IoT: Security, Privacy and Best Practices 2024
A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".
Deadline for manuscript submissions: 31 December 2024 | Viewed by 8254
Special Issue Editor
Interests: security; information assurance and privacy; crypto-resilient attacks; applied cryptography; blockchain and cryptocurrency; IoT security and privacy; cyberphysical systems and WBAN security; steganography; lightweight cryptographic algorithms and protocols; cloud-computing security; ad hoc and WSNs; ecure remote patient monitoring systems; computer networks protocols and QoS; wireless networks coexistence
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
IoT devices have penetrated through a multitude of fields beyond those originally expected. In business, the IoT is used for product optimization. IoT-based solutions are being introduced on the factory floor, where they are having a dramatic impact on quality control through the detection of substandard production and material use. This promotes brand value by ensuring adherence to product specifications. Additionally, we are seeing the use of the IoT in financial decision processes, by providing real-time information of a holistic enterprise view that is complemented by data from resource planning and accounting systems. In academia, the IoT can be used to automatically track and deliver data records. Local governments are exploiting the IoT to increase the efficiency and safety of services provided to their population. The use of the IoT is integral to successful traffic management and mass transportation control. Accompanied by the increase in popularity and usage/reliance comes an increased possibility of cyberattacks. It is a widely accepted theory that, in many cases, malicious actors target popular devices for susceptible attack surfaces to amplify the effect of successful exploitation. Therefore, it is crucial to assess, understand, and, if possible, improve the protocols and security measures used in the devices and endpoints in an endeavor to create a safe environment for the user. A layered approach will provide optimal network and device defense. The perimeter security of an IoT network is essential for preventing breaches. Perimeter defense techniques include firewalls, IDS/IPSs, physical access controls, and network access control lists.
The Special Issue aims to gather innovative security solutions for IoT. We aim for security solutions for the whole IoT family including, but not limited to, wireless sensor networks (WSN), wireless body area networks (WBANs), etc. Topics of interest include but are not limited to:
- IoT privacy and security;
- WSN security;
- WBAN privacy and security;
- Cloud-based IoT security;
- Machine learning for IoT security;
- IoT hardware security;
- Blockchain for IoT security;
- Industrial IoT security;
- Medial IoT privacy and security;
- Cryptography in IoT;
- Layered security principles and ways to enhance perimeter defense in the IoT;
- IoT gateway vulnerabilities and best practices of defense;
- The malicious impact on IoT, Thingbots, Hivenets;
- Forensics in IoT;
- Law, Policy, and Privacy in IoT.
Prof. Dr. Thaier Hayajneh
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.