IoT Security

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (15 March 2022) | Viewed by 4222

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece
Interests: wireless networks; optical networks; nanonetworks; network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada
Interests: parallel and distributed computing; embedded and ubiquitous/pervasive computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The rapid development of IoT has resulted in a tremendous increase in the connectivity of many devices and sensors deployed in various environments. The amount of sensitive data exchanged over IoT networks has also increased and IoT networks, especially those scaling to a large number of nodes embedded in the environment, such as Machine-to-Machine (M2M) and Cyber-Physical Systems (CPS), now face significant security challenges, similar to or in a greater extent than those of traditional networks.

Due to the unique characteristics of IoT networks, mainly their low cost as well as energy, bandwidth, and computational constraints, new and efficient methods to secure them are needed. Therefore, the purpose of this Special Issue is to strengthen this effort further, by inviting contributions that address security concerns, solutions and tools in IoT networks. Topics of interest include but are not limited to the following areas for IoT:

  • Protocol security
  • Privacy protection
  • Location information protection
  • Privacy and security enhancing tools
  • Standardization activities
  • Intrusion and anomaly detection

Prof. Dr. Petros Nicopolitidis
Prof. Dr. Laurence T. Yang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

32 pages, 4505 KiB  
Article
Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
by Roberto Omar Andrade, Sang Guun Yoo, Iván Ortiz-Garces and Jhonattan Barriga
Appl. Sci. 2022, 12(6), 2976; https://doi.org/10.3390/app12062976 - 15 Mar 2022
Cited by 5 | Viewed by 3208
Abstract
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is [...] Read more.
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be considered within risk assessment methodologies? We have addressed our study with a 4-phase design-research methodology (DRM) that allows us, based on systematic literature review, to experiment and draw upon expert judgment; as a final product, we obtain a risk assessment methodology based on the characteristics of IoT devices. At the end of this study, we establish seven main constructs—Organization, Risk Behaviors, Dependency, Attack Surface, Susceptibility, Severity and Uncertainty—over which security risk in IoT systems can be evaluated. Full article
(This article belongs to the Special Issue IoT Security)
Show Figures

Figure 1

Back to TopTop