sensors-logo

Journal Browser

Journal Browser

Innovative Approaches to Cybersecurity for IoT and Wireless Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: 1 October 2025 | Viewed by 1046

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics, King’s College London, Strand Campus, Bush House, 30 Aldwych, London WC2B 4BG, UK
Interests: computer networks and cyber security; including security protocols; IoT security; privacy; and trust; security and usability study; threat modelling and analysis; trust-based access control; IP telephony defence; blockchain; energy-aware IoT protocol design; SDN-based 5G architecture and security; and future networking; E-Learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, University of Hertfordshire, College Lane, Hatfield AL10 9AB, UK
Interests: communication channels; cybersecurity; quantum free solutions; cryptography; AI and QAI

E-Mail Website
Guest Editor
Department of Informatics, King’s College London, Strand Campus, Bush House, 30 Aldwych, London WC2B 4BG, UK
Interests: cybersecurity; IoT and IoT security; security compliance and certification; virtual laboratory; wireless sensor networks; security aspects of cloud and networks

Special Issue Information

Dear Colleagues,

As the adoption of IoT devices and wireless networks continues to skyrocket, new cybersecurity challenges have arisen, demanding innovative solutions to ensure robust security and privacy.

This Special Issue, titled "Innovative Approaches to Cybersecurity for IoT and Wireless Networks", focuses on recent advancements, novel methodologies, and pioneering technologies applied in IoT and wireless cybersecurity. It will delve into topics such as AI in cybersecurity, quantum-free developments, blockchain applications for secure distributed data, secure IoT and wireless network architectures, attack technologies and adversarial behaviours in IoT and wireless networks, and privacy-preserving techniques for distributed systems. In particular, we will examine the practical implications of these innovative approaches, discussing their effectiveness, limitations, and potential for enhancing real-world systems.

We invite authors to submit original research, comprehensive reviews, and insightful perspectives. We aim to foster robust dialogue on the cutting-edge methodologies being developed to safeguard wireless networks and IoT devices against cyber threats.

We believe that this Special Issue will serve as a critical resource for anyone interested in the convergence of IoT, sensor technology, and cybersecurity, offering valuable insights into the current state of security in distributed systems and the pioneering strategies being developed to fortify them.

Dr. Hannan Xiao
Dr. William Joseph Spring
Dr. Ievgeniia Kuzminykh
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT cybersecurity
  • sensor technology
  • wireless networks
  • AI for security
  • quantum-free applications
  • lightweight cryptography
  • attack technologies
  • adversarial behaviours

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 2272 KiB  
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks
by Chaminda Alocious, Hannan Xiao, Bruce Christianson and Joseph Spring
Sensors 2025, 25(2), 354; https://doi.org/10.3390/s25020354 - 9 Jan 2025
Viewed by 669
Abstract
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative [...] Read more.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties. Full article
(This article belongs to the Special Issue Innovative Approaches to Cybersecurity for IoT and Wireless Networks)
Show Figures

Figure 1

Back to TopTop