About this Journal Submit a Manuscript Table of Contents

Innovative Applications and Security of Internet of Things

Call for Papers

With the advances and falling cost of intelligent things like RFID/USN, sensor networks, NFC, Zigbee, and other relevant technologies, the potential applications and implementations of Internet of Things have been intensively studied by both the academia and the industry. One potential application is integrating social networks with IoTs, which results in the Social Internet of Things (SIoTs). Integrating social networks and IoTs has the potential to support novel applications and networking services for the IoTs in more effective and efficient ways. For example, trustworthiness in social networks might be utilized to manage objects in IoTs and discover objects and services; apparently, it is much more dynamic and possibly more efficient. Ubiquitous objects interaction could support new social interactions, and well-studied models for social networks might be applied to tackle the issues of IoTs. However, many challenges exist toward this paradigm: killer applications, infrastructure, models, and harmonizing the philosophies and settings of the security and privacy of the two different networks. We hope to attract a diverse group of researchers, academics, designers, and others to discuss these issues from a broad range of perspectives.

Original contributions, not currently under review to another journal or conference, are solicited for this special issue. Potential topics include, but are not limited to:

  • Integration of social computing and IoTs
  • Internet of Things architecture, communication protocol, and transmission technology
  • Theory and technology of infrastructure for wireless sensor network
  • Technologies of data management and integration in the Internet of Things
  • Business information processing and business models in the Internet of Things
  • Integration of heterogeneous information for the Internet of Things
  • Context awareness in the Internet of Things and related security issues
  • New security problems and cryptographic protocols in the context of the SIoTs or IoTs
  • Trustworthiness issues in SIoTs, IoTs, and sensor networks
  • Authentication, access control, and privacy protection for SIoTs, IoTs, and sensor networks
  • Attacks on SIoTs, IoTs, or sensor networks
  • Commercial and industrial applications for IoTs
  • New applications of secure IoTs and SIoTs systems
  • Experience and case study on the system of wireless sensor network application, Internet of Things, and Social IoTs
  • Demos and prototype testing

Before submission authors should carefully read over the journal’s Author Guidelines, which are located at http://www.hindawi.com/journals/ijdsn/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/ijdsn/asit/ according to the following timetable:

Manuscript DueFriday, 12 July 2013
First Round of ReviewsFriday, 4 October 2013
Publication DateFriday, 29 November 2013

Lead Guest Editor

Guest Editors

  • YingJiu Li, Singapore Management University, Singapore 188065
  • Nei-Wei Lo, National Taiwan University of Science and Technology, Taipei 106, Taiwan