Redesigning Computer Hardware Software Interfaces for IoT Security
A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".
Deadline for manuscript submissions: 31 March 2026 | Viewed by 105
Special Issue Editor
Interests: predictive maintenance; heath monitoring for ground and aerial vehicles; data analytics; AI; innovation; nonlinear systems analysis and synthesis; adaptation; estimation; filtering; control; general artificial intelligence
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
Insecure hardware–software interfaces at various levels in modern networks are no longer minor inconveniences like data loss or delays. They now pose significant risks to safety, finances, and local and global ecosystems, as networks with sensing and computing have become ubiquitous and control large flows of energy. These include everything from baby monitors to water and power supplies, financial markets, and autonomous vehicles.
As an analogy, a secure system is like a locked chamber with a combination lock that takes many trials to open. If the lock has an alarm and resets itself periodically, or is dynamic, it is harder to break into the room. Networks are more complex because many players may be involved in performing or defending against coordinated attacks on multiple targets using sophisticated software and hardware tools. Thus, these problems resemble multiplayer stochastic games characterized by information asymmetry and deception. Attackers, network administrators, coders, and users are all considered players.
The purpose of this call for papers is to promote interdisciplinary creativity by integrating various fields, such as computing, operating systems, compilers, circuits, sensors, signal processing, algorithms, control systems, and games, with the goal of developing solutions to address this urgent problem.
To sustain the growth of the Internet of Things while protecting property rights and individual privacy, this issue calls for contributions that provide rigorous evidence of performance robustness, including service continuity, network throughput, data reliability, and the fidelity of networked sensors in the presence of malicious attacks at any network layer. How do you ensure that someone does not hack into a baby monitor to scare the baby, crash autonomous vehicles, disrupt financial markets, compromise water supply, or damage the power grid?
This Special Issue particularly encourages submissions involving the following aspects:
- Guarantees of robust autonomous performance without continual software updates or administrator intervention.
- Quantifying the worst-case attacking strategy, such as signal power in Watts, computing power in FLOPS, and the number of attackers that can successfully degrade performance as is known for CDMA or DWDM networks, GPS, or public key cryptography.
- The ability to adapt against learning opponents, such as users of GaNs, or to deny information from such adversaries.
We welcome contributions related to operating systems that track all legitimate tasks, custom circuits, and software that operate within a network, as well as hardware designs and algorithms of different kinds addressing signal processing, control, game-theoretic problems, or novel hardware-software combinations. The guarantees of robustness can be experimental, provided through mathematical analysis of clearly established models, or exhaustive simulation with reliable mathematical models.
Software has many vulnerabilities due to factors such as being written for backward compatibility, the use of open-source materials, dependence on compilers dating back to the 1950s, attackers’ ability to hide in memory or OS functions, and so on. Additionally, networked sensors can be spoofed, as their signal power is much weaker compared to the power available to a physical-layer attacker. Thus, we hope this issue further stimulates research into fundamental software and hardware solutions.
Dr. Kartik B. Ariyur
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- stochastic multiplayer games
- information asymmetry
- denial
- deception
- robustness
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.
Further information on MDPI's Special Issue policies can be found here.