Futuristic Security and Privacy in 6G-Enabled IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 January 2025) | Viewed by 11109

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science (DIDA), Blekinge Institute of Technology, 37179 Karlskrona, Sweden
Interests: cyber; information security and digital forensics in the IoT (IoT & IIoT security); digital forensics-incident response; cyber-physical system protection; critical infrastructure protection; cloud computing security; computer systems; distributed system security; threat hunting; modeling and cyber-security risk assessment; blockchain technologies; privacy-preserving techniques; cybersecurity of renewable energy

E-Mail Website
Guest Editor
Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118 Halmstad, Sweden
Interests: Internet of Things (IoT); machine learning (ML); deep learning; real-time analysis; data visualizations; big data; digital forensics; edge and cloud computing; dimensionality reduction; blockchain; federated learning; transfer and interactive learning; internet of health

E-Mail Website
Guest Editor
Internet of Things and People Research Center, Department of Computer Science and Media Technology, Malmö University, 20506 Malmö, Sweden
Interests: software engineering; Internet of Things; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The world is currently witnessing a shift in how communication and data are being handled; this can be attributed to improved communication techniques, increased device usage, and the need to make meaning of the data being exchanged on a daily basis. Sixth-generation (6G) networks are projected to transform communication and networks in terms of frequency, bandwidth, data rate, and spectral efficiency. Consequently, the Internet of Things (IoT) has been at the center of all these transformations, where it has recently gained significant attention. While we focus on the effects of this connectedness, it is important to highlight that sixth-generation (6G) technologies are poised to revolutionize how telecommunications is conducted. In this Special Issue, we will look at the effect that the introduction of 6G will have on continued IoT proliferation. Security and privacy in the IoT have been hotly contested topics in the last decade; however, with the introduction of 6G, it is expected that challenges, benefits, and new achievements will be witnessed not only in how devices connect, but also in how communication is handled, with the interoperability, efficiency, safety, security and privacy of devices and data with intelligent attributes being relevant aspects. Given this context, in this Special Issue we welcome researchers from academia and industry to submit cutting-edge articles on relevant topics that offer pertinent solutions to open problems and existing, or future, challenges in IoT infrastructures.

This Special Issue offers an opportunity for researchers and practitioners to explore the interplay of security and privacy with 6G and IoT, as well as current state-of-the-art, theoretical, technical, and futuristic security and privacy with the sporadic developments in 6G communication networks in IoT.

We solicit papers in the following areas:

  • Security and privacy in 6G and IoT;
  • Evolutionary intelligence in 6G;
  • Securing 6G in IoT ecosystems;
  • Privacy, trust, and reputation in 6G networks;
  • Privacy of IoT devices;
  • Security of smart ecosystems;
  • Machine learning in IoT systems;
  • Anomaly detection in IoT environment;
  • Threat and vulnerability detection in IoT environment;
  • Artificial intelligence in IoT;
  • Offensive security in IoT infrastructure;
  • Blockchain in 6G-enabled IoT environments;
  • Blockchain for renewable energy in IoT environments;
  • Edge and fog protection techniques in IoT;
  • Securing the cloud;
  • Interactive and federated learning techniques in IoT;
  • Information security;
  • Advances in IoT and IIoT;
  • Advances in intelligent forensics in IoT;
  • 6G fabric, open problems, and future solutions.

Dr. Victor R. Kebande
Dr. Sadi Alawadi
Dr. Fahed Alkhabbas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • future security
  • privacy
  • IoT
  • 6G
  • reputation in 6G
  • anomaly detection in IoT
  • renewable energy in IoT
  • blockchain and IoT
  • threat and vulnerability in IoT

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

21 pages, 8458 KiB  
Article
The Effect of Ironic Process Theory on Brain Signal-Based Encryption for IoT Devices
by Ahmet Furkan Aydogan, Cihan Varol, Narasimha Karpoor Shashidhar, Amar Rasheed, Van Vung Pham and Murat Karabatak
Electronics 2024, 13(23), 4804; https://doi.org/10.3390/electronics13234804 - 5 Dec 2024
Viewed by 633
Abstract
Numerous encryption methods have been published to secure IoT devices in the last decade. Existing encryption methods still have disadvantages when it comes to securing IoT devices. On the other hand, a new encryption method using brain signals in IoT devices is gaining [...] Read more.
Numerous encryption methods have been published to secure IoT devices in the last decade. Existing encryption methods still have disadvantages when it comes to securing IoT devices. On the other hand, a new encryption method using brain signals in IoT devices is gaining attention as a new solution. The encryption method based on brain signals essentially involves a hypothesis called imposed recall based on ironic process theory. The imposed recall was created with the expectation that imposing a specific choice on the subjects during the acquisition of brain signals would allow for better separation of EEG data. This paper presents experiments and approaches to prove the validity of the imposed recall hypothesis. With the experiments, the effects of ironic process theory on brain signal-based encryption can be observed. While performing the tests, varying approaches, including Granger causality, were applied to analyze the results. The results show that the imposed recall hypothesis can successfully reconstruct EEG data. The structured signals were determined to be effective in capturing matches of brain signals on subjects at different time intervals. Thus, the imposed recall hypothesis can be used in various fields, such as authentication, questioning, and identification, by reserving brain signals to be obtained from individuals. In addition, it was reported that it is possible to acquire the ability to provide security in both devices with limited hardware, such as IoT devices or complex systems. Full article
(This article belongs to the Special Issue Futuristic Security and Privacy in 6G-Enabled IoT)
Show Figures

Figure 1

28 pages, 3803 KiB  
Article
Anomaly Detection in 6G Networks Using Machine Learning Methods
by Mamoon M. Saeed, Rashid A. Saeed, Maha Abdelhaq, Raed Alsaqour, Mohammad Kamrul Hasan and Rania A. Mokhtar
Electronics 2023, 12(15), 3300; https://doi.org/10.3390/electronics12153300 - 31 Jul 2023
Cited by 39 | Viewed by 5015
Abstract
While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big [...] Read more.
While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113. Full article
(This article belongs to the Special Issue Futuristic Security and Privacy in 6G-Enabled IoT)
Show Figures

Figure 1

25 pages, 11333 KiB  
Article
Non-Pattern-Based Anomaly Detection in Time-Series
by Volodymyr Tkach, Anton Kudin, Victor R. Kebande, Oleksii Baranovskyi and Ivan Kudin
Electronics 2023, 12(3), 721; https://doi.org/10.3390/electronics12030721 - 1 Feb 2023
Cited by 2 | Viewed by 2831
Abstract
Anomaly detection across critical infrastructures is not only a key step towards detecting threats but also gives early warnings of the likelihood of potential cyber-attacks, faults, or infrastructure failures. Owing to the heterogeneity and complexity of the cybersecurity field, several anomaly detection algorithms [...] Read more.
Anomaly detection across critical infrastructures is not only a key step towards detecting threats but also gives early warnings of the likelihood of potential cyber-attacks, faults, or infrastructure failures. Owing to the heterogeneity and complexity of the cybersecurity field, several anomaly detection algorithms have been suggested in the recent past based on the literature; however, there still exists little or no research that points or focuses on Non-Pattern Anomaly Detection (NP-AD) in Time-Series at the time of writing this paper. Most of the existing anomaly detection approaches refer to the initial profiling, i.e., defining which behavior represented by time series is “normal”, whereas everything that does not meet the criteria of “normality” is set as “abnormal” or anomalous. Such a definition does not reflect the complexity and sophistication of anomaly nature. Under different conditions, the same behavior may or may not be anomalous. Therefore, the authors of this paper posit the need for NP-AD in Time-Series as a step toward showing the relevance of deviating or not conforming to expected behaviors. Non-Pattern (NP), in the context of this paper, illustrates non-conforming patterns or a technique of deviating with respect to some characteristics while dynamically adapting to changes. Based on the experiments that have been conducted in this paper, it has been observed that the likelihood of NP-AD in Time-Series is a significant approach based on the margins of data streams that have been used from the perspective of non-seasonal time series with outliers, the Numenta Anomaly Benchmark (NAB) dataset and the SIEM SPLUNK machine learning toolkit. It is the authors’ opinion that this approach provides a significant step toward predicting futuristic anomalies across diverse cyber, critical infrastructures, and other complex settings. Full article
(This article belongs to the Special Issue Futuristic Security and Privacy in 6G-Enabled IoT)
Show Figures

Figure 1

Review

Jump to: Research

32 pages, 12646 KiB  
Review
A Bibliometric Review of Intrusion Detection Research in IoT: Evolution, Collaboration, and Emerging Trends
by Nikolaj Goranin, Simran Kaur Hora and Habil Antanas Čenys
Electronics 2024, 13(16), 3210; https://doi.org/10.3390/electronics13163210 - 13 Aug 2024
Viewed by 1538
Abstract
As the IoT market continues to rapidly expand, ensuring the security of IoT systems becomes increasingly critical. This paper aims to identify emerging trends and technologies in IoT intrusion detection. A bibliometric analysis of research trends in IoT intrusion detection, leveraging data from [...] Read more.
As the IoT market continues to rapidly expand, ensuring the security of IoT systems becomes increasingly critical. This paper aims to identify emerging trends and technologies in IoT intrusion detection. A bibliometric analysis of research trends in IoT intrusion detection, leveraging data from the Web of Science (WoS) repository, is conducted to understand the landscape of publications in this field. The analysis reveals a significant increase in publications on intrusion detection in IoT, indicating growing research interest. Research articles are the leading category of publications, and the analysis also highlights the collaborative linkages among authors, institutions, and nations. Co-occurrence analysis and citation analysis provide insights into the relationships among keywords and the impact of publications. The study also identifies keyword and publication citation burst detection, with recommendations for future research focusing on advanced machine learning techniques to enhance intrusion/anomaly detection. This comprehensive analysis offers valuable guidance for diverse and extensive applications in IoT intrusion detection. Full article
(This article belongs to the Special Issue Futuristic Security and Privacy in 6G-Enabled IoT)
Show Figures

Figure 1

Back to TopTop