sensors-logo

Journal Browser

Journal Browser

Security, Privacy and Cybersecurity in Internet of Things (IoT)

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 October 2024 | Viewed by 607

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Informatics, Cardiff University, Cardiff CF10 3AT, UK
Interests: Internet of Things; sensing as a service; privacy; infrastructure and architectures; fog/edge computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The proliferation of Internet of Things (IoT) devices has transformed everyday life, offering unprecedented levels of convenience, efficiency, and automation. However, this rapid expansion also introduces significant challenges in terms of security, privacy, and cybersecurity. IoT devices, ranging from smart home appliances to industrial sensors, often lack robust security measures, making them vulnerable to attacks. These vulnerabilities can lead to unauthorized access, data breaches, and even large-scale network disruptions. Privacy concerns also emerge as these devices collect, transmit, and store vast amounts of personal data, raising questions about data usage, consent, and ownership.

Furthermore, the interconnected nature of IoT devices means that a breach in one device can potentially compromise the security of the entire network. Addressing these challenges requires a multidisciplinary approach, not only encompassing technological solutions (such as encryption and secure communication protocols) but also regulatory frameworks and user education. Ensuring the secure and privacy-preserving deployment of IoT technologies is crucial for harnessing their full potential while safeguarding against cyber threats.

Dr. Charith Perera
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things (IoT)
  • cybersecurity and privacy
  • data breach and encryption
  • secure communication protocols
  • regulatory frameworks
  • user education
  • network security
  • vulnerability management

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 879 KiB  
Article
Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes
by Zihou Zhang, Jiangtao Li, Yufeng Li and Yuanhang He
Sensors 2024, 24(10), 2989; https://doi.org/10.3390/s24102989 - 8 May 2024
Viewed by 446
Abstract
Edge computing provides higher computational power and lower transmission latency by offloading tasks to nearby edge nodes with available computational resources to meet the requirements of time-sensitive tasks and computationally complex tasks. Resource allocation schemes are essential to this process. To allocate resources [...] Read more.
Edge computing provides higher computational power and lower transmission latency by offloading tasks to nearby edge nodes with available computational resources to meet the requirements of time-sensitive tasks and computationally complex tasks. Resource allocation schemes are essential to this process. To allocate resources effectively, it is necessary to attach metadata to a task to indicate what kind of resources are needed and how many computation resources are required. However, these metadata are sensitive and can be exposed to eavesdroppers, which can lead to privacy breaches. In addition, edge nodes are vulnerable to corruption because of their limited cybersecurity defenses. Attackers can easily obtain end-device privacy through unprotected metadata or corrupted edge nodes. To address this problem, we propose a metadata privacy resource allocation scheme that uses searchable encryption to protect metadata privacy and zero-knowledge proofs to resist semi-malicious edge nodes. We have formally proven that our proposed scheme satisfies the required security concepts and experimentally demonstrated the effectiveness of the scheme. Full article
(This article belongs to the Special Issue Security, Privacy and Cybersecurity in Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop