sensors-logo

Journal Browser

Journal Browser

Intelligence, Security, Trust and Privacy Advances in IoT, Bigdata and 5G Networks (2nd Edition)

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: 15 April 2025 | Viewed by 4393

Special Issue Editors


E-Mail Website
Guest Editor
School of Information Technology, Illinois State University, Normal, IL 62790, USA
Interests: Internet of Things; wireless networking and sensing; smart health; cybersecurity
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
Interests: cloud data security and privacy protection; mobile data security; big data security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Science and Technology, International Hellenic University, 570 01 Nea Moudania, Greece
Interests: IEEE 802.11 standards; Internet of Things; low-power protocols; smart cities
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Business, Stevens Institute of Technology, Hoboken, NJ 07030, USA
Interests: data science; artificial intelligence, big data; machine learning; IoT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In the era of the Internet of Things (IoT) and big data, widespread applications of various intelligent terminals and wearable sensing devices promote many novel information transmission approaches and information service modes. Currently, 5G-enabled derivatives, such as smart city, smart transportation, connected healthcare and smart energy, are developing rapidly. While it provides enhanced convenience to peoples’ lives, it also faces severe security and privacy challenges. Various data-driven intelligent applications should be combined with diversified privacy protection technologies, attach importance to personal and organizational identity and data privacy protection, and strive to build a secure ecological environment for the whole lifecycle of information flow.

This Special Issue organizes the latest intelligent data processing strategies, trust management, privacy protection techniques, and attack and defense methods for IoT, Blockchain and 5G ubiquitous networks. Technical contribution papers, industrial case studies and review papers are welcome. The proposed topics include (but are not limited to):

  • Intelligent data processing, algorithm, and model;
  • Security, trust and privacy in IoT, big data and 5G networks;
  • Multimedia networking, communication and security;
  • Data fusion of heterogeneous sensor data and multi-mode data;
  • Secure machine learning and deep learning;
  • Privacy-preserving data mining;
  • Trust and privacy representation, measurement and management;
  • Privacy computing methods, models and algorithms;
  • Security, trust and privacy in wireless sensor network, edge/fog computing;
  • Federated learning, reinforcement learning and meta learning;
  • Adaptive access control model, authentication and authorization;
  • Unmanned aerial vehicles networking, communication and security;
  • Intelligent transportation system, communication and security;
  • Connected healthcare technology and applications;
  • Security, trust and privacy in smart grid and smart energy;
  • Trusted execution environments, hardware and chip security;
  • Intelligent processing and security in connected autonomous vehicles;
  • Blockchain technologies and applications.

Prof. Dr. Shaoen Wu
Prof. Dr. Jinbo Xiong
Prof. Dr. Periklis Chatzimisios
Prof. Dr. Mahmoud Daneshmand
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Related Special Issue

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1355 KiB  
Article
Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang and Han-Chieh Chao
Sensors 2024, 24(23), 7650; https://doi.org/10.3390/s24237650 - 29 Nov 2024
Viewed by 436
Abstract
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the [...] Read more.
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the probability density function of the beta distribution and some contextual factors, to dynamically compute the trust and reputation values of nodes, leading to efficient data dissemination, where malicious nodes are effectively identified and bypassed during that process. Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval. Full article
Show Figures

Figure 1

19 pages, 3531 KiB  
Article
EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores
by Yuxi Li, Jingjing Chen, Fucai Zhou and Dong Ji
Sensors 2024, 24(21), 6792; https://doi.org/10.3390/s24216792 - 22 Oct 2024
Viewed by 489
Abstract
To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrated blockchain and homomorphic Xor operations and pseudo-random functions to create [...] Read more.
To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrated blockchain and homomorphic Xor operations and pseudo-random functions to create a secure and verifiable datastore, while enabling efficient encrypted Boolean queries. Additionally, we have designed a lightweight verification protocol using bilinear map accumulators to guarantee the correctness of Boolean query results. Our security analysis demonstrates that EKV-VBQ is secure against adaptive chosen label attacks (IND-CLA) and guarantees Integrity and Unforgeability under the bilinear q-strong Diffie–Hellman assumption. Our performance evaluations showed reduced server-side storage overhead, efficient proof generation, and a significant reduction in user-side computational complexity by a factor of log n. Finally, GPU-accelerated optimizations significantly enhance EKV-VBQ’s performance, reducing computational overhead by up to 50%, making EKV-VBQ highly efficient and suitable for deployment in environments with limited computational resources. Full article
Show Figures

Figure 1

30 pages, 1978 KiB  
Article
RDSC: Range-Based Device Spatial Clustering for IoT Networks
by Fouad Achkouty, Laurent Gallon and Richard Chbeir
Sensors 2024, 24(17), 5851; https://doi.org/10.3390/s24175851 - 9 Sep 2024
Viewed by 721
Abstract
The growth of the Internet of Things (IoT) has become a crucial area of modern research. While the increasing number of IoT devices has driven significant advancements, it has also introduced several challenges, such as data storage, data privacy, communication protocols, complex network [...] Read more.
The growth of the Internet of Things (IoT) has become a crucial area of modern research. While the increasing number of IoT devices has driven significant advancements, it has also introduced several challenges, such as data storage, data privacy, communication protocols, complex network topologies, and IoT device management. In essence, the management of IoT devices is becoming more and more challenging, especially with the limited capacity and power of the IoT devices. The devices, having limited capacities, cannot store the information of the entire environment at once. In addition, device power consumption can affect network performance and stability. The devices’ sensing areas with device grouping and management can simplify further networking tasks and improve response quality with data aggregation and correction techniques. In fact, most research papers are looking forward to expanding network lifetimes by relying on devices with high power capabilities. This paper proposes a device spatial clustering technique that covers crucial challenges in IoT. Our approach groups the dispersed devices to create clusters of connected devices while considering their coverage, their storage capacities, and their power. A new clustering protocol alongside a new clustering algorithm is introduced, resolving the aforementioned challenges. Moreover, a technique for non-sensed area extraction is presented. The efficiency of the proposed approach has been evaluated with extensive experiments that gave notable results. Our technique was also compared with other clustering algorithms, showing the different results of these algorithms. Full article
Show Figures

Figure 1

17 pages, 2281 KiB  
Article
A Secure Data Aggregation Algorithm Based on a Trust Mechanism
by Changtao Liu and Jun Ye
Sensors 2024, 24(13), 4352; https://doi.org/10.3390/s24134352 - 4 Jul 2024
Viewed by 710
Abstract
Due to the uniqueness of the underwater environment, traditional data aggregation schemes face many challenges. Most existing data aggregation solutions do not fully consider node trustworthiness, which may result in the inclusion of falsified data sent by malicious nodes during the aggregation process, [...] Read more.
Due to the uniqueness of the underwater environment, traditional data aggregation schemes face many challenges. Most existing data aggregation solutions do not fully consider node trustworthiness, which may result in the inclusion of falsified data sent by malicious nodes during the aggregation process, thereby affecting the accuracy of the aggregated results. Additionally, because of the dynamically changing nature of the underwater environment, current solutions often lack sufficient flexibility to handle situations such as node movement and network topology changes, significantly impacting the stability and reliability of data transmission. To address the aforementioned issues, this paper proposes a secure data aggregation algorithm based on a trust mechanism. By dynamically adjusting the number and size of node slices based on node trust values and transmission distances, the proposed algorithm effectively reduces network communication overhead and improves the accuracy of data aggregation. Due to the variability in the number of node slices, even if attackers intercept some slices, it is difficult for them to reconstruct the complete data, thereby ensuring data security. Full article
Show Figures

Figure 1

23 pages, 2569 KiB  
Article
Explainable Learning-Based Timeout Optimization for Accurate and Efficient Elephant Flow Prediction in SDNs
by Ling Xia Liao, Changqing Zhao, Roy Xiaorong Lai and Han-Chieh Chao
Sensors 2024, 24(3), 963; https://doi.org/10.3390/s24030963 - 1 Feb 2024
Viewed by 1123
Abstract
Accurately and efficiently predicting elephant flows (elephants) is crucial for optimizing network performance and resource utilization. Current prediction approaches for software-defined networks (SDNs) typically rely on complete traffic and statistics moving from switches to controllers. This leads to an extra control channel bandwidth [...] Read more.
Accurately and efficiently predicting elephant flows (elephants) is crucial for optimizing network performance and resource utilization. Current prediction approaches for software-defined networks (SDNs) typically rely on complete traffic and statistics moving from switches to controllers. This leads to an extra control channel bandwidth occupation and network delay. To address this issue, this paper proposes a prediction strategy based on incomplete traffic that is sampled by the timeouts for the installation or reactivation of flow entries. The strategy involves assigning a very short hard timeout (Tinitial) to flow entries and then increasing it at a rate of r until flows are identified as elephants or out of their lifespans. Predicted elephants are switched to an idle timeout of 5 s. Logistic regression is used to model elephants based on a complete dataset. Bayesian optimization is then used to tune the trained model Tinitial and r over the incomplete dataset. The process of feature selection, model learning, and optimization is explained. An extensive evaluation shows that the proposed approach can achieve over 90% generalization accuracy over 7 different datasets, including campus, backbone, and the Internet of Things (IoT). Elephants can be correctly predicted for about half of their lifetime. The proposed approach can significantly reduce the controller–switch interaction in campus and IoT networks, although packet completion approaches may need to be applied in networks with a short mean packet inter-arrival time. Full article
Show Figures

Figure 1

Back to TopTop