sensors-logo

Journal Browser

Journal Browser

Network Security and IoT Security: 2nd Edition

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 25 September 2025 | Viewed by 827

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science, University of West Florida, Pensacola, FL 32514, USA
Interests: cybersecurity as applied to sensor networks; small-scale and near field networks; Internet of Things; wireless control
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue of the journal Sensors will focus on “Network security and IoT Security”, with a broad focus on the following (but not exhaustive) list of topics:

  • IoT security threats and mitigation
  • Access management
  • Improved authentication
  • Wireless security
  • Firewalls and honeypots
  • Endpoint security
  • Digital piracy
  • Biometrics in security
  • Malware detection
  • Information security
  • Cloud security
  • Ransomware
  • Risk management
  • Digital forensics
  • Challenges in remote access
  • Data storage security
  • Data loss prevention systems
  • Social media security
  • Cryptography
  • Blockchains
  • Mobile applications security

Dr. Amitabh Mishra
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT security threats and mitigation
  • access management
  • improved authentication
  • wireless security
  • firewalls and honeypots
  • endpoint security
  • digital piracy
  • biometrics in security
  • malware detection
  • information security
  • cloud security
  • ransomware
  • risk management
  • digital forensics
  • challenges in remote access
  • data storage security
  • data loss prevention systems
  • social media security
  • cryptography
  • blockchains
  • mobile applications security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Related Special Issue

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 2304 KiB  
Article
Memory-Driven Forensic Analysis of SQL Server: A Buffer Pool and Page Inspection Approach
by Jiho Shin
Sensors 2025, 25(11), 3512; https://doi.org/10.3390/s25113512 - 2 Jun 2025
Viewed by 311
Abstract
This study proposes a memory-based forensic procedure for real-time recovery of deleted data in Microsoft SQL Server environments. This approach is particularly relevant for sensor-driven and embedded systems—such as those used in IoT gateways and edge computing platforms—where lightweight SQL engines store critical [...] Read more.
This study proposes a memory-based forensic procedure for real-time recovery of deleted data in Microsoft SQL Server environments. This approach is particularly relevant for sensor-driven and embedded systems—such as those used in IoT gateways and edge computing platforms—where lightweight SQL engines store critical operational and measurement data locally and are vulnerable to insider manipulation. Traditional approaches to deleted data recovery have primarily relied on transaction log analysis or static methods involving the examination of physical files such as .mdf and .ldf after taking the database offline. However, these methods face critical limitations in real-time applicability and may miss volatile data that temporarily resides in memory. To address these challenges, this study introduces a methodology that captures key deletion event information through transaction log analysis immediately after data deletion and directly inspects memory-resident pages loaded in the server’s Buffer Pool. By analyzing page structures in the Buffer Pool and cross-referencing them with log data, we establish a memory-driven forensic framework that enables both the recovery and verification of deleted records. In the experimental validation, records were deleted in a live SQL Server environment, and a combination of transaction log analysis and in-memory page inspection allowed for partial or full recovery of the deleted data. This demonstrates the feasibility of real-time forensic analysis without interrupting the operational database. The findings of this research provide a foundational methodology for enhancing the speed and accuracy of digital forensics in time-sensitive scenarios, such as insider threats or cyber intrusion incidents, by enabling prompt and precise recovery of deleted data directly from memory. These capabilities are especially critical in IoT environments, where real-time deletion recovery supports sensor data integrity, forensic traceability, and uninterrupted system resilience. Full article
(This article belongs to the Special Issue Network Security and IoT Security: 2nd Edition)
Show Figures

Figure 1

Back to TopTop