Cyber Security in IoT
A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".
Deadline for manuscript submissions: 30 September 2025 | Viewed by 13854
Special Issue Editors
Interests: cybersecurity; digital forensics; steganography; anomaly detection
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
In 2021, the number of active IoT devices amounted to 12.2 trillion. It is predicted that by 2025 there will be 27 trillion active IoT devices. Smart devices connected to the Internet make our lives more comfortable and enjoyable. As consumers, we like and need to exchange information with others in real-time. Smartphones, smart watches, smart home appliances, smart cars and intelligent cities blend more and more into our everyday life. Companies, enterprises or device manufacturers control industrial processes or supply chains using an increasing number of devices connected to the Internet called industrial control systems. Systems or services based on the IoT ecosystem are becoming critical for organisations and consumers from the point of view of their business continuity. They should be included in risk management systems. The IoT ecosystem comprises elements that make up IoT solutions and allow you to manage IoT devices. The most important aspects of the IoT ecosystem are IoT hardware solutions consisting of sensors, microcontrollers, microprocessors, power systems, memory and communication interfaces; IoT device software along with authorisation and data protection services; wired and wireless communication networks; platforms collecting data integrated with cloud services; data processing algorithms, including artificial intelligence and machine learning algorithms, as well as personal teams dealing with data processing, scientists, IT specialists and cybersecurity specialists. Each of these elements of the IoT ecosystem can be an area vulnerable to cybercriminal attacks. Unauthorised access to a specific layer of the IoT ecosystem may cause visible or invisible effects on the services provided. In particular, it may threaten business continuity or drive the incorrect implementation of processes. This Special Issue is dedicated to presenting threats, vulnerabilities to cybercriminals' attacks and proactive and reactive solutions to protecting individual elements of the ecosystem of intelligent devices connected to the Internet.
Prof. Dr. Krzysztof Szczypiorski
Dr. Daniel Paczesny
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- IoT cybersecurity prevention and response strategies
- emergent cybersecurity risks arising from IoT-enabled 5G and 6G
- situation awareness of IoT environment
- risk identification, assessment, and mitigation in IoT systems
- security architecture and frameworks for IoT
- IoT devices and protocols security
- attack detection and prevention in IoT
- privacy-preserving techniques in IoT
- secure integration of IoT and cloud/edge computing
- machine learning techniques for IoT security
- secure data management approaches
- security in cyber-physical systems
- blockchain technologies for reliable and trustworthy IoT
- threat and vulnerability analysis of IoT
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.