Security in the Internet of Things (IoT)

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (20 February 2024) | Viewed by 2306

Special Issue Editors

BISITE Research Group, University of Salamanca, 37007 Salamanca, Spain
Interests: artificial intelligence; blockchain; deep learning; satellite systems; robot vision; cognitive robotics; sensor fusion; data fusion; mobile robotics; wireless networks; robotics; security; Internet of Things
Special Issues, Collections and Topics in MDPI journals
1. AIR Institute, Deep Tech Lab, Paseo de Belén 9A, 47011 Valladolid, Spain
2. BISITE Research Group, University of Salamanca, 37008 Salamanca, Spain
3. Higher School of Engineering and Technology, International University of La Rioja (UNIR), 26006 Logroño, Spain
Interests: Internet of Things; edge computing; distributed ledger and blockchain technologies; embedded systems; indoor location systems; cloud computing; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The number of new Internet-connected devices is growing year on year. While connections from non-IoT devices have been increasing moderately in recent years, connections from IoT devices are growing at a much faster rate, driven especially by 5G IoT, low-power wireless area networks (LP-WANs) and wireless personal area networks (WPANs). IoT now represents a key digital enabling technology in sectors, such as Industry 4.0/5.0, smart cities and smart territories, e-healthcare, e-entertainment, smart homes and buildings, and agriculture. However, one of the main challenges facing IoT solutions is cybersecurity. IoT devices often have reduced computational capabilities (e.g., CPU, RAM) to minimize their size and power consumption, which makes it difficult for them to encrypt information using traditional protocols or the ability to run intelligent processes or agents to combat cyber-attacks or protect the privacy of user data. In fact, one of the main cybersecurity issues in the IoT domain is the identification of the devices that connect to the networks. In this sense, it is necessary to investigate and validate new technologies and techniques aimed at dealing with the different cybersecurity issues that may appear in IoT scenarios.

For this purpose, this Special Issue will be focusing upon, but not limited to the following topics:

  • Novel cybersecurity architectures, protocols and algorithms in IoT and Edge-IoT scenarios;
  • Distributed and collaborative knowledge and data privacy management;
  • Security information and event management (SIEM) in IoT scenarios;
  • Cyber threat intelligence modelling and identification frameworks in IoT;
  • Security and privacy frameworks for transferring data and models in Edge-IoT scenarios;
  • Trustworthy Artificial Intelligence applied to cybersecurity and data privacy in IoT scenarios;
  • Imitation learning and reinforcement learning for cyberattack detection and mitigation;
  • Multi-agent systems and virtual agent organizations for cybersecurity in IoT scenarios;
  • Federated learning and federated reinforcement learning for data privacy;
  • Deep Learning and Deep Reinforcement Learning at the Edge for cybersecurity in IoT and Industrial IoT;
  • Intelligent algorithms to manage software-defined networks and network function virtualization in Edge-IoT scenarios.

Dr. Javier Prieto
Dr. Ricardo Alonso
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Internet of Things
  • cybersecurity
  • edge computing
  • artificial intelligence
  • federated learning
  • data privacy

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


19 pages, 2594 KiB  
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
Future Internet 2023, 15(8), 280; - 21 Aug 2023
Cited by 1 | Viewed by 1527
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may have largely been caused by the integration of open network to [...] Read more.
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may have largely been caused by the integration of open network to operation technology (OT) as a result of low-cost network expansion. The connection of OT to the internet for firmware updates, third-party support, or the intervention of vendors has exposed the industry to attacks. The inability to detect these unpredictable cyber-attacks exposes the PCN, and a successful attack can lead to devastating effects. This paper reviews the different forms of cyber-attacks in PCN of oil and gas installations while proposing the use of machine learning algorithms to monitor data exchanges between the sensors, controllers, processes, and the final control elements on the network to detect anomalies in such data exchanges. Python 3.0 Libraries, Deep-Learning Toolkit, MATLAB, and Allen Bradley RSLogic 5000 PLC Emulator software were used in simulating the process control. The outcomes of the experiments show the reliability and functionality of the different machine learning algorithms in detecting these anomalies with significant precise attack detections identified using tree algorithms (bagged or coarse ) for man-in-the-middle (MitM) attacks while taking note of accuracy-computation complexity trade-offs. Full article
(This article belongs to the Special Issue Security in the Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop