Special Issue "IoT: Security, Privacy and Best Practices"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: 31 December 2020.

Special Issue Editor

Prof. Dr. Thaier Hayajneh
E-Mail Website
Guest Editor
Fordham Center for Cybersecurity, Fordham University, New York, USA
Interests: wireless networking security; system’s security; information assurance and privacy; crypto-resilient attacks; applied cryptography; blockchain and cryptocurrency; IoT security and privacy; cyberphysical systems and WBAN security; steganography; lightweight cryptographic algorithms and protocols; cloud-computing security; ad hoc and WSNs; secure remote patient monitoring systems; computer networks protocols and QoS; and wireless networks coexistence

Special Issue Information

Dear Colleagues,

IoT devices have penetrated through a multitude of fields beyond those originally expected. In business, the IoT is used for product optimization. IoT-based solutions are being introduced on the factory floor, where they are having a dramatic impact on quality control through the detection of substandard production and material use. This promotes brand value by ensuring adherence to product specifications. Additionally, we are experiencing the use the IoT in financial decision processes, by providing real-time information of a holistic enterprise view that is complemented by data from resource planning and accounting systems. In academia, the IoT can be used to automatically track and deliver data records. Local governments are exploiting the IoT to increase the efficiency and safety of services provided to their population. The use of the IoT is integral to successful traffic management and mass transportation control. Accompanied by the increase in popularity and usage/reliance comes an increased possibility of cyberattack. It is a widely accepted theory that in many cases, malicious actors target popular devices for susceptible attack surfaces to amplify the effect of successful exploitation. Therefore, it is crucial to assess, understand, and, if possible, improve the protocols and security measures used in the devices and endpoints in an endeavor to create a safe environment for the user. A layered approach will provide optimal network and device defense. The perimeter security of an IoT network is essential for preventing breaches. Perimeter defense techniques include firewalls, IDS/IPSs, physical access controls, and network access control lists.
The Special Issue aims to gather innovative security solutions for IoT. We aim for security solutions the variety of IoT family including but not limited to: wireless sensor networks (WSN), wireless body area networks (WBANs), etc. Topics of interest include but are not limited to:

  • IoT privacy and security;
  • WSN security;
  • WBAN privacy and security;
  • Cloud-based IoT security;
  • Machine learning for IoT security;
  • IoT hardware security;
  • Blockchain for IoT security;
  • Industrial IoT security;
  • Medial IoT privacy and security;
  • Cryptography in IoT;
  • Layered security principles and ways to enhance perimeter defense in the IoT;
  • IoT gateway vulnerabilities and best practices of defense;
  • The malicious impact on IoT, Thingbots, Hivenets;
  • Forensics in IoT;
  • Law, Policy, and Privacy in IoT.

Prof. Dr. Thaier Hayajneh
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)
Computers 2020, 9(1), 8; https://doi.org/10.3390/computers9010008 - 07 Feb 2020
Abstract
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home sensors, and [...] Read more.
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home sensors, and other related IoT devices. Due to the demand to rapidly release new IoT products in the market, security aspects are often overlooked as it takes time to investigate all the possible vulnerabilities. Since IoT devices are internet-based and include sensitive and confidential information, security concerns have been raised and several researchers are exploring methods to improve the security among these types of devices. Software defined networking (SDN) is a promising computer network technology which introduces a central program named ‘SDN Controller’ that allows overall control of the network. Hence, using SDN is an obvious solution to improve IoT networking performance and overcome shortcomings that currently exist. In this paper, we (i) present a system model to effectively use SDN with IoT networks; (ii) present a solution for mitigating man-in-the-middle attacks against IoT that can only use HTTP, which is a critical attack that is hard to defend; and (iii) implement the proposed system model using Raspberry Pi, Kodi Media Center, and Openflow Protocol. Our system implementation and evaluations show that the proposed technique is more resilient to cyber-attacks. Full article
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices)
Open AccessArticle
A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication
Computers 2020, 9(1), 4; https://doi.org/10.3390/computers9010004 - 20 Jan 2020
Abstract
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recent literature has shown that developing a WSN with Cooperative Communication [...] Read more.
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recent literature has shown that developing a WSN with Cooperative Communication greatly increases the performance of the network, but also exposes new vulnerabilities. The technique operates by transmitting packets of data to neighboring relay nodes in a cooperative fashion to reach the destination. In this paper, we consider security issues in WSNs with cooperative communication on each layer of the OSI model: physical layer, data link layer, network layer, service (topology) layer, and application layer. For each layer, we clarify the main task, enumerate the main attacks and threats, specify the primary security approaches and techniques (if any), and discuss possible new attacks and problems that may arise with the use of cooperative communications. Furthermore, we show for some attacks (e.g., jamming, packet dropping, and wormhole) that using cooperative communication improves the network resiliency and reliability. Finally, we propose a security protocol that addresses many of these shortcomings, while outlining the remaining issues that need further work and research. Full article
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices)
Show Figures

Figure 1

Back to TopTop