sensors-logo

Journal Browser

Journal Browser

Security, Privacy and Threat Detection in Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 20 December 2025 | Viewed by 952

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK
Interests: IoT security and privacy; intrusion detection systems; incident response
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

We invite researchers and practitioners to submit papers for a Special Issue on "Security, Privacy and Threat Detection in Sensor Networks". With the increasing deployment of sensor networks in critical applications, ensuring their security and privacy has become more vital than ever. This Special Issue aims to explore innovative solutions to address the unique challenges faced by sensor networks, including securing communication, ensuring data privacy, and detecting and mitigating threats in resource-constrained environments.

We are particularly interested in papers that focus on cutting-edge topics such as post-quantum cryptography, 5G/6G communications, and the use of AI for threat detection and network analysis. Contributions on cryptographic techniques resistant to quantum computing, efficient and scalable security protocols, and privacy-preserving methods tailored to sensor networks are highly encouraged. Additionally, we welcome research that investigates the potential of LLMs in enhancing security analytics, automating threat detection, and providing intelligent network monitoring.

We also invite submissions on novel, lightweight solutions that can operate effectively within the limitations of sensor nodes, such as limited computational power and energy constraints. Papers that address real-world applications and emerging trends in securing sensor networks will be given priority. This Special Issue aims to foster advancements that will strengthen the security and privacy of sensor networks in diverse fields.

Prof. Dr. Leandros Maglaras
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-quantum cryptography
  • lightweight security solutions
  • sensor network privacy
  • threat detection
  • large language models (LLMs)
  • industrial Internet of Things

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

44 pages, 4528 KiB  
Article
Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots
by Matej Rabzelj and Urban Sedlar
Sensors 2025, 25(12), 3676; https://doi.org/10.3390/s25123676 - 12 Jun 2025
Viewed by 782
Abstract
This study presents one of the most extensive analyses of the lifecycle of leaked authentication credentials to date, bridging the gap between database breaches and real-world cyberattacks. We analyze over 27 billion leaked credentials—nearly 4 billion unique—using a sophisticated data filtering and normalization [...] Read more.
This study presents one of the most extensive analyses of the lifecycle of leaked authentication credentials to date, bridging the gap between database breaches and real-world cyberattacks. We analyze over 27 billion leaked credentials—nearly 4 billion unique—using a sophisticated data filtering and normalization pipeline to handle breach inconsistencies. Following this analysis, we deploy a distributed sensor network of 39 honeypots running 14 unique services across 9 networks over a one-year-long experiment, capturing one of the most comprehensive authentication datasets in the literature. We analyze leaked credentials, SSH and Telnet session data, and HTTP authentication requests for their composition, characteristics, attack patterns, and occurrence. We comparatively assess whether credentials from leaks surface in real-world attacks. We observe a significant overlap of honeypot logins with common password wordlists (e.g., Nmap, John) and defaultlists (e.g., Piata, Mirai), and limited overlaps between leaked credentials, logins, and dictionaries. We examine generative algorithms (e.g., keywalk patterns, hashcat rules), finding they are widely used by users but not attackers—unless included in wordlists. Our analyses uncover unseen passwords and methods likely designed to detect honeypots, highlighting an adversarial arms race. Our findings offer critical insights into password reuse, mutation, and attacker strategies, with implications for authentication security, attack detection, and digital forensics. Full article
(This article belongs to the Special Issue Security, Privacy and Threat Detection in Sensor Networks)
Show Figures

Graphical abstract

Back to TopTop