IoT: Security, Privacy and Best Practices (3rd Edition)
A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".
Deadline for manuscript submissions: 31 August 2026 | Viewed by 11
Special Issue Editors
Interests: security; information assurance and privacy; crypto-resilient attacks; applied cryptography; blockchain and cryptocurrency; IoT security and privacy; cyberphysical systems and WBAN security; steganography; lightweight cryptographic algorithms and protocols; cloud-computing security; Ad Hoc and WSNs; ecure remote patient monitoring systems; computer networks protocols and QoS; wireless networks coexistence
Special Issues, Collections and Topics in MDPI journals
Interests: biometric authentication; wireless body area networks security; wireless sensor networks security, algorithms and protocols; internet of things security and privacy
Special Issue Information
Dear Colleagues,
IoT devices have penetrated through a multitude of fields beyond those originally expected. In business, the IoT is used for product optimization, with IoT-based solutions being introduced on the factory floor, where they are having a dramatic impact on quality control through the detection of substandard production and material use. This promotes brand value by ensuring adherence to product specifications. Additionally, we are seeing the use of the IoT in financial decision processes, where it provides real-time information of a holistic enterprise view that is complemented by data from resource planning and accounting systems. In academia, the IoT can be used to automatically track and deliver data records. Local governments are exploiting the IoT to increase the efficiency and safety of services provided to their population. The use of the IoT is integral to successful traffic management and mass transportation control. Accompanied by the increase in popularity and usage/reliance comes an increased possibility of cyberattacks. It is a widely accepted theory that, in many cases, malicious actors target popular devices for susceptible attack surfaces to amplify the effect of successful exploitation. Therefore, it is crucial to assess, understand, and, if possible, improve the protocols and security measures used in these devices and endpoints in an endeavor to create a safe user environment. A layered approach will provide optimal network and device defense. The perimeter security of an IoT network is essential for preventing breaches, and perimeter defense techniques include firewalls, IDS/IPSs, physical access controls, and network access control lists.
The Special Issue aims to gather innovative security solutions for the IoT. We aim to explore security solutions for the whole IoT family, including wireless sensor networks (WSN), wireless body area networks (WBANs), etc. Topics of interest include but are not limited to the following:
- IoT privacy and security;
- WSN security;
- WBAN privacy and security;
- Cloud-based IoT security;
- Machine learning for IoT security;
- IoT hardware security;
- Blockchain for IoT security;
- Industrial IoT security;
- Medial IoT privacy and security;
- Cryptography in IoT;
- Layered security principles and ways to enhance perimeter defense in the IoT;
- IoT gateway vulnerabilities and best practices of defense;
- The malicious impact on IoT, Thingbots, Hivenets;
- Forensics in IoT;
- Law, policy, and privacy in IoT.
Prof. Dr. Thaier Hayajneh
Dr. Abdullah Al Hayajneh
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- IoT security
- IoT privacy
- perimeter defense
- IoT vulnerabilities
- innovative security solutions
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.
Further information on MDPI's Special Issue policies can be found here.
Related Special Issues
- IoT: Security, Privacy and Best Practices in Computers (7 articles)
- IoT: Security, Privacy and Best Practices 2024 in Computers (3 articles)

