Special Issue "Security in the Internet of Things"
Deadline for manuscript submissions: 1 January 2018
Prof. Bill William Buchanan
An increasing number of smart objects are connecting to the Internet of Things (IoT) to generate meaningful results and convenience to the user community. IoT has been a new IT platform that can provide services of all sorts, ranging from smart homes to industrial applications, and from tiny monitoring systems to smart city services. However, there are still many technical challenges in IoT, such as IoT devices access control, IoT security, data privacy, data protection, safety, governance and trust, etc. This Special Issue on “Security in the Internet of Things” aims to exploit feasibility ways of improving the security, data protection, privacy, and data assurance in IoT and promoting IoT services. Potential topics include, but not limited to:
- Privacy and security issues in IoT
- Trustworthy user interfaces
- Secure machine-to-machine communications
- Dynamic trust management for IoT applications
- SCADA system
- Intrusion detection and prevention in IoT
- Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
- Security and safety in Industrial IoT
- Security metrics and performance evaluation, traffic analysis techniques
- Social, economic and policy issues of trust, security and privacy
- Lightweight cryptography and security solution for IoT
- Cyber risk in IoT
- Cybercrime and digital forensics in IoT
Dr. Shancang Li
Prof. Li Da Xu
Prof. Houbing Song
Prof. Bill William Buchanan
Prof Tao Qin
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access quarterly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Intrusion and vulnerability detection in IoT
Industry IoT security and safety
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Topic: The Adaptability of Blockchains in Securing IoT Protocols: Issues and Challenges
Author: David Airehrour
Abstract:The Blockchain technology provides a distributed peer-to-peer platform void of intermediaries in which non-trusting anonymous users interact and transact with confirmable verifications. Today, the Blockchain technology has sparked a global interest that has accentuated its relevance, and use in the financial industry while promoting its research and application in other sectors. This study examines the application and adaptability of the Blockchain technology to securing IoT protocols. It reviews the Blockchain technology and its inner workings. The IoT and IoT protocols domain are also investigated, and how a Blockchain-IoT protocol blend could be adopted for secure communications and operations. Finally, issues and challenges to the adaptability of the Blockchain technology in IoT protocols are discussed with a view of identifying areas of further research and investigations.
Title: Hardware Support for Security in the Internet of Things: From Lightweight Counter-Measures to Accelerated Homomorphic Encryption
Author: Regis Leveugle, firstname.lastname@example.org
Affiliation: Grenoble Institute of Technology
Abstract: In the Internet of Things (IoT), many strong constraints have to be considered, including low cost, low power, security but with limited resources, and confidentiality of sensitive data even when they have to be processed in the cloud. In this paper, we address two very different examples showing how embedded hardware/software design can help in improving security in the IoT context. The first example targets so-called "hardware attacks" and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC) with a very lightweight counter-measure implemented against SPA, taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be garanteed by homomorphic encryption at a lower computational cost by taking advantage of an accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed.