Journal of Computer Networks and Communications

Security Solutions for IoT and Cyber-Physical Systems


Publishing date
01 Apr 2022
Status
Closed
Submission deadline
19 Nov 2021

1Lorestan University, Khorramabad, Iran

2Tecnológico de Monterrey, Monterrey, Mexico

3K. N. Toosi University of Technology, Tehran, Iran

This issue is now closed for submissions.
More articles will be published in the near future.

Security Solutions for IoT and Cyber-Physical Systems

This issue is now closed for submissions.
More articles will be published in the near future.

Description

The Internet of Things (IoT) and cyber-physical systems (CPS) have proliferated into all aspects of life. They provide immense benefits over traditional methods for controlling and sensing the physical world and establish new horizons of service excellence in a variety of application fields such as entertainment, energy, manufacturing, smart vehicles, smart healthcare systems, smart grid, smart homes, and so forth. However, these advantages also impose new concerns.

These systems generate, collect, and process an extensive amount of sensitive information that might be misused by attackers. The impacts of attacks on these systems combined with the frequent identification of new vulnerability types and the non-determinism of the behaviors of these systems make them a desirable target to malicious intents. Attacks, failures, and faults lead to variations in the dynamics of IoT and CPS and cause the malfunction and instability of normal operations. Therefore, IoT and CPS applications must be operated with proper security and privacy solutions in order to prevent any unexpected damages to systems and users.

This Special Issue solicits state-of-the-art original research and review articles that address the current problems in the security of IoT and CPS.

Potential topics include but are not limited to the following:

  • Data security and privacy solutions
  • Security protocols
  • Secure system development
  • Authentication and access control
  • Availability, recovery, and auditing
  • Secure data analytics
  • Threat modelling
  • Vulnerability analysis
  • Embedded systems security
  • Intrusion detection and resilience
  • Adaptive attack mitigation
  • Blockchain-based security and privacy solutions
  • Trustable and verifiable computations
Journal of Computer Networks and Communications
 Journal metrics
See full report
Acceptance rate9%
Submission to final decision100 days
Acceptance to publication24 days
CiteScore6.400
Journal Citation Indicator0.430
Impact Factor-
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.