New Trends in Cybersecurity and Hardware Design for IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 December 2026 | Viewed by 645

Special Issue Editors

School of Computer Science and Technology, Xi’an University of Posts & Telecommunications, Xi'an 710121, China
Interests: hardware security; hardware trojan detection; PUF; TRNG; security protocol; system architecture security; blockchain; edge computing
Special Issues, Collections and Topics in MDPI journals
School of Computer Science and Technology, North University of China, Taiyuan 030051, China
Interests: reconfigurable computing system; computing reliability; hardware security

E-Mail Website
Guest Editor
School of Systems Information Science, Future University Hakodate, Hakodate 041-8655, Japan
Interests: wireless networks; network security; optical networks; router/switch design
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Technology, Xi’an University of Posts & Telecommunications, Xi'an 710121, China
Interests: Internet of Services; industiral big data; wireless sensor network; anomaly detection; Internet of Things

Special Issue Information

Dear Colleagues,

With the accelerated penetration of Internet of Thing (IoT) technology into critical areas such as industrial Internet and smart cities, security issues are still a focus of attention. Traditional IoT devices generally lack considerations of security mechanisms during the hardware design stage, resulting in widespread exposure of known vulnerabilities that can be exploited. Although AI/LLM techniques have enhanced the security protection abilities of the IoTs, new threats such as quantum computing cracking and deepfake instructions are still emerging, while the existing protective measures struggle to tackle these rapidly evolving attacks. Therefore, we must urgently build a new generation of security architecture that integrates hardware-based trust mechanisms and AI/LLM-driven dynamic defenses to provide full-stack protection for the IoT eco-system.

This Special Issue seeks cutting-edge advances, techniques, insights and innovative solutions to tackle the emerging security issues and challenges in the scenario of the integration of cybersecurity and hardware design, exploring cross-domain collaborative protection schemes of "chip-network-platform-application" and new paradigm of "trusted hardware +AI/LLM defense".

Topics of interest for the Special Issue include (but are not limited to) the following:

  • Hardware-trusted roots (PUF, TRNG, PQC, RFF, and other security primitives);
  • Co-design/verification of security elements and hardware/software for IoT systems;
  • Advances in dynamic secure IoT architecture attack and defense;
  • New network and physical attack, evolution and analysis;
  • Real-time threat perception and response mechanism in the IoT scenarios;
  • Distributed identity authentication protocols under resource-constrained conditions;
  • Endogenous security and immune protection for IoT application;
  • Integration of RISC-V, blockchain, zero trust mechanisms, hardware accelerators and quantum computing, etc., with IoT

We encourage researchers and practitioners including individuals, academics, organizations, and industries to contribute original research and innovative approaches to explore advancements and innovations in "secure native" IoT architecture and ecosystems.

Dr. Zhao Huang
Dr. Zeyu Li
Prof. Dr. Xiaohong Jiang
Dr. Yanping Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • hardware security primitives
  • design for security and test
  • secure IoT architecture attack and defense
  • secure protocols
  • RISC-V
  • blockchain
  • ASIC/FPGA/GPU-based hardware accelerators
  • quantum computing
  • zero trust and privacy protection
  • endogenous security and proactive defense

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

18 pages, 60646 KB  
Article
XORSFRO: A Resource-Efficient XOR Self-Feedback Ring Oscillator-Based TRNG Architecture for Securing Distributed Photovoltaic Systems
by Wei Guo, Rui Xia, Jingcheng Wang, Bosong Ding, Chao Xiong, Yuning Zhao and Jinping Li
Electronics 2026, 15(1), 71; https://doi.org/10.3390/electronics15010071 - 23 Dec 2025
Viewed by 226
Abstract
The performance of true random number generators (TRNGs) fundamentally depends on the quality of their entropy sources (ESs). However, many FPGA-friendly designs still rely on a single mechanism and struggle to achieve both high throughput and low resource cost. To address this challenge, [...] Read more.
The performance of true random number generators (TRNGs) fundamentally depends on the quality of their entropy sources (ESs). However, many FPGA-friendly designs still rely on a single mechanism and struggle to achieve both high throughput and low resource cost. To address this challenge, we propose the exclusive OR (XOR) Self-Feedback Ring Oscillator (XORSFRO), an XORNOT-style TRNG that integrates two cross-connected XOR gates with a short inverter delay chain and clocked sampling. A unified timing model is developed to describe how arrival-time skew and gate inertial delay lead to cancellation, narrow-pulse generation, and inversion events, thereby enabling effective entropy extraction. Experimental results on Xilinx Spartan-6 and Artix-7 FPGAs demonstrate that XORSFRO maintains stable operation across standard process–voltage–temperature (PVT) variations, while achieving higher throughput and lower hardware overhead compared with recent FPGA-based TRNGs. The generated bitstreams pass both the NIST SP 800-22 and NIST SP 800-90B test suites without post-processing. Full article
(This article belongs to the Special Issue New Trends in Cybersecurity and Hardware Design for IoT)
Show Figures

Figure 1

Review

Jump to: Research

43 pages, 1328 KB  
Review
FPGA-Based Reconfigurable System: Research Progress and New Trend on High-Reliability Key Problems
by Zeyu Li, Pinle Qin, Rui Chai, Yuchen Hao, Dongmei Zhang and Hui Li
Electronics 2026, 15(3), 548; https://doi.org/10.3390/electronics15030548 - 27 Jan 2026
Viewed by 73
Abstract
FPGA-based reconfigurable systems play a vital role in many critical domains by virtue of their unique advantages. They can effectively adapt to dynamically changing application scenarios, while featuring high parallelism and low power consumption. As a result, they have been widely adopted in [...] Read more.
FPGA-based reconfigurable systems play a vital role in many critical domains by virtue of their unique advantages. They can effectively adapt to dynamically changing application scenarios, while featuring high parallelism and low power consumption. As a result, they have been widely adopted in key sectors such as aerospace, nuclear industry, and weapon equipment, where high performance and stability are of utmost importance. However, these systems face significant challenges. The continuous and drastic reduction in chip process size has led to increasingly complex and delicate internal circuit structures and physical characteristics. Meanwhile, the operating environments are often harsh and unpredictable. Additionally, the adoption of untrusted third-party foundries to reduce development costs further compounds these issues. Collectively, these factors make such systems highly susceptible to reliability threats, including environmental radiation, aging degradation, and malicious hardware attacks. These problems severely impact the stable operation and functionality of the systems. Therefore, ensuring the highly reliable operation of reconfigurable systems has become a critical issue that urgently needs to be addressed. There is a pressing need to summarize their technical characteristics, research status, and development trends comprehensively and in depth. In response, this paper conducts relevant research. By systematically reviewing 183 domestic and international research papers published between 2012 and 2024, it first provides a detailed analysis of the root causes of reliability issues in reconfigurable systems, thoroughly exploring their underlying mechanisms. Second, it focuses on the key technologies for achieving high reliability, encompassing four types of fault-tolerant design technologies, three types of aging mitigation technologies, and two types of hardware attack defense technologies. The paper comprehensively summarizes relevant research findings and the latest advancements in this field, offering a wealth of references for related research. Finally, it conducts a detailed comparative analysis and summary of the research hotspots in the field of high-reliability reconfigurable systems. It objectively evaluates the achievements and shortcomings of current research efforts and delves into the development trends of key technologies for high-reliability reconfigurable systems, providing clear directions for future research and practical applications. Full article
(This article belongs to the Special Issue New Trends in Cybersecurity and Hardware Design for IoT)
Back to TopTop