Security and Communication Networks

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms


Status
Published

Lead Editor

1Luleå University of Technology, Skellefteå, Sweden

2Soonchunhyang University, Chungcheongnam-do, Republic of Korea

3University of Salerno, Fisciano, Italy


Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms

Description

In recent years, with the rapid development of the smart city paradigm, the Internet of Things (IoT) has raised widespread concern in the whole ICT community. IoT refers to linking the sensors, controllers, machines, people, and things together by using local networks, the Internet, or other communication technologies through a new way to build intelligent things to things network. However, in the near future, the large-scale deployment of the IoT also needs to face many challenges, especially in security and privacy issues for smart, connected, and mobile IoT devices and platforms due to the fact that IoT has different characteristics from the traditional communication networks, related to its specific features and threats. In particular, the security solutions for IoT must provide IoT nodes (things, users, servers, and objects) with data authenticity, confidentiality, integrity and freshness certification, and authorization. In addition, privacy protection must also be considered. Many IoT services and applications may expose sensitive and personal information which may be abused by attackers. The concept of privacy may be different, but it should protect the user’s personal identity information and maintain a certain degree of anonymity, nonlinkability, and data confidentiality. Of course, it is also necessary to strike a balance between the availability and the security and privacy protection for IoT.

The special issue will focus on the IoT devices and platforms with respect to security and privacy preserving technologies for speeding up technological progress and attracting more researchers’ concerns about the development in this field. In addition, this special issue will include the extended versions of the best papers, which will be presented at the 2nd International Symposium on Mobile Internet Security (MobiSec’17, https://isyou.info/conf/mobisec17/).

Potential topics include but are not limited to the following:

  • Advanced IoT security technology and applications
  • IoT privacy and trust model
  • Security related hardware and platforms in IoT
  • Authentication and access control in IoT
  • Data processing and privacy in IoT
  • Security protocols for IoT
  • Semantic approaches for multimedia retrieval applications
  • IoT security and privacy issues in cyberphysical systems
  • Network security for IoT
  • Software security for IoT
  • Threat intelligence for IoT
  • Lightweight security and cryptographical technology for IoT
  • Standardization aspects of IoT security and privacy
  • IoT wireless communication technology
  • Intrusion detection and tolerant fault tolerance technology for IoT
  • Malware detection and prevention technology for IoT
  • Cryptographic hardware development for IoT devices

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 9641273
  • - Research Article

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT

Tong Li | Wenbin Chen | ... | Hongyang Yan
  • Special Issue
  • - Volume 2018
  • - Article ID 2595273
  • - Research Article

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment

Libing Wu | Zhiyan Xu | ... | Xianmin Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 4351603
  • - Review Article

Survey of Authentication and Authorization for the Internet of Things

Michal Trnka | Tomas Cerny | Nathaniel Stickney
  • Special Issue
  • - Volume 2018
  • - Article ID 7254305
  • - Research Article

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage

Run Xie | Chanlian He | ... | Xiaojun Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 4879496
  • - Research Article

A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things

Jun Xu | Xiong Zhang | Meng Zhou
  • Special Issue
  • - Volume 2018
  • - Article ID 4296934
  • - Review Article

Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures

Xin Su | Ziyu Wang | ... | Dongmin Choi
  • Special Issue
  • - Volume 2018
  • - Article ID 7670939
  • - Research Article

Jammer Localization in Multihop Wireless Networks Based on Gravitational Search

Tongxiang Wang | Xianglin Wei | ... | Tao Liang
  • Special Issue
  • - Volume 2018
  • - Article ID 6063456
  • - Research Article

A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

Jean Caminha | Angelo Perkusich | Mirko Perkusich
  • Special Issue
  • - Volume 2018
  • - Article ID 4957045
  • - Research Article

Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

Dianyan Xiao | Yang Yu
  • Special Issue
  • - Volume 2018
  • - Article ID 1746809
  • - Research Article

International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework

ByungRae Cha | Sun Park | ... | JuHyun Shin
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.