Editors


E-Mail Website
Guest Editor
Department of Information Management, National Taiwan University of Science and Technology, 43 Keelung Rd., Sect. 4, Taipei 106, Taiwan
Interests: IoT/IoV security; blockchain security; zero trust architecture; user privacy; trusted computing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Management, National Taiwan University of Science and Technology, 43 Keelung Rd., Sect. 4, Taipei 106, Taiwan
Interests: IoT/IoV security; blockchain security; cloud security; network security; trusted computing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Management, National Taiwan University of Science and Technology, 43 Keelung Rd., Sect. 4, Taipei 106, Taiwan
Interests: information and communication security; applied cryptology; secure protocol design; security management
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In recent years, sensors with network connection capabilities and IoT-based devices have been developed and deployed in mass quantities into various Internet-of-Things environments all over the world. As multiple wireless technologies and standards, such as Bluetooth, ZigBee, NB-IoT, Wi-Fi and 5G, were adopted to build appropriated IoT networks for different IoT environments and application scenarios, one of the biggest challenges for IoT networks in the near future will be managing and maintaining their functionalities, reliability, and sustainability. To achieve the management goals and provide reliable and trusted infrastructure, security features have to be considered at the beginning of construction of the targeted IoT environments and applications.

Therefore, designing and implementing trusted IoT ecosystems to support various IoT domains or environments has become an urgent, interesting, and challenging research field. Establishing corresponding trusted IoT ecosystems will be in great demand in diverse IoT scenarios and application domains, such as industrial IoT, artificial-intelligence-enabled IoT, Internet of Vehicle/UAV, smart grids, smart homes, and smart cities.

This Special Issue has the aim of developing novel security mechanisms and effective frameworks to construct trusted IoT ecosystems in various IoT environments.

Prof. Dr. Nai-Wei Lo
Prof. Dr. Shi-Cho Cha
Prof. Dr. Kuo-Hui Yeh
Prof. Dr. Jheng-Jia Huang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Trusted IoT ecosystem
  • Smart and secure IoT framework
  • IoT security on sensors
  • Secure authentication, authorization and accounting mechanisms for IoT platforms
  • Firmware update solutions on IoT devices and networks
  • Sensor security by design
  • Sensor network security
  • 5G security in IoT networks
  • Smart malware detection/prevention solutions for IoT devices and networks
  • DDoS solutions for IoT ecosystems
  • AIoT security
  • Smart and secure industrial IoT network
  • Consumer IoT security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 2352 KiB  
Article
MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices
by Kristina Sahlmann, Vera Clemens, Michael Nowak and Bettina Schnor
Sensors 2021, 21(1), 10; https://doi.org/10.3390/s21010010 - 22 Dec 2020
Cited by 11 | Viewed by 4364
Abstract
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware [...] Read more.
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices. Full article
(This article belongs to the Special Issue Trusted IoT Ecosystem)
Show Figures

Graphical abstract

Back to TopTop