sensors-logo

Journal Browser

Journal Browser

Access Control in Internet of Things (IoT)

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 25 March 2025 | Viewed by 1980

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC 3086, Australia
Interests: different aspects of security, privacy and trust practices to address emergency events such as the COVID-19 outbreak and other e-health measures; data governance and big data applications; Internet of Things and data quality; context-aware access control; data sharing and privacy; security and AI; ransomware detection and defense; IoT security; cloud/fog security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing, Engineering and Mathematical Sciences, La Trobe University, Bundoora, VIC 3086, Australia
Interests: different aspects of data security and data privacy; access control mechanisms in integrated systems, IoT data streaming management, optimization, security and access

E-Mail Website
Guest Editor
Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC 3086, Australia
Interests: different aspects of cybersecurity and blockchain: access control; applied cryptography; blockchain; distributed systems; edge and cloud computing; Internet of Things; digital health
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Edge computing transforms how data generated by billions of Internet of Things (IoT) devices is stored, processed, analyzed, and transported. 

Because of the IoT environment's unique characteristics, including distributed access control, real-time access to network information, recourse connection and limitation, many current protocols, solutions, and mechanisms exploited in IoT and cloud computing to enhance security and privacy are no longer suitable for edge computing environments. As IoT and edge computing technologies such as autonomous vehicles, remote monitoring, smart grid, in-hospital patient monitoring, and cloud computing and gaming continue to advance, the security and privacy challenges will be even further escalated. Hence, research aimed at security and privacy solutions is especially important in the fields of IoT and edge computing.  

This Special Issue aims to collect recent high-quality research addressing security and privacy problems in the emerging IoT and edge computing field in both the industrial and academic research communities. High-quality contributions addressing related theoretical and practical aspects are welcome.  

Potential topics for submissions include, but are not limited to, the following: 

  • Security and privacy modelling in the IoT and edge computing. 
  • Security and privacy issues in the IoT and edge computing.
  • Secure data sharing and management in the IoT and edge computing.
  • Privacy-enhanced technology in the IoT and edge computing.
  • Privacy technologies and mechanisms in the IoT and edge computing.
  • Authentication in the IoT and edge computing.
  • Access control in the IoT and edge computing.
  • Secure edge storage.
  • Vulnerabilities in the IoT and Edge computing.
  • Wireless and Mobile Security in the IoT and edge computing.
  • Access control policies to prevent cyber threats in the IoT and edge computing.
  • Sensor network security in the IoT and edge computing.
  • User authentication and authorization in the IoT and edge computing.

Dr. A.S.M. Kayes
Prof. Dr. Wenny Rahayu
Dr. Ahmad Salehi Shahraki
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • access control
  • cloud computing
  • data security
  • edge computing security and privacy
  • Internet of Things (IoT)

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

32 pages, 4018 KiB  
Article
IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments
by Hari Purnama and Masahiro Mambo
Sensors 2024, 24(3), 979; https://doi.org/10.3390/s24030979 - 2 Feb 2024
Cited by 2 | Viewed by 1322
Abstract
Ensuring authorized access control in the IoT is vital for privacy and safety protection. Our study presents the novel IHIBE framework, which combines IOTA (a distributed ledger technology) with hierarchical identity-based encryption (HIBE), thereby enhancing both IoT security and scalability. This approach secures [...] Read more.
Ensuring authorized access control in the IoT is vital for privacy and safety protection. Our study presents the novel IHIBE framework, which combines IOTA (a distributed ledger technology) with hierarchical identity-based encryption (HIBE), thereby enhancing both IoT security and scalability. This approach secures access tokens and policies while reducing the computational demand on data owners. Our empirical findings reveal a significant performance gap, with access rights delegation on the Raspberry Pi 4 exceeding those on AWS by over 250%. Moreover, our analysis uncovers optimal identity policy depths: up to 640 identities on AWS and 640 on the Raspberry Pi 4 for systems with higher tolerable delays, and 320 identities on AWS versus 160 on the Raspberry Pi 4 for systems with lower tolerable delays. The system shows practical viability, exhibiting insignificant operational time differences compared to Zhang et al.’s schemes, particularly in access rights verification processes, with a minimal difference of 33.35%. Our extensive security assessment, encompassing scenarios like encrypted token theft and compromise of authority, affirms the efficacy of our challenge-response and last-word challenge (LWC) mechanisms. This study underscores the importance of platform choice in IoT system architectures and provides insights for deploying efficient, secure, and scalable IoT environments. Full article
(This article belongs to the Special Issue Access Control in Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop