sensors-logo

Journal Browser

Journal Browser

Privacy and Security for IoT-Based Smart Homes

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 December 2025 | Viewed by 1563

Special Issue Editors


E-Mail Website
Guest Editor
Internet of Things and People Research Center and the Department of Computer Science and Media Technology, Malmö University, SE-205 06 Malmö, Sweden
Interests: cyber security; privacy; ethics; artificial intelligence; internet of things; pervasive computing; smart homes
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Internet of Things and People Research Center and the Department of Computer Science and Media Technology, Malmö University, SE-205 06 Malmö, Sweden
Interests: cybersecurity; privacy; intrusion detection; internet of things; smart homes

Special Issue Information

Dear Colleagues,

The rapid proliferation of IoT devices in smart homes has revolutionized convenience, connectivity, and energy efficiency in homes and in our daily lives. However, this increased reliance on interconnected sensors, smart appliances, and cloud-based services introduces significant privacy and security challenges. Sensors in smart homes—ranging from smart cameras and motion detectors to voice assistants and thermostats—collect vast amounts of sensitive data, exposing users to potential misuse, cyberattacks, and surveillance. These vulnerabilities raise concerns about data integrity, unauthorized access, and the ethical deployment of smart home technologies.

This Special Issue of Sensors aims to explore innovative approaches to ensure the privacy and security of IoT-based smart homes. Contributions are invited that focus on secure sensor design, encryption methods, data anonymization, intrusion detection, and privacy-preserving techniques for smart home ecosystems. Interdisciplinary approaches that combine sensor technologies, machine learning, and ethical frameworks are particularly welcome.

Dr. Andreas Jacobsson
Dr. Kayode Sakariyah Adewole
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT security
  • privacy and trust
  • sensor data protection
  • intrusion detection systems (IDS)
  • data anonymization
  • cybersecurity for IoT devices
  • secure sensor networks
  • edge and cloud security
  • ethical AI for smart homes

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

25 pages, 28388 KiB  
Article
Software Trusted Platform Module (SWTPM) Resource Sharing Scheme for Embedded Systems
by Da-Chuan Chen, Guan-Ruei Chen and Yu-Ping Liao
Sensors 2025, 25(12), 3828; https://doi.org/10.3390/s25123828 - 19 Jun 2025
Viewed by 398
Abstract
Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy. Traditionally, each node is equipped with a discrete Trusted Platform Module (dTPM) to ensure network-wide trustworthiness. However, [...] Read more.
Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy. Traditionally, each node is equipped with a discrete Trusted Platform Module (dTPM) to ensure network-wide trustworthiness. However, this study proposes a cost-effective system architecture that deploys software-based TPMs (SWTPMs) on the majority of nodes, while reserving dTPMs for a few central nodes to maintain overall system integrity. The proposed architecture employs IBMACS for system integrity reporting. In addition, a database-based anomaly detection (AD) agent is developed to identify and isolate untrusted nodes. A traffic anomaly detection agent is also introduced to monitor communication between servers and clients, ensuring that traffic patterns remain normal. Finally, a custom measurement kernel is implemented, along with an activation agent, to enforce a measured boot process for custom applications during startup. This architecture is designed to safeguard mission-critical embedded systems from malicious threats while reducing deployment costs. Full article
(This article belongs to the Special Issue Privacy and Security for IoT-Based Smart Homes)
Show Figures

Figure 1

Back to TopTop