IoT Networks Security

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 10 September 2026 | Viewed by 656

Special Issue Editors


E-Mail Website
Guest Editor
Electrical and Computer Engineering Department, The William States Lee College of Engineering, University of North Carolina at Charlotte, Charlotte, NC 28223, USA
Interests: AI; wireless communications; cyber security; machine learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Artificial Intelligence Research Center, University of North Dakota, Grand Forks, ND 58202, USA
Interests: artificial intelligence; wireless communications & networking; autonomous cybersecurity; sensing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

IoT network security continues to face several research challenges due to the extensive scale, heterogeneity, and resource constraints of connected devices. Traditional security mechanisms are often too heavy for the IoT, creating a need for lightweight yet robust cryptographic protocols and scalable authentication methods. Machine learning is being widely explored for intrusion detection, but obstacles such as high false positives, poor generalization, and vulnerability to adversarial attacks remain unsolved. Ensuring privacy-preserving data sharing through federated learning, securing over-the-air updates, and developing post-quantum cryptography suitable for constrained devices are also critical areas of study. Moreover, IoT networks remain vulnerable to large-scale botnets, insecure edge/fog nodes, and interoperability issues due to the lack of standardized security frameworks. These challenges highlight the urgent need for adaptive, explainable, and resource-efficient solutions to secure the future of IoT networks.

This Special Issue will disseminate new solutions, techniques, and case studies pertaining to IoT cyber-security challenges. Its objective is to publish high‐quality articles presenting security algorithms, protocols, frameworks, and solutions for IoT networks. Relevant papers detailing unpublished, original, and state‐of‐the‐art research and not currently under review by a conference or journal will be considered.

Potential topics of interest for this Special Issue include, but are not limited to, the following:

  • Lightweight and scalable security protocols;
  • Zero-trust and adaptive security architectures;
  • Intrusion and anomaly detection through AI/ML;
  • Federated and privacy-preserving learning;
  • Secure device identity and authentication;
  • Resilient and secure firmware updates;
  • Post-quantum cryptography for the IoT;
  • IoT botnet detection and mitigation;
  • Secure edge/fog computing;
  • Blockchain and distributed ledgers for the IoT;
  • Standardization and interoperability;
  • Explainable and trustworthy IoT security.

Dr. Fatima Salahdine
Prof. Dr. Naima Kaabouch
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • internet of things
  • cyber-security
  • artificial intelligence

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 787 KB  
Article
Multi-Criteria Selection of Network Security Configuration Using NSGA-II
by Bagdat Yagaliyeva, Valery Lakhno, Myroslav Lakhno, Boris Gusev, Kaiyrbek Makulov and Tomiris Sundet
Future Internet 2026, 18(3), 134; https://doi.org/10.3390/fi18030134 - 5 Mar 2026
Viewed by 370
Abstract
The problem of multi-criteria selection of network security configurations (NSC) under resource constraints and the necessity to comply with information security (IS) policies is addressed in this study. A formal mathematical model of the problem has been developed, encompassing the definition of a [...] Read more.
The problem of multi-criteria selection of network security configurations (NSC) under resource constraints and the necessity to comply with information security (IS) policies is addressed in this study. A formal mathematical model of the problem has been developed, encompassing the definition of a set of possible security mechanism configurations, the formalization of objective functions reflecting security levels, throughput, and deployment costs, and the introduction of constraints on feasible solutions. The NSGA-II (Non-dominated Sorting Genetic Algorithm II) optimization algorithm is employed to generate a set of Pareto-optimal solutions, ensuring uniform coverage of compromise configurations. A software package implemented in Python 3 incorporates modules for population generation, fitness evaluation, selection, crossover, mutation operators, and result visualization. Computational experiments (CE) were conducted to validate the effectiveness of the proposed approach. The evolution dynamics of the Pareto hypervolume were analyzed, the uniformity of solution distribution in the objective space was studied, and the impact of algorithm parameters on convergence to the optimal solution was examined. The results demonstrate that the proposed methodology enables the formation of NSC sets that achieve a balanced trade-off between security, throughput, and IS system deployment costs. Full article
(This article belongs to the Special Issue IoT Networks Security)
Show Figures

Graphical abstract

Back to TopTop