Security and Communication Networks

Security and Communication Networks / 2018 / Article
Special Issue

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms

View this Special Issue

Editorial | Open Access

Volume 2018 |Article ID 5346596 | 2 pages |

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms

Received03 Sep 2018
Accepted03 Sep 2018
Published27 Sep 2018

1. Introduction

In recent years, with the rapid development of the smart city paradigm, the Internet of Things (IoT) has raised widespread concern in the whole ICT community. IoT refers to linking the sensors, controllers, machines, people, and things together by using local or wide area communication and cloud technologies, with the Internet as the glue, through a new way to build an intelligent things-to-things network. However, in the near future, the large-scale deployment of the IoT also needs to face many challenges, especially in security and privacy issues for smart, connected, and mobile IoT devices and platforms due to the fact that IoT has different characteristics from traditional communication networks, related to its specific features and threats. In particular, the security solutions for IoT must provide IoT nodes (things, users, servers, and objects) with data authenticity, confidentiality, integrity and freshness certification, and authorization. In addition, privacy protection must also be considered. Many IoT services and applications may expose sensitive and personal information which may be abused by attackers. The concept of privacy may be different, but it should protect the user’s personal identity information and maintain a certain degree of anonymity, nonlinkability, and data confidentiality. Of course, it is also necessary to strike a balance between the availability and the security and privacy protection for IoT.

This special issue focuses on the IoT devices and platforms with respect to security and privacy preserving technologies for speeding up the technological progress and attracting more researchers’ concerns about the development in this field. In addition, this special issue includes extended versions of the best papers presented at the 2nd International Symposium on Mobile Internet Security (MobiSec’17) held on Jeju, Jeju Island, Republic of Korea, on October 19–22, 2017.

For the current issue, we are pleased to introduce a collection of papers covering a range of topics as follows: frameworks for detecting malicious applications; algorithms for image quality assessment and image denoising based for image security and authorization; push notification-based malware; models for detecting potential insider threat; methods for financial fraud detection; security evaluation framework for military IOT devices; certificateless aggregate signature schemes; high-security interaction systems; secure incentive schemes for vehicular delay tolerant networks; ciphertext retrieval schemes; systems with secret key leakage-resilience; solutions for jammer localization in multihop wireless networks; homomorphic network coding signature schemes for multiple sources; cryptanalysis of compact-LWE and related lightweight public key encryption; smart trust management methods to detect on-off attacks; and network performance and security testing.

Conflicts of Interest

The editors declare that they have no conflicts of interest regarding the publication of this special issue.


As always, we appreciate the high quality submissions from authors and the support of the community of reviewers.

Karl Andersson
Ilsun You
Francesco Palmieri

Copyright © 2018 Karl Andersson et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

1347 Views | 571 Downloads | 0 Citations
 PDF  Download Citation  Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.