Special Issue "Blockchain and Machine Learning for IoT: Security and Privacy Challenges"

A special issue of Network (ISSN 2673-8732).

Deadline for manuscript submissions: 31 December 2023 | Viewed by 10410

Special Issue Editors

Department of Computer Science, University of Salerno, 84084 Fisciano, Italy
Interests: security and privacy; computer modeling and simulation; information systems; computer networks
Special Issues, Collections and Topics in MDPI journals
Department of Computer Science, University of Salerno, Via Giovanni Paolo II 132, I-84084 Fisciano, SA, Italy
Interests: high performance networking protocols and architectures; routing algorithms; network security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The pervasiveness of IoT technologies in a variety of fields is changing our lives. Industry, agriculture, health, and even personal life are experiencing a revolution in the way data are collected, communicated, processed, and stored. In recent years, two other technologies have begun to be used in synergy with IoT: Blockchain, which has changed the way data are stored, and machine learning, which has changed the way data are processed. With these premises in mind, it is desirable for researchers to focus their attention not just on the performance and features of the new systems but also on the new security and privacy issues related to this revolution. 

This Special Issue invites researchers to contribute with original contributions, case studies, and reviews that address all new challenges due to the use of IoT in synergy with blockchain systems and/or machine learning techniques.

The topics relevant for this Special Issue include (but are not limited to):

  • Security and privacy in blockchain technology for IoT;
  • Intelligent systems for fraud detection and forensics in blockchain environments;
  • Innovative architectures and protocols for safe blockchain application in IoT;
  • Blockchain and trust management;
  • Blockchain-based solutions for IoT security;
  • Novel machine learning and data science methods for IoT security;
  • Generative adversarial networks (GAN) in IoT security;
  • Architectures and protocols for scalable, secure, robust, and privacy enhancing IoT;
  • Privacy preservation in IoT;
  • Vulnerability analysis, threat modeling, and risk assessment in IoT;
  • Intrusion detection for IoT;
  • Novel security architectures, protocols, or applications for IoT.

This is a joint special issue with Electronics.

Dr. Michele Mastroianni
Prof. Dr. Francesco Palmieri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Network is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Blockchain
  • Machine Learning
  • IoT
  • Security
  • Privacy
  • Risk Analysis

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
IoT and Blockchain Integration: Applications, Opportunities, and Challenges
Network 2023, 3(1), 115-141; https://doi.org/10.3390/network3010006 - 24 Jan 2023
Cited by 1 | Viewed by 1280
Abstract
During the recent decade, two variants of evolving computing networks have augmented the Internet: (i) The Internet of Things (IoT) and (ii) Blockchain Network(s) (BCNs). The IoT is a network of heterogeneous digital devices embedded with sensors and software for various automation and [...] Read more.
During the recent decade, two variants of evolving computing networks have augmented the Internet: (i) The Internet of Things (IoT) and (ii) Blockchain Network(s) (BCNs). The IoT is a network of heterogeneous digital devices embedded with sensors and software for various automation and monitoring purposes. A Blockchain Network is a broadcast network of computing nodes provisioned for validating digital transactions and recording the “well-formed” transactions in a unique data storage called a blockchain ledger. The power of a blockchain network is that (ideally) every node maintains its own copy of the ledger and takes part in validating the transactions. Integrating IoT and BCNs brings promising applications in many areas, including education, health, finance, agriculture, industry, and the environment. However, the complex, dynamic and heterogeneous computing and communication needs of IoT technologies, optionally integrated by blockchain technologies (if mandated), draw several challenges on scaling, interoperability, and security goals. In recent years, numerous models integrating IoT with blockchain networks have been proposed, tested, and deployed for businesses. Numerous studies are underway to uncover the applications of IoT and Blockchain technology. However, a close look reveals that very few applications successfully cater to the security needs of an enterprise. Needless to say, it makes less sense to integrate blockchain technology with an existing IoT that can serve the security need of an enterprise. In this article, we investigate several frameworks for IoT operations, the applicability of integrating them with blockchain technology, and due security considerations that the security personnel must make during the deployment and operations of IoT and BCN. Furthermore, we discuss the underlying security concerns and recommendations for blockchain-integrated IoT networks. Full article
Show Figures

Figure 1

Article
Privacy-Aware Access Protocols for MEC Applications in 5G
Network 2022, 2(2), 203-224; https://doi.org/10.3390/network2020014 - 01 Apr 2022
Viewed by 1667
Abstract
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We [...] Read more.
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements. Full article
Show Figures

Figure 1

Article
BloodChain: A Blood Donation Network Managed by Blockchain Technologies
Network 2022, 2(1), 21-35; https://doi.org/10.3390/network2010002 - 13 Jan 2022
Cited by 4 | Viewed by 5532
Abstract
Due to the rapid change of population structure, leading to lower birth rates and quick aging rates, the demand for blood supply is increasing significantly. In most countries, blood quality and origin are managed by blood management information systems, such as national authorities. [...] Read more.
Due to the rapid change of population structure, leading to lower birth rates and quick aging rates, the demand for blood supply is increasing significantly. In most countries, blood quality and origin are managed by blood management information systems, such as national authorities. Nevertheless, the traditional system has limitations in this field, such as a lack of detailed blood information, making it challenging to manage blood quality, supply, and demand. Hence, to solve these issues, this paper proposes a blockchain-based system called BloodChain, an improved system to support blood information management, providing more detailed information about blood, such as blood consumption and disposal. BloodChain exploits private blockchain techniques with a limited number of relatively fast and reliable participants, making them suitable for B2B (Business to Business) transactions. In this paper, we also develop a proposed system based on the architecture of Hyperledger Fabric. The evaluation of BloodChain is performed in several scenarios to prove our proposed model’s effectiveness. Full article
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Security and Privacy Issues in Blockchain/Iot Systems: A Sistematic Literature Review

Lelio Campanile, Pasquale Cantiello, Michele Mastroianni

University of Campania Luigi Vanvitelli
 
Abstract: This paper aims to point out the state-of-the-art of the scientific literature on integrated Blockchain/IoT systems from the point of view of security and privacy Issues. Our research focuses on the problems analysed, the solution proposed and the open issues in this research field. The study was conducted through a systematic literature review (SLR) on published, peer-reviewed papers, selected from the leading research paper's databases (Scopus, IEEExplore, Springer,...). The paper selected were classified using different criteria, such as application field, type conceptual study, application, survey), and the results were discussed. Finally, our research have shown that most of the paper examined is either at a conceptual level or at a very early stage, and very few papers deal with practical implementation.

Back to TopTop