E-Mail Alert

Add your e-mail address to receive forthcoming issues of this journal:

Journal Browser

Journal Browser

Special Issue "Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 15 August 2019

Special Issue Editors

Guest Editor
Prof. Sokratis Katsikas

Department of Information Security and Communication Technology, Norwegian University of Science Technology (NTNU), P.O. Box 191, Gjøvik N-2802, Norway
Website | E-Mail
Interests: information security and cybersecurity management and governance; critical infrastructure cyber security; information and communication systems security
Guest Editor
Dr. Vasileios Gkioulos

Department of Information Security and Communication Technology, Norwegian University of Science Technology (NTNU), P.O. Box 191, Gjøvik N-2802, Norway
Website | E-Mail
Interests: critical infrastructure cyber security; information and communication systems security; cyber physical systems security; systems of systems security; network security; security awareness

Special Issue Information

Dear Colleagues,

The rapid developments in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators and heterogeneous devices such as single board computers, which collect and exchange a large amount of data to offer a new class of advanced services characterized by being available anywhere, at any time and for anyone. This ecosystem is widely referred to as the Internet of Things (IoT). In the past years, the number of deployments both for sensor networks and the IoT grew significantly. This continuous and exponential growth is facilitated by investments and research activities originating from industry, academia and governments, while the penetration of these technologies is also driven by the high technology acceptance rates of both consumers and technologists across disciplines. Such networks collect, store, and exchange a large volume of heterogeneous data. Nevertheless, their rapid and widespread deployment, along with their participation in the provisioning of potentially critical services (e.g. safety applications, healthcare, manufacturing), raise numerous issues related to the security, privacy, and trustworthiness of the performed operations and provided services. Accordingly, research into the security and privacy of the IoT and sensor networks is attracting increasing attention from both industry and academia. In line with these efforts, the central theme of this Special Issue is to investigate novel methodologies, theories, technologies, techniques, and solutions for IoT/SN security, trust and privacy. In particular, this Special Issue aims at addressing these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols and interfaces, as well as specific implementation approaches. Furthermore, additional focus will be given to areas related to the role of data mining and machine learning in modeling and deploying secure and trustworthy sensor networks and IoT systems.

Topics of Interest:

This Special Issue aims to present the most important and relevant advances to overcome the challenges related to security, privacy, and trustworthiness in sensor networks and the Internet of Things.

We seek original and high quality submissions on, but not limited to, one or more of the following topics:

  • Novel trustworthy architectures, protocols, or applications that achieve usable security in sensor networks and the IoT
  • Privacy preservation in sensor networks and the IoT
  • Privacy by design for sensor networks and the IoT
  • Vulnerability analysis in the IoT and sensor networks
  • Threat modeling in sensor networks and the IoT
  • Risk assessment in sensor networks and the IoT
  • Secure communications in sensor networks and the IoT
  • Device attestation in sensor networks and the IoT
  • Trustworthiness management models for sensor networks and the IoT
  • Intrusion detection for sensor networks and the IoT
  • Disaster recovery for sensor networks and the IoT
  • Forensics in sensor networks and the IoT
  • Privacy-preserving, machine-learning-based data analytics in sensor networks and the IoT
  • Real-time processing of sensor network and IoT data for intrusion detection and cyber security situational awareness
  • Security testbeds and experimental results for sensor networks and the IoT
  • Lightweight security protocols and architectures for the IoT and sensor networks
  • Privacy enhancing and anonymization techniques in sensor networks and the IoT
  • Trust and identity management in sensor networks and the IoT
  • Secure discovery and authentication in sensor networks and the IoT
  • Sensor networks and the IoT security life cycle
  • Access control for shared data in IoT devices
  • Algorithmic developments and applications of machine learning and data mining for big data in sensor networks and IoT security
  • Methods for modeling intentions and/or behaviors relevant to cybersecurity and privacy for sensor networks and the IoT
  • Distributed data mining and machine learning systems for sensor networks and IoT security.

Prof. Sokratis Katsikas
Dr. Vasileios Gkioulos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

View options order results:
result details:
Displaying articles 1-1
Export citation of selected articles as:

Review

Open AccessReview Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
Sensors 2019, 19(7), 1695; https://doi.org/10.3390/s19071695
Received: 5 February 2019 / Revised: 30 March 2019 / Accepted: 5 April 2019 / Published: 9 April 2019
PDF Full-text (1294 KB) | HTML Full-text | XML Full-text
Abstract
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge [...] Read more.
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine-grained access control of sensitive data according to attributes, particularly for Internet of Things (IoT) applications. However, although this technique provides several critical functions such as data confidentiality and expressiveness, it faces some hurdles including revocation issues and lack of managing a wide range of attributes. These two issues have been highlighted by many existing studies due to their complexity which is hard to address without high computational cost affecting the resource-limited IoT devices. In this paper, unlike other survey papers, existing single and multiauthority CP-ABE schemes are reviewed with the main focus on their ability to address the revocation issues, the techniques used to manage the revocation, and comparisons among them according to a number of secure cloud storage criteria. Therefore, this is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues. Full article
Figures

Figure 1

Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top