Special Issue "Security and Privacy on the Internet of Things: Opportunities, Challenges and Solutions"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 31 May 2022.

Special Issue Editors

Dr. Ammar Alazab
E-Mail Website
Guest Editor
Melbourne Institue Technology, Australia
Interests: cyber crime and cyber security; network security; data science; digital forensics; machine learning and data mining; mobile computing; cloud computing; IoT security
Special Issues, Collections and Topics in MDPI journals
Dr. Ansam Khraisat
E-Mail Website
Guest Editor
Department of School of Information Technology, Federation University, Ballarat, VIC 3350, Australia
Interests: cybercriminal network analysis using data-mining techniques; cybercrime prevention and detection; profiling cybercrime victims; malware analysis
Prof. Dr. Savitri Bevinakoppa
E-Mail Website
Guest Editor
Melbourne Institute of Technology, Melbourne 3000, Australia
Interests: computer networks; network security; cyber security; data analytics

Special Issue Information

Dear Colleagues,

Today, the industrial internet, smart grids, smart homes, military applications, smart water networks, and intelligent transportation are infrastructure systems that connect our world more than we ever thought possible. The common vision of such systems is typically associated with the Internet of Things (IoT), where through the use of sensors, the entire physical infrastructure is closely connected with information and communication technologies, and where intelligent monitoring and management can be achieved via the usage of networked-embedded devices. Sensors allow all “things” to communicate directly with each sensor to share vital information, allowing us to monitor everything and leading to better services. Trillion-scale IoT devices including sensors and actuators are predicted to be installed in “things” such as machines, humans, vehicles, buildings, and environments in the near future. Unfortunately, this evolution of IoT devices has attracted the attention of cybercriminals who attempt to attack the defence of these devices to carry out malicious activities. Compromising the restricted resources of IoT devices opens the door to a possible attack on the end-users, including unauthorised access and exploitation of personal information. The promise of the IoT is based on the security connectivity, and when connected with large collections of connected devices, significant advantages can accrue. The success of these connected devices mainly depends on the network of the IoT architecture, with the importance of the security techniques applied in it, where issues related to security and privacy are essential.

The Special Issue at hand aims to promote the dissemination of the latest methodologies, protocols, policies, frameworks, solutions, and case studies of IoT security and privacy issues in remote sensing.

Researchers and practitioners all over the world, from both academia and industry, working in the areas of IoT and cyber physical systems are invited to discuss state-of-the-art solutions, novel issues, recent developments, applications, methodologies, architecture, algorithms, techniques, experience reports, and tools for handling information flows from/to a number of devices.

Possible topics of interest in this Special Issue include but are not limited to:

  • Access control mechanism in IoT
  • Privacy-preserving computation in IoT
  • Trust and reputation issues in IoT
  • Security architecture for IoT
  • Key management in fog computing
  • Intrusion detection in IoT
  • Security and privacy in heterogeneous IoT
  • Secure and privacy-preserving data mining and aggregation in IoT applications
  • Cross‐domain trust management in smart networks
  • Secure authentication of IoT devices
  • MAC layer security protocols for IoT applications
  • IoT security mechanisms targeting application layer protocols

Dr. Ammar Alazab
Prof. Dr. Mamoun Alazab
Dr. Ansam Khraisat
Prof. Dr. Savitri Bevinakoppa
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
Future Internet 2021, 13(8), 198; https://doi.org/10.3390/fi13080198 - 31 Jul 2021
Cited by 1 | Viewed by 1670
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In [...] Read more.
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research. Full article
Show Figures

Figure 1

Back to TopTop