Special Issue "Security in the Internet of Things"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: closed (31 March 2018)

Special Issue Editors

Guest Editor
Dr. Shancang Li

University of the West of England, Bristol, UK
Website | E-Mail
Interests: security; CPS; IoT security
Guest Editor
Prof. Dr. Li Da Xu

Department of Information Technology, Old Dominion University, Norfolk, VA 23529, USA
Website | E-Mail
Interests: Enterprise systems, Information Technology & Decision Sciences, Internet of Things, cyber-physics system, big data analytics, industrial informatics
Guest Editor
Prof. Houbing Song

Department of Electrical, Computer, Software, and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA
Website | E-Mail
Interests: cyber-physical systems; signal processing for communications and networking; cloud computing/edge computing
Guest Editor
Prof. Bill William Buchanan

School of Computing, Edinburgh Napier University, Edinburgh, UK
Website | E-Mail
Interests: security; cloud cecurity; web-based infrastructures; e-crime; cryptography; triage; intrusion detection systems; digital forensics; mobile computing; agent-based systems; security risk
Guest Editor
Prof. Tao Qin

Department of Computer Science, Xi’an Jiaotong University, Xi’an, China
Website | E-Mail
Interests: security; network traffic; mobile security; online social network security

Special Issue Information

Dear Colleagues,

An increasing number of smart objects are connecting to the Internet of Things (IoT) to generate meaningful results and convenience to the user community. IoT has been a new IT platform that can provide services of all sorts, ranging from smart homes to industrial applications, and from tiny monitoring systems to smart city services. However, there are still many technical challenges in IoT, such as IoT devices access control, IoT security, data privacy, data protection, safety, governance and trust, etc. This Special Issue on “Security in the Internet of Things” aims to exploit feasibility ways of improving the security, data protection, privacy, and data assurance in IoT and promoting IoT services. Potential topics include, but not limited to:

  •  Privacy and security issues in IoT
  •  Trustworthy user interfaces
  •  Secure machine-to-machine communications
  •  Dynamic trust management for IoT applications
  •  SCADA system
  •  Intrusion detection and prevention in IoT
  •  Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
  •  Security and safety in Industrial IoT 
  •  Security metrics and performance evaluation, traffic analysis techniques
  •  Social, economic and policy issues of trust, security and privacy
  •  Lightweight cryptography and security solution for IoT
  •  Cyber risk in IoT
  •  Cybercrime and digital forensics in IoT        

Dr. Shancang Li
Prof. Li Da Xu
Prof. Houbing Song
Prof. Bill William Buchanan
Prof Tao Qin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 850 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT Security

  • Intrusion and vulnerability detection in IoT

  • Lightweight cryptography

  • Industry IoT security and safety

Published Papers (4 papers)

View options order results:
result details:
Displaying articles 1-4
Export citation of selected articles as:

Research

Open AccessFeature PaperArticle Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption
Information 2018, 9(5), 114; https://doi.org/10.3390/info9050114
Received: 29 March 2018 / Revised: 19 April 2018 / Accepted: 20 April 2018 / Published: 8 May 2018
PDF Full-text (2228 KB) | HTML Full-text | XML Full-text
Abstract
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to
[...] Read more.
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to be processed in the cloud. Security is therefore one of the design constraints but must be achieved without the usual level of resources. In this paper, we address two very different examples showing how embedded hardware/software co-design can help in improving security in the IoT context. The first example targets so-called “hardware attacks” and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC). A very lightweight countermeasure is implemented against Simple Power Analysis (SPA), taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be guaranteed by homomorphic encryption at a lower computational cost by taking advantage of a hardware accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Figures

Figure 1

Open AccessArticle Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
Information 2018, 9(5), 110; https://doi.org/10.3390/info9050110
Received: 21 March 2018 / Revised: 23 April 2018 / Accepted: 1 May 2018 / Published: 3 May 2018
PDF Full-text (2512 KB) | HTML Full-text | XML Full-text
Abstract
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assessed the major aspects and
[...] Read more.
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assessed the major aspects and underlying concepts of social engineering attacks and their influence in the New Zealand banking sector. The study further identified attack stages and provided a user-reflective model for the mitigation of attacks at every stage of the social engineering attack cycle. The outcome of this research was a model that provides users with a process of having a reflective stance while engaging in online activities. Our model is proposed to aid users and, of course, financial institutions to re-think their anti-social engineering strategies while constantly maintaining a self-reflective assessment of whether they are being subjected to social engineering attacks while transacting online. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Figures

Figure 1

Open AccessArticle On the Users’ Acceptance of IoT Systems: A Theoretical Approach
Information 2018, 9(3), 53; https://doi.org/10.3390/info9030053
Received: 10 January 2018 / Revised: 20 February 2018 / Accepted: 27 February 2018 / Published: 1 March 2018
Cited by 1 | PDF Full-text (1393 KB) | HTML Full-text | XML Full-text
Abstract
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service.
[...] Read more.
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Figures

Figure 1

Open AccessArticle Lightweight S-Box Architecture for Secure Internet of Things
Information 2018, 9(1), 13; https://doi.org/10.3390/info9010013
Received: 12 December 2017 / Revised: 22 December 2017 / Accepted: 5 January 2018 / Published: 8 January 2018
PDF Full-text (2712 KB) | HTML Full-text | XML Full-text
Abstract
Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box) suited to Internet of Things (IoT) applications is proposed
[...] Read more.
Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box) suited to Internet of Things (IoT) applications is proposed in this work. The structure of the 4 × 4 S-box is devised in the finite fields GF (24) and GF ((22)2). The finite field S-box is realized by multiplicative inversion followed by an affine transformation. The multiplicative inverse architecture employs Euclidean algorithm for inversion in the composite field GF ((22)2). The affine transformation is carried out in the field GF (24). The isomorphic mapping between the fields GF (24) and GF ((22)2) is based on the primitive element in the higher order field GF (24). The recommended finite field S-box architecture is combinational and enables sub-pipelining. The linear and differential cryptanalysis validates that the proposed S-box is within the maximal security bound. It is observed that there is 86.5% lesser gate count for the realization of sub field operations in the composite field GF ((22)2) compared to the GF (24) field. In the PRESENT lightweight cipher structure with the basic loop architecture, the proposed S-box demonstrates 5% reduction in the gate equivalent area over the look-up-table-based S-box with TSMC 180 nm technology. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Figures

Figure 1

Back to Top