Special Issue "Sensors and Actuators: Security Threats and Countermeasures"

Special Issue Editors

Guest Editor
Dr. Mohammad Hammoudeh

Manchester Metropolitan University, Manchester, UK
Website | E-Mail
Phone: +44 (0)161 247 2845
Interests: wireless sensor networks; Internet of things; wireless ad hoc communications; mobile communications; network security; sensor/actuator networks; cyber-physical systems
Guest Editor
Dr. Gregory Epiphaniou

University of Wolverhampton, Wolverhampton, UK
Website | E-Mail
Interests: wireless sensor networks; cyber defense; crypto-key generation; exploiting the time-domain physical attributes of V-V channels
Co-Guest Editor
Dr. Pedro Pinto

ARC4DigiT, Instituto Politécnico de Viana do Castelo and INESC TEC, Viana do Castelo and Porto, Portugal
Website | E-Mail
Interests: security; routing; QoS; IoT; WSN

Special Issue Information

Dear Colleagues,

The recent proliferation of sensors and actuators, which go hand-in-hand with the Internet of Things (IoT), bring smart living to the general public in many data-critical areas, from homes and healthcare to power grids and transport. These sensors are moving gradually from sensing their surrounding environment only, to data processing and decision-making capabilities with significant implications on explicit e-trust and privacy. As pervasive sensing expands rapidly into new applications, its security also is not keeping up with this evolution. The sheer volume of personal and corporate sensor data makes it a more attractive target for cybercriminals and state-sponsored espionage with an exponential increase of both attack surfaces and threat actors.

The adversarial misuse and security threats in sensor-enabled environments, such as smart cities, are increasingly intertwined with national security and preferential privacy. Hence, governments and organizations are investigating how to mitigate such threats, whilst seeking to regulate the secure integration of Cyber-Physical Systems and IoT devices. For instance, in March 2018, the United Kingdom government announced new measures to boost cybersecurity in internet-connected devices. On the same day, a policy document was published to set out the government's strategy to ensure the consumer IoT is secure by design.

This Special Issue is dedicated to research on the latest developments in sensors and actuators security threats and countermeasures. It is aimed to explore the key security challenges, including the legal basis, facing consumers and technology vendors. The focus is on investigating cybersecurity threats and the solutions needed to respond to them.

  • Topics of interest include but not limited to:
  • Wireless and sensor network emerging threats and defenses
  • Cyber Resilience in wireless sensor networks
  • Secure by design principles in the IoT/SIoT paradigms
  • Secure wireless sensor network communication protocols
  • Novel authentication and access control, including attribute-based authentication and zero trust networks
  • Ransomware attacks on IoT and embedded sensory systems
  • Physical security of sensors and actuators
  • Base device platform analysis and forensic investigations
  • Threat Modelling and Threat Hunting in Sensors’ Hardware
  • Secure decentralized data storage and processing technologies in WSNs

Dr. Mohammad Hammoudeh
Dr. Gregory Epiphaniou
Dr. Pedro Pinto
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

View options order results:
result details:
Displaying articles 1-1
Export citation of selected articles as:


Open AccessReview Security Vulnerabilities in Bluetooth Technology as Used in IoT
J. Sens. Actuator Netw. 2018, 7(3), 28; https://doi.org/10.3390/jsan7030028
Received: 24 April 2018 / Revised: 15 June 2018 / Accepted: 12 July 2018 / Published: 19 July 2018
PDF Full-text (3666 KB) | HTML Full-text | XML Full-text
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in
[...] Read more.
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication. Full article
(This article belongs to the Special Issue Sensors and Actuators: Security Threats and Countermeasures)

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Paper Type: Review
Title: Cybersecurity Approaches in Precision Agriculture
Authors: Hongmei Chi et al.
Affiliation: Florida A&M University
Abstract: Precision agriculture or farming comprises a set of technologies that combines sensors, information systems, enhanced machinery, and informed management to optimize production by accounting for variability and uncertainties within agricultural systems. The digital farm is a uniquely complex system, involving interactions among multiple factors over many time and space scales. The goal of this review paper is to establish a foundation for research and education focused on solutions to current and emerging challenges of  IoT  in digital farm domains with heightened requirements for reliability, security and performance. The gap between capabilities and the ability to safeguard information assets must not be ignored, given the documented rise in the number and sophistication of threats and the broadening vulnerabilities of  IoT applications and systems worldwide. In addition, a framework of security approach for dataflow in precision agriculture is discussed.
Keywords: Precision agriculture, privacy, food security, wireless sensor network, data security, encryption

Authors: Pedro Pinto et al.
Affiliation: Instituto Politécnico de Viana do Castelo and INESC TEC

Authors: Thar Baker et al.
Affiliation: Liverpool John Moors University

Authors: Hae Young Lee et al.
Affiliation: DuDu IT

Authors: Fadi Hamad
Affiliation: Israa University

Back to Top