IoT Security and Emerging Technologies

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 September 2026 | Viewed by 143

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science, University of Birmingham, Dubai International Academic City, Dubai P.O. Box 341799, United Arab Emirates
Interests: cloud computing and cloud security; network security; internet of things; multimedia communications; wireless networks; applications of machine; learning in cyber security

E-Mail Website
Guest Editor
School of Computing, Engineering and the Build Environment, University of Roehampton, London SW15 5PH, UK
Interests: cyber security; mobile application security and digital forensics

Special Issue Information

Dear Colleagues,

Current IoT security research often addresses vulnerabilities in isolation, such as cryptographic weaknesses, network protocols, hardware security or gaps in regulatory compliance. However, real-world attacks rarely respect these boundaries. Instead, adversaries, increasingly exploit cross-layer intersections, manipulating AI-driven intrusion detection systems, leveraging regulatory fragmentation to deploy insecure devices, exploiting firmware update mechanisms that lack post-quantum protection and compromising edge nodes as entry points into distributed networks. This fragmented approach is increasingly inadequate as IoT deployments scale to billions of heterogeneous devices across critical infrastructure, where single-point failures can cascade into system-wide compromises affecting public safety, economic stability and personal privacy.

Despite advances in device authentication, secure communication and intrusion detection, substantial challenges remain as IoT ecosystems continue to grow in complexity. These challenges span interconnected domains, integrating AI-driven security automation with privacy and transparency,  transitioning to post-quantum cryptographic under severe computational and energy constraints, designing zero-trust and edge-computing architectures that maintain security across heterogeneous protocols, developing operational resilience mechanisms for autonomous threat detection and recovery, establishing hardware roots of trust resilient to physical and side-channel attacks and implementing advanced security solutions that accommodate conflicting international regulations while meeting real-world constraints such as battery life, latency and legacy system integration.

This Special Issue seeks contributions that advance system-level resilience and practical deployment strategies for next-generation IoT security. Topics of interest include, but are not limited to, the following:

  • Energy-efficient and secure IoT systems using AI-driven optimization
  • Agentic AI for autonomous IoT security management
  • Security challenges in large-scale IoT deployments
  • Data privacy in IoT ecosystems
  • IoT network attacks and defenses
  • Automated compliance for IoT/OT devices
  • Automated recovery orchestration using IoT
  • Secure boot and firmware update mechanisms in IoT
  • Post-quantum cryptography and IoT
  • Regulatory and compliance challenges in IoT security
  • Federated and machine learning for privacy-preserving IoT security
  • Zero-trust architecture for IoT environments
  • Edge computing security for IoT systems
  • Healthcare IoT (IoMT) security and data protection
  • Digital forensics in IoT ecosystems

We  look forward to receiving your contributions.

Dr. Nabeel Khan
Dr. Mastaneh Davis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT security
  • system-level resilience
  • AI-driven security
  • post-quantum cryptography
  • edge computing security
  • zero-trust architecture

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers

This special issue is now open for submission.
Back to TopTop