sensors-logo

Journal Browser

Journal Browser

AI-Driven Security and Privacy for IIoT Applications

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 30 August 2025 | Viewed by 698

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Engineering, Seoul National University of Science and Technology, 232 Gongneung-ro, Nowon-gu, Seoul 01811, Republic of Korea
Interests: IoT security; digital forensics; blockchain; privacy protection; information security

Special Issue Information

Dear Colleagues,

The rapid convergence of Artificial Intelligence (AI) and the Industrial Internet of Things (IIoT) is driving unprecedented advancements across various sectors, including healthcare, smart cities, industrial automation, and more. However, this convergence also introduces complex security and privacy challenges that require innovative solutions. As the number of IoT-connected devices continues to increase exponentially, so do the cybersecurity challenges due to the natural diversity of the IIoT ecosystem, limited hardware resources, and insufficient security capabilities. Intrusion detection systems (IDSs) are crucial in securing IIoT networks, and recent research has focused heavily on leveraging machine learning (ML) and deep learning (DL) to enhance these systems.

While ML and DL methods have proven effective in certain aspects, their performance heavily relies on the availability of large training datasets. This reliance poses a significant challenge in IIoT environments, where collecting vast amounts of data is often impractical. Furthermore, these methods may struggle to detect novel attacks, leading to vulnerabilities in IIoT networks. To address these limitations, few-shot learning (FSL) and zero-shot learning (ZSL) have emerged as promising approaches. FSL is capable of learning from a minimal number of training samples, while ZSL can generalize to new, unseen classes without requiring labeled training data. Despite their potential, the application of FSL and ZSL in IIoT security, particularly in IDSs, remains underexplored.

This Special Issue aims to explore the intersection of AI and IIoT, with a particular emphasis on how AI-driven approaches, including FSL and ZSL, can enhance the security and privacy of IIoT systems. We invite contributions that address both AI's vulnerabilities in IIoT environments and its potential to fortify these environments against evolving cyber threats, with a focus on overcoming the data scarcity challenges inherent in IIoT security. The topics of interest include, but are not limited to, the following:

  1. Few-shot learning for efficient IIoT intrusion detection;
  2. Zero-shot learning for novel threat detection in IIoT;
  3. AI-driven methods for anomaly detection and threat mitigation in IIoT networks;
  4. Adversarial machine learning attacks and defenses in IIoT systems;
  5. Addressing IIoT security data scarcity using few/zero-shot learning techniques;
  6. Comparative analysis of few/zero-shot learning versus traditional machine learning and deep learning in IIoT;
  7. Developing novel few/zero-shot learning models for IoT environments with limited data and novel threats;
  8. Robustness and resistance of AI models against random and adversarial perturbations in IIoT networks;
  9. Federated learning and other privacy-preserving AI techniques for IIoT data processing;
  10. AI-driven security solutions in smart cities, healthcare IoT, industrial IIoT, and other domains.

Prof. Dr. Jong Hyuk Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IIoT security
  • Few-shot learning
  • Zero-shot learning
  • Intrusion detection systems
  • Data scarcity
  • Machine learning
  • Adversarial threats
  • Privacy-preserving AI.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

30 pages, 3142 KiB  
Review
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats
by Tuba Arif, Byunghyun Jo and Jong Hyuk Park
Sensors 2025, 25(8), 2350; https://doi.org/10.3390/s25082350 - 8 Apr 2025
Viewed by 395
Abstract
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native [...] Read more.
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service mesh technologies for secure service-to-service communication. Furthermore, we examine the roles of cloud-native encryption, cloud-native identity and access management, and container image scanning technologies in protecting containerized applications and preserving data privacy in transit and at rest. The importance of threat detection and response systems, cloud-native security information and event management (SIEM) solutions, and network security are also covered to strengthen trust and transparency in cloud-native security. We also present a thorough case study that demonstrates how security measures are applied across multiple layers, including application, network, infrastructure, and security, and compliance, to ensure holistic security in a cloud-native architecture. By investigating these privacy-enhancing methods and technologies, organizations may improve the security posture of their cloud-native implementations, reducing risks and ensuring the trustworthiness of their information and applications in the ever-changing ecosystem of today’s digital landscape. Full article
(This article belongs to the Special Issue AI-Driven Security and Privacy for IIoT Applications)
Show Figures

Figure 1

Back to TopTop