Special Issue "Security in the Internet of Things"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: 1 January 2018

Special Issue Editors

Guest Editor
Dr. Shancang Li

Department of Computer Science and Creative Technologies, The University of the West of England, Bristol, UK
Website | E-Mail
Interests: cyber security; IoT; intrusion detection, vulnerability detection, lightweight cryptography, digital forensics; industrial IoT safety
Guest Editor
Prof. Dr. Li Da Xu

Department of Information Technology, Old Dominion University, Norfolk, VA 23529, USA
Website | E-Mail
Interests: enterprise information systems; enterprise integration; business intelligence; database; data warehouse; data mining; intelligent systems
Guest Editor
Prof. Houbing Song

Department of Electrical, Computer, Software, and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA
Website | E-Mail
Interests: cyber-physical systems; signal processing for communications and networking; cloud computing/edge computing
Guest Editor
Prof. Bill William Buchanan

School of Computing, Edinburgh Napier University, Edinburgh, UK
Website | E-Mail
Interests: security; cloud cecurity; web-based infrastructures; e-crime; cryptography; triage; intrusion detection systems; digital forensics; mobile computing; agent-based systems; security risk
Guest Editor
Prof. Tao Qin

Department of Computer Science, Xi’an Jiaotong University, Xi’an, China
Website | E-Mail
Interests: security; network traffic; mobile security; online social network security

Special Issue Information

Dear Colleagues,

An increasing number of smart objects are connecting to the Internet of Things (IoT) to generate meaningful results and convenience to the user community. IoT has been a new IT platform that can provide services of all sorts, ranging from smart homes to industrial applications, and from tiny monitoring systems to smart city services. However, there are still many technical challenges in IoT, such as IoT devices access control, IoT security, data privacy, data protection, safety, governance and trust, etc. This Special Issue on “Security in the Internet of Things” aims to exploit feasibility ways of improving the security, data protection, privacy, and data assurance in IoT and promoting IoT services. Potential topics include, but not limited to:

  •  Privacy and security issues in IoT
  •  Trustworthy user interfaces
  •  Secure machine-to-machine communications
  •  Dynamic trust management for IoT applications
  •  SCADA system
  •  Intrusion detection and prevention in IoT
  •  Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
  •  Security and safety in Industrial IoT 
  •  Security metrics and performance evaluation, traffic analysis techniques
  •  Social, economic and policy issues of trust, security and privacy
  •  Lightweight cryptography and security solution for IoT
  •  Cyber risk in IoT
  •  Cybercrime and digital forensics in IoT        

Dr. Shancang Li
Prof. Li Da Xu
Prof. Houbing Song
Prof. Bill William Buchanan
Prof Tao Qin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • IoT Security

  • Intrusion and vulnerability detection in IoT

  • Lightweight cryptography

  • Industry IoT security and safety

Published Papers

This special issue is now open for submission, see below for planned papers.

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Topic: The Adaptability of Blockchains in Securing IoT Protocols: Issues and Challenges
Author: David Airehrour
Abstract:The Blockchain technology provides a distributed peer-to-peer platform void of intermediaries in which non-trusting anonymous users interact and transact with confirmable verifications. Today, the Blockchain technology has sparked a global interest that has accentuated its relevance, and use in the financial industry while promoting its research and application in other sectors. This study examines the application and adaptability of the Blockchain technology to securing IoT protocols. It reviews the Blockchain technology and its inner workings. The IoT and IoT protocols domain are also investigated, and how a Blockchain-IoT protocol blend could be adopted for secure communications and operations. Finally, issues and challenges to the adaptability of the Blockchain technology in IoT protocols are discussed with a view of identifying areas of further research and investigations.

Title: Hardware Support for Security in the Internet of Things: From Lightweight Counter-Measures to Accelerated Homomorphic Encryption
Author: Regis Leveugle,
Affiliation: Grenoble Institute of Technology
Abstract: In the Internet of Things (IoT), many strong constraints have to be considered, including low cost, low power, security but with limited resources, and confidentiality of sensitive data even when they have to be processed in the cloud. In this paper, we address two very different examples showing how embedded hardware/software design can help in improving security in the IoT context. The first example targets so-called "hardware attacks" and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC) with a very lightweight counter-measure implemented against SPA, taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be garanteed by homomorphic encryption at a lower computational cost by taking advantage of an accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed.

Back to Top