Blockchain for Internet of Things Security and Privacy

A special issue of Cryptography (ISSN 2410-387X). This special issue belongs to the section "Blockchain Security".

Deadline for manuscript submissions: closed (30 September 2023) | Viewed by 3718

Special Issue Editors


grade E-Mail Website
Guest Editor
1. Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW 2007, Australia
2. University Research and Innovation Center (EKIK), Óbuda University, 1034 Budapest, Hungary
Interests: data analytics; machine learning; evolutionary computation; engineering optimization
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of CSE, School of Technology, GITAM, Visakhapatnam, Andhra Pradesh, India
Interests: blockchain; IoT security; cryptography; machine learning

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is expanding quickly, resulting in dramatic evolutions of IoT-enabled smart systems and applications, utilizing various networks, remote sensors, and endpoint appliances. However, these IoT smart devices might easily be the target of large-scale cyber-attacks, posing risks to the security and privacy of IoT data. A potential solution for IoT security and privacy is blockchain technology, which represents a decentralized, distributed, shared, and immutable database ledger that stores a registry of assets. This is especially relevant when dealing with large-scale heterogeneous data collected via smart sensors and devices, distributed via communication networks, and typically processed in real-time. In recent years, blockchain technology has become a field with enormous potential, growth, and impact. Its capabilities include ensuring a secure environment for IoT data storage, processing, and communication, as well as addressing IoT security and privacy issues in both academic and industrial fields.

This Special Issue is seeking contributions relating, but not limited, to the following topics: new secure network architecture for the Internet of Things powered by blockchain; blockchain for IoT computing security and privacy; lightweight authentication protocols for IoT applications; energy-efficient communication protocols for IoT; secure key management in a decentralized IoT network; IoT data management with smart blockchain; decentralized computing for IoT security; secure IoT system design based on blockchain; applications for intelligent IoT security and privacy using blockchain; data analytics based on blockchain in IoT systems; and performance optimization of blockchains in IoT.

Prof. Dr. Amir H. Gandomi
Dr. Bhabendu Kumar Mohanta
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • security
  • privacy
  • blockchain
  • decentralized network

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 358 KiB  
Article
Enhanced Authentication for Decentralized IoT Access Control Architecture
by Jeong Hwa Kang and Minhye Seo
Cryptography 2023, 7(3), 42; https://doi.org/10.3390/cryptography7030042 - 21 Aug 2023
Viewed by 2681
Abstract
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, [...] Read more.
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To comprehensively mitigate these issues, we presents a novel IoT access control architecture in this paper. The proposed architecture leverages the OAuth framework for authorization and the decentralized identity technology to enhance the authentication and authorization processes. Full article
(This article belongs to the Special Issue Blockchain for Internet of Things Security and Privacy)
Show Figures

Figure 1

Back to TopTop