Special Issue "Security and Reliability of IoT---Selected Papers from SecRIoT 2019"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: 30 December 2019.

Special Issue Editors

Dr. Athanasios Kakarountas
E-Mail Website
Guest Editor
Department of Computer Science and Biomedical Informatics, University of Thessaly, GR-35131, Lamia, Greece
Interests: computer architecture; embedded systems; IoT; Hardware security; hardware accelerator
Dr. Vasileios Vlachos
E-Mail Website
Guest Editor
Department of Computer Science and Engineering, University of Thessaly, GR-41110, Larissa, Greece
Interests: information systems security; computer virology; computer epidemiology; peer-to-peer networks; open source software
Special Issues and Collections in MDPI journals
Dr. Periklis Chatzimisios
E-Mail Website
Guest Editor
Department of Informatics, Alexander TEI of Thessaloniki, GR-57400, Sindos, Greece
Interests: mobile/wireless communications; internet of things; big data and vehicular networking
Special Issues and Collections in MDPI journals
Dr. Ioannis Chochliouros
E-Mail Website
Guest Editor
Research Programs Section, Hellenic Telecommunications Organisation, GR-15124, Athens, Greece
Interests: innovation; network technology; network management; e-Infrastructures and e-Services

Special Issue Information

Dear Colleagues,

This issue is dedicated to the 1st International Workshop on Security and Reliability of IoT Systems (SecRIoT 2019), devoted to topics related to recent trends and progress made in the field of the secure design, deployment, and operation of current and future IoT systems. SecRIoT 2019 will take place on the beautiful island of Santorini, Greece, 29–31 May 2019, collocated with the 15th Annual International Conference on Distributed Computing in Sensor Systems (DCOSS 2019).

In the coming years, more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of novel services. Currently, most of the new electronic devices are offering basic-to-advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors, and Internet-enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and network communications, operating systems and software applications, only a limited amount of this knowledge has been applied to IoT ecosystems. Most of the IoT devices, including modern vehicles, suffer from numerous and multilayered vulnerabilities. Aiming to reduce the cost and minimize the time to market of their products, minimal or no effort is put towards securing and supporting them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware, demonstrating a total lack of operations security in the supply chain. In contrast with software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As a consequence, these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT botnets signify the magnitude of the problem. This is an open call for contributions to both SecRIoT 2019 and this issue.

Topics of interest include, but are not limited to:

  • IoT security and privacy;
  • IoT intrusion detection and prevention systems;
  • Cyber physical security and IoT;
  • Secure design methodologies for IoT Systems;
  • Secure hardware and software codesign;
  • Development of secure embedded systems;
  • Secure embedded operation systems;
  • IoT malware;
  • Autonomous vehicles cybersecurity;
  • Secure network protocols for IoT systems;
  • IoT and blockchain;
  • Secure manufacturing process of IoT devices;
  • Privacy protection in IoT environments;
  • Security and privacy of medical devices;
  • IoT trust and reliability;
  • Reliable robotic devices.

Dr. Athanasios Kakarountas
Dr. Vasileios Vlachos
Dr. Periklis Chatzimisios
Dr. Ioannis Chochliouros
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Threat Analysis for Smart Homes
Future Internet 2019, 11(10), 207; https://doi.org/10.3390/fi11100207 - 25 Sep 2019
Abstract
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing [...] Read more.
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing states. In this paper, we focus on the smart home environment, where the deployment of IoT devices increase the attack surface. We examine existing dynamic risk assessment methodologies, and by leveraging a smart home reference architecture we identify the security risks of a smart home’s physical and communication viewpoints, taking into consideration also dynamic operational aspects. Further, we develop a smart home network topology generator and a graph-based attack model to study dependencies among dynamically changing states and the propagation of a malware infection. Full article
(This article belongs to the Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019)
Show Figures

Figure 1

Back to TopTop