sensors-logo

Journal Browser

Journal Browser

Exploring the Frontiers of Security, Privacy, and Trust in the IoT Ecosystem

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (15 November 2024) | Viewed by 8724

Special Issue Editors


E-Mail Website
Guest Editor
College of Computing and IT, University of Doha for Science and Technology Qatar, Doha 24449, Qatar
Interests: data and cybersecurity
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Technological advancements in communications and networking technologies in the digital era have led to Internet of Things (IoT) devices being adopted and deployed across different domains such as smart cities, smart homes, smart health, wearable technologies, intelligent transportation systems (ITS), and retail, to name a few. It is estimated that the number of IoT devices will reach more than 30 billion by 2025. This massive number of connected IoT devices has created an internet of vulnerabilities (IoV), which presents challenges to security and privacy due to the exponential rise of cyber-attacks targeting a wide range of devices, systems, and applications such as e-commerce, online banking, and mission-critical applications. IoT systems are at high risk due to the complexity and sophistication of adversaries and attack techniques employed in cyber-attacks. Therefore, it is evident that more robustness and novelty are critical to improving the state of secure IoT ecosystems across multiple domains, technologies, and industries to ensure security, resilience, privacy, and trust in our systems. 

 To that purpose, this Special Issue invites contributions from academics and researchers presenting new original research and developments in security, privacy, and trust relevant to the domains of systems, networks, technologies, frameworks, methodologies, and big data related to the IoT ecosystem. We encourage submissions with high-quality empirical research and scholarly work proposing practical, scalable, and usable approaches to security, privacy, and trust in IoT systems and comprehensive and systematic surveys.

This Special Issue is related to Sensors because the main IoT components are sensors and actuators.

  • Mission critical infrastructures and applications security
  • Blockchain solutions for IoT environment
  • Artificial Intelligence (AI) for securing IoT
  • Machine Learning (ML) and federated learning for IoT systems
  • Security and risks in blockchain-based IoT systems
  • Privacy-preserving big data processing and analytics in IoT
  • Authentication and access control in IoT systems
  • Trust-aware security and privacy-preserving solutions for IoT
  • Intrusion detection and resilience in IoT systems

Dr. Muath Obaidat
Dr. Mueen Uddin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 1018 KiB  
Article
A Study of the Optimal Logic Combinations of RO-Based PUFs on FPGAs to Maximize Identifiability
by Raúl Aparicio-Téllez, Miguel Garcia-Bosque, Guillermo Díez-Señorans, Francisco Aznar and Santiago Celma
Sensors 2024, 24(23), 7747; https://doi.org/10.3390/s24237747 - 4 Dec 2024
Viewed by 632
Abstract
One of the challenges that wireless sensor networks (WSNs) need to address is achieving security and privacy while keeping low power consumption at sensor nodes. Physically unclonable functions (PUFs) offer a challenge–response functionality that leverages the inherent variations in the manufacturing process of [...] Read more.
One of the challenges that wireless sensor networks (WSNs) need to address is achieving security and privacy while keeping low power consumption at sensor nodes. Physically unclonable functions (PUFs) offer a challenge–response functionality that leverages the inherent variations in the manufacturing process of a device, making them an optimal solution for sensor node authentication in WSNs. Thus, identifiability is the fundamental property of any PUF. Consequently, it is necessary to design structures that optimize the PUF in terms of identifiability. This work studies different architectures of oscillators to analyze which ones exhibit the best properties to construct a RO-based PUF. For this purpose, Generalized Galois Ring Oscillators (GenGAROs) are used. A GenGARO is a novel type of oscillator formed by a combination of up to two input logical operations connected in cascade, where one input is the output of the previous operation and the other is the feedback signal. GenGAROs include some previously proposed oscillators as well as many new oscillator designs. Thus, the architecture of GenGAROs is analyzed to implement a GenGARO-PUF on an Artix-FPGA. With this purpose, an exhaustive study of logical operation combinations that optimize PUF performance in terms of identifiability has been conducted. From this, it has been observed that certain logic gates in specific positions within the oscillator contribute to constructing a PUF with good properties, and by applying certain constraints, any oscillator generated with these constraints can be used to construct a PUF with an equal error rate on the order of or below 1011 using 100-bit responses. As a result, a design methodology for FPGA-based RO-PUFs has been developed, enabling the generation of multiple PUF primitives with high identifiability that other designers could exploit to implement RO-based PUFs with good properties. Full article
Show Figures

Figure 1

16 pages, 826 KiB  
Article
IoT Forensics: Current Perspectives and Future Directions
by Abdulghani Ali Ahmed, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani and Abdullahi Gara Abdulrahman
Sensors 2024, 24(16), 5210; https://doi.org/10.3390/s24165210 - 12 Aug 2024
Cited by 6 | Viewed by 7062
Abstract
The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. IoT forensics differs from [...] Read more.
The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. IoT forensics differs from other digital forensic fields due to the unique characteristics of IoT devices, such as limited processing power and connectivity. Although numerous studies are available on IoT forensics, the field is rapidly evolving, and comprehensive surveys are needed to keep up with new developments, emerging threats, and evolving best practices. In this respect, this paper aims to review the state of the art in IoT forensics and discuss the challenges in current investigation techniques. A qualitative analysis of related reviews in the field of IoT forensics has been conducted, identifying key issues and assessing primary obstacles. Despite the variety of topics and approaches, common issues emerge. The majority of these issues are related to the collection and pre-processing of evidence because of the counter-analysis techniques and challenges associated with gathering data from devices and the cloud. Our analysis extends beyond technological problems; it further identifies the procedural problems with preparedness, reporting, and presentation as well as ethical issues. In particular, it provides insights into emerging threats and challenges in IoT forensics, increases awareness and understanding of the importance of IoT forensics in preventing cybercrimes, and ensures the security and privacy of IoT devices and networks. Our findings make a substantial contribution to the field of IoT forensics, as they not only involve a critical analysis of the challenges presented in existing works but also identify numerous problems. These insights will greatly assist researchers in identifying appropriate directions for their future research. Full article
Show Figures

Figure 1

Back to TopTop