Security and Communication Networks

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms


Status
Published

Lead Editor

1Luleå University of Technology, Skellefteå, Sweden

2Soonchunhyang University, Chungcheongnam-do, Republic of Korea

3University of Salerno, Fisciano, Italy


Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms

Description

In recent years, with the rapid development of the smart city paradigm, the Internet of Things (IoT) has raised widespread concern in the whole ICT community. IoT refers to linking the sensors, controllers, machines, people, and things together by using local networks, the Internet, or other communication technologies through a new way to build intelligent things to things network. However, in the near future, the large-scale deployment of the IoT also needs to face many challenges, especially in security and privacy issues for smart, connected, and mobile IoT devices and platforms due to the fact that IoT has different characteristics from the traditional communication networks, related to its specific features and threats. In particular, the security solutions for IoT must provide IoT nodes (things, users, servers, and objects) with data authenticity, confidentiality, integrity and freshness certification, and authorization. In addition, privacy protection must also be considered. Many IoT services and applications may expose sensitive and personal information which may be abused by attackers. The concept of privacy may be different, but it should protect the user’s personal identity information and maintain a certain degree of anonymity, nonlinkability, and data confidentiality. Of course, it is also necessary to strike a balance between the availability and the security and privacy protection for IoT.

The special issue will focus on the IoT devices and platforms with respect to security and privacy preserving technologies for speeding up technological progress and attracting more researchers’ concerns about the development in this field. In addition, this special issue will include the extended versions of the best papers, which will be presented at the 2nd International Symposium on Mobile Internet Security (MobiSec’17, https://isyou.info/conf/mobisec17/).

Potential topics include but are not limited to the following:

  • Advanced IoT security technology and applications
  • IoT privacy and trust model
  • Security related hardware and platforms in IoT
  • Authentication and access control in IoT
  • Data processing and privacy in IoT
  • Security protocols for IoT
  • Semantic approaches for multimedia retrieval applications
  • IoT security and privacy issues in cyberphysical systems
  • Network security for IoT
  • Software security for IoT
  • Threat intelligence for IoT
  • Lightweight security and cryptographical technology for IoT
  • Standardization aspects of IoT security and privacy
  • IoT wireless communication technology
  • Intrusion detection and tolerant fault tolerance technology for IoT
  • Malware detection and prevention technology for IoT
  • Cryptographic hardware development for IoT devices

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 5346596
  • - Editorial

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms

Karl Andersson | Ilsun You | Francesco Palmieri
  • Special Issue
  • - Volume 2018
  • - Article ID 5483472
  • - Research Article

An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation

Dahee Choi | Kyungho Lee
  • Special Issue
  • - Volume 2018
  • - Article ID 4672072
  • - Research Article

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications

Marios Argyriou | Nicola Dragoni | Angelo Spognardi
  • Special Issue
  • - Volume 2018
  • - Article ID 7243296
  • - Research Article

Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media

Won Park | Youngin You | Kyungho Lee
  • Special Issue
  • - Volume 2018
  • - Article ID 8176984
  • - Research Article

A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization

Jianjun Li | Jie Yu | ... | Junfeng Hu
  • Special Issue
  • - Volume 2018
  • - Article ID 8510256
  • - Research Article

Design and Analysis of Push Notification-Based Malware on Android

Sangwon Hyun | Junsung Cho | ... | Hyoungshick Kim
  • Special Issue
  • - Volume 2018
  • - Article ID 5932183
  • - Research Article

A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency

Youngho Park | Chul Sur | Kyung-Hyune Rhee
  • Special Issue
  • - Volume 2018
  • - Article ID 6135845
  • - Research Article

Security Evaluation Framework for Military IoT Devices

Sungyong Cha | Seungsoo Baek | ... | Seungjoo Kim
  • Special Issue
  • - Volume 2018
  • - Article ID 7202598
  • - Research Article

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience

Yinghui Zhang | Pengzhen Lang | ... | Rui Guo
  • Special Issue
  • - Volume 2018
  • - Article ID 6280768
  • - Research Article

Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework

Jaewoo Shim | Kyeonghwan Lim | ... | Minkyu Park
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.