E-Mail Alert

Add your e-mail address to receive forthcoming issues of this journal:

Journal Browser

Journal Browser

Special Issue "Privacy and Security for Resource Constrained IoT Devices and Networks"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 December 2018

Special Issue Editors

Guest Editor
Dr. Shancang Li

University of the West of England, Bristol, UK
Website | E-Mail
Interests: security; CPS; IoT security
Guest Editor
Prof. Dr. Houbing Song

Department of Electrical, Computer, Software, and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, FL 32114, USA
Website | E-Mail
Interests: Cyber-Physical Systems; Signal Processing for Communications and Networking; Cloud Computing/Edge Computing
Guest Editor
Dr. Muddesar Iqbal

School of Computing, London South Bank University, London, UK
Website | E-Mail
Interests: mobile security; IoT; privacy requirements

Special Issue Information

Dear Colleagues,

With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requriements in IoT and CPS, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as a big challenges because they have not been designed to have effective security features.

Despite the fact that many security solutions have been developed for the Internet, there are major concerns regarding the resource-constrained environments in IoT, including data encryption, privacy-preservation, vulnerabilities, threats, attacks, controls, etc. To address these privacy and security challenges, appropriate technologies have to be developed for resource-constrained environments in IoT.

This Special Issue aims to unveil and address the privacy-preservation and security issues and challenges in IoT and CPS. Suggested topics include, but are not limited to, the following.

  • Secure data sharing in IoT and CPS
  • Secure computation in resource constrained environment
  • Location privacy in IoT and CPS
  • Lightweight cryptography for low-resource devices in IoT and CPS
  • Searable encryption
  • Access control in IoT and CPS
  • Key mamagement
  • Information diffusion
  • Privacy and security in mobile devices and networks
  • Forensics in IoT and CPS
  • Privacy and security in healthcare-related IoT and CPS
  • Human aspects of security and privacy issues
  • Secure authentications of devices

Dr. Shancang Li
Prof. Dr. Houbing Song
Dr. Muddesar Iqbal
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security and privacy-preserving
  • attack model
  • lightweight security solution

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessArticle Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model
Sensors 2018, 18(10), 3488; https://doi.org/10.3390/s18103488
Received: 30 August 2018 / Revised: 2 October 2018 / Accepted: 12 October 2018 / Published: 16 October 2018
PDF Full-text (1656 KB) | HTML Full-text | XML Full-text
Abstract
With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to modeling the risks transferred through information systems implemented in a cloud-based environment. This paper explores
[...] Read more.
With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to modeling the risks transferred through information systems implemented in a cloud-based environment. This paper explores formal methods to quantify the risks associated with an information system and evaluate its variation throughout its implementation. Specifically, we study the risk variation through a quantitative and longitudinal model spanning from the launch of a cloud-based information systems project to its completion. In addition, we propose to redefine the risk estimation method to differentiate a mitigated risk from an unmitigated risk. This research makes valuable contributions by helping practitioners understand whether cloud computing presents a competitive advantage or a threat to the sustainability of a company. Full article
Figures

Figure 1

Open AccessArticle An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions
Sensors 2018, 18(10), 3453; https://doi.org/10.3390/s18103453
Received: 24 July 2018 / Revised: 1 October 2018 / Accepted: 11 October 2018 / Published: 14 October 2018
PDF Full-text (6719 KB) | HTML Full-text | XML Full-text
Abstract
In order to avoid malicious competition and select high quality crowd workers to improve the utility of crowdsourcing system, this paper proposes an incentive mechanism based on the combination of reverse auction and multi-attribute auction in mobile crowdsourcing. The proposed online incentive mechanism
[...] Read more.
In order to avoid malicious competition and select high quality crowd workers to improve the utility of crowdsourcing system, this paper proposes an incentive mechanism based on the combination of reverse auction and multi-attribute auction in mobile crowdsourcing. The proposed online incentive mechanism includes two algorithms. One is the crowd worker selection algorithm based on multi-attribute reverse auction that adopts dynamic threshold to make an online decision for whether accept a crowd worker according to its attributes. Another is the payment determination algorithm which determines payment for a crowd worker based on its reputation and quality of sensing data, that is, a crowd worker can get payment equal to the bidding price before performing task only if his reputation reaches good reputation threshold, otherwise he will get payment based on his data sensing quality. We prove that our proposed online incentive mechanism has the properties of computational efficiency, individual rationality, budget-balance, truthfulness and honesty. Through simulations, the efficiency of our proposed online incentive mechanism is verified which can improve the efficiency, adaptability and trust degree of the mobile crowdsourcing system. Full article
Figures

Figure 1

Open AccessArticle A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
Sensors 2018, 18(10), 3326; https://doi.org/10.3390/s18103326
Received: 23 August 2018 / Revised: 25 September 2018 / Accepted: 1 October 2018 / Published: 4 October 2018
PDF Full-text (852 KB)
Abstract
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable
[...] Read more.
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable to security attacks. Ciphers are a security primitive that can prevent some of the attacks; however, the constrained computing and energy resources of IoT devices impede them from implementing current ciphers. This article presents the stream cipher Generador de Bits Pseudo Aleatorios (GBPA) based on Salsa20 cipher, which is part of the eSTREAM project, but designed for resource-constrained IoT devices of Class 0. GBPA has lower program and data memory requirements compared with Salsa20 and lightweight ciphers. These properties allow low-cost resource-constrained IoT devices, 29.5% of the embedded systems in the market, to be able to implement a security service that they are currently incapable of, to preserve the user’s data privacy and protect the system from attacks that could damage it. For the evaluation of its output, three statistical test suites were used: NIST Statistical Test Suite (STS), DIEHARD and EACirc, with good results. The GBPA cipher provides security without having a negative impact on the computing resources of IoT devices. Full article
Back to Top