Special Issue "Blockchain and Machine Learning for IoT: Security and Privacy Challenges"
Deadline for manuscript submissions: 28 February 2022.
Interests: security and privacy; computer modeling and simulation; information systems; computer networks
Special Issues, Collections and Topics in MDPI journals
Interests: high performance networking protocols and architectures; routing algorithms; network security
Special Issues, Collections and Topics in MDPI journals
Special Issue in Applied Sciences: Novel Algorithms and Protocols for Networks
Special Issue in Network: Blockchain and Machine Learning for IoT: Security and Privacy Challenges
Special Issue in Applied Sciences: Novel Algorithms and Protocols for Networks, Volume II
The pervasiveness of IoT technologies in a variety of fields is changing our lives. Industry, agriculture, health, and even personal life are experiencing a revolution in the way data are collected, communicated, processed, and stored. In recent years, two other technologies have begun to be used in synergy with IoT: Blockchain, which has changed the way data are stored, and machine learning, which has changed the way data are processed. With these premises in mind, it is desirable for researchers to focus their attention not just on the performance and features of the new systems but also on the new security and privacy issues related to this revolution.
This Special Issue invites researchers to contribute with original contributions, case studies, and reviews that address all new challenges due to the use of IoT in synergy with blockchain systems and/or machine learning techniques.
The topics relevant for this Special Issue include (but are not limited to):
- Security and privacy in blockchain technology for IoT;
- Intelligent systems for fraud detection and forensics in blockchain environments;
- Innovative architectures and protocols for safe blockchain application in IoT;
- Blockchain and trust management;
- Blockchain-based solutions for IoT security;
- Novel machine learning and data science methods for IoT security;
- Generative adversarial networks (GAN) in IoT security;
- Architectures and protocols for scalable, secure, robust, and privacy enhancing IoT;
- Privacy preservation in IoT;
- Vulnerability analysis, threat modeling, and risk assessment in IoT;
- Intrusion detection for IoT;
- Novel security architectures, protocols, or applications for IoT.
Dr. Michele Mastroianni
Prof. Dr. Francesco Palmieri
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- Machine Learning
- Risk Analysis
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Planned Paper 1:
A Survey of Cybersecurity Issues and Challenges in V2X Communication Technology for VANETs
Eslam Farsimadan, Francesco Palmieri, Leila Moradi, Dajana Conte, Beatrice Paternoster
Abstract: Nowadays, both sciences and technology, including Intelligent Transportation Systems, are involved in improving current approaches. Overview studies give you fast, comprehensive, and easy access to all of the existing strategies in the eld. With this inspiration, and the eect of trac congestion as a challenging issue that aects the regular daily lives of millions of people around the world, in this work, we concentrate on cyber security issues and challenges in communication paradigms, which can be used to address trac congestion problems. Vehicular Ad-hoc Networking (VANET), a modern networking technology, provides innovative techniques for vehicular trac control and management. Virtual trac light (VTL) methods for VANET seek to address trac issues through using vehicular network communication models. These communication paradigms can be classified into four scenarios: Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) and Vehicle-to-Network (V2N) and Vehicle-to-Pedestrian (V2P). In general, these four scenarios are included in the category of vehicle-to-everything (V2X). Security issues are essential in V2X, as they are in other wireless technologies. Security issues are crucial in V2X, as they are in other wireless technologies. Security issues are essential in V2X, as they are in other wireless technologies. In this paper, we highlight and investigate the most important V2X security issues. The principal purpose of this survey is to provide a comprehensive and systematic overview of various research directions and methodologies, with a focus on security concerns and challenges in V2X communication technologies. First, we go through the fundamental properties of V2X and concentrate on the tandardization approaches applied in communication technologies. Then, we discuss V2X security issues and requirements.