Security and Privacy in IoT Systems (SPIoTS)

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Internet of Things (IoT)".

Deadline for manuscript submissions: closed (30 June 2023) | Viewed by 8992

Special Issue Editors


E-Mail Website
Guest Editor
Norsk Regnesentral (Norwegian Computing Center, NR), 0373 Oslo, Norway
Interests: adaptive security; cybersecurity; Internet of Things; context-awareness; game theory; WBANs
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor

E-Mail Website
Guest Editor
1. AthensTech Campus, University of Sheffield, Sheffield S10 2TN, UK
2. Honorary Research Fellow, University of Glasgow, Glasgow G12 8QQ, UK
Interests: IoT; CPS; risk sssessment; machine learning; deep learning

Special Issue Information

Dear Colleagues,

Security and privacy are vital challenges for IoT users as they move around denser and more ubiquitous, networked, intelligent environments embedded with different connected smart objects that interact with each other and with IoT users in new ways. The focus is on the use of devices in passive, non-smart environments, with far less focus on emerging and future security and privacy threats for the IoT. Increasingly, it is difficult to differentiate which physical spaces are smart whether they are personal, social, or public in scope and what the different privacy invasions and security threats are, e.g., the use of remotely connected virtual digital assistants that now increasingly encroach on personal spaces. Most security and privacy researchers predominantly focus on the current information security threat landscape, protecting the use of personal smart tab and smart pad sized devices, such as smartphones, tablets, and laptops. However, the range of smart objects also encompasses smart skins (wearable body shaped devices, e.g., wrist-ware, glasses), smart dust (tiny smart components), smart boards (whose displays adapt to multiple local users), same clay (aggregates of smart devices), and smart (body-sized or greater-sized) containers.

IoT objects collect and aggregate fragments of data that relate to their service, and IoT users often have to submit complete contextual information to providers to access their mobile information services, hence, IoT users have a lack of user-centered control of their information privacy. Some lower computation devices, such as eHealth wearables, tend to support weaker security as these often use open network connections or ones with weaker security, leading to higher security risks such as eavesdropping. Not only can IoT users be tracked by remote service providers but as physical environments become more intelligent, these physical spaces increasingly contain more smart devices that can also track users. When multiple devices are networked as an Internet of Things, multi-environment context collusions can be used to identify and track individuals in a way that violates their privacy expectations.

Sophisticated artificial intelligence (AI) mechanisms not only enhance the reliability of IoT networks but also increase the security and privacy problems as AI mechanisms require accessing more data from IoT devices to get better results. The IoT instrumented-self offers challenges because of the use of microelectromechanical system sensors such as accelerometers embedded in phones and wearables, hiding the computing yet imbuing them with the ability to acquire more fine-grained user context information. This is accompanied by a rise in information services to share this and in crowd-sensing data applications that can data mine IoT users’ information to identify individual users’ unique behaviors.

This Special Issue seeks submissions offering research and development systems, applications, results, and experimental solutions that advance the state of the art of security and privacy solutions for IoT systems in Intelligent Environments comprising ubiquitous computing devices connected into Internets of Things. We seek articles that advance security and privacy for IoT users beyond mere mobile phone device use. We especially welcome papers that tackle both security and privacy for smart IoT users in intelligent environments and that use AI mechanisms to improve the security and privacy of IoT systems.

Dr. Habtamu Abie
Dr. Stefan Poslad
Prof. Dr. John Soldatos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Security
  • Privacy
  • Internet of Things
  • Artificial Intelligence
  • Smart IoT Environments
  • Intelligent IoT Environments

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 442 KiB  
Article
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids
by Svetlana Boudko, Peder Aursand and Habtamu Abie
Information 2020, 11(12), 582; https://doi.org/10.3390/info11120582 - 14 Dec 2020
Cited by 5 | Viewed by 3472
Abstract
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree structure where each node [...] Read more.
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree structure where each node aggregates the information of its children before encrypting it and passing it on to its parent. As a part of the model, we developed a discretization scheme for solving the replicator equations. The aim of this work was to explore the space of possible behaviors of attackers and to develop a framework where the AMI nodes adaptively select the most profitable strategies. Using this model, we simulated the evolution of a population of attackers and defenders on various cases resembling the real life implementation of AMI. We discuss in depth how to enhance security in AMI using evolutionary game theory either by a priori analysis or as a tool to run dynamic and adaptive infrastructure defense. Full article
(This article belongs to the Special Issue Security and Privacy in IoT Systems (SPIoTS))
Show Figures

Figure 1

16 pages, 443 KiB  
Article
Openness and Security Thinking Characteristics for IoT Ecosystems
by Bahtijar Vogel, Miranda Kajtazi, Joseph Bugeja and Rimpu Varshney
Information 2020, 11(12), 564; https://doi.org/10.3390/info11120564 - 2 Dec 2020
Cited by 3 | Viewed by 3568
Abstract
While security is often recognized as a top priority for organizations and a push for competitive advantage, repeatedly, Internet of Things (IoT) products have become a target of diverse security attacks. Thus, orchestrating smart services and devices in a more open, standardized and [...] Read more.
While security is often recognized as a top priority for organizations and a push for competitive advantage, repeatedly, Internet of Things (IoT) products have become a target of diverse security attacks. Thus, orchestrating smart services and devices in a more open, standardized and secure way in IoT environments is yet a desire as much as it is a challenge. In this paper, we propose a model for IoT practitioners and researchers, who can adopt a sound security thinking in parallel with open IoT technological developments. We present the state-of-the-art and an empirical study with IoT practitioners. These efforts have resulted in identifying a set of openness and security thinking criteria that are important to consider from an IoT ecosystem point of view. Openness in terms of open standards, data, APIs, processes, open source and open architectures (flexibility, customizability and extensibility aspects), by presenting security thinking tackled from a three-dimensional point of view (awareness, assessment and challenges) that highlight the need to develop an IoT security mindset. A novel model is conceptualized with those characteristics followed by several key aspects important to design and secure future IoT systems. Full article
(This article belongs to the Special Issue Security and Privacy in IoT Systems (SPIoTS))
Show Figures

Figure 1

Back to TopTop