Security and Communication Networks

Security and Privacy Challenges for Intelligent Internet of Things Devices 2022


Publishing date
01 Oct 2022
Status
Published
Submission deadline
10 Jun 2022

Lead Editor

1Nanjing University of Science and Technology, Nanjing, China

2University of Technology Sydney, Sydney, Australia

3Southeast University, Nanjing, China

4Delft University of Technology, Delft, Netherlands


Security and Privacy Challenges for Intelligent Internet of Things Devices 2022

Description

With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth. Billions of intelligent IoT devices (embedded with electronics, software, sensors, actuators, and network connectivity) collect data through wireless technology and are able to interoperate within the existing internet infrastructure.

However, the large-scale deployment of the IoT is causing rapidly increasing major security concerns. On the one hand, most of these intelligent IoT devices are easy to hack and compromise, as typically these devices are limited in computing, storage, and network capacity, and are therefore more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. On the other hand, the increasingly invisible, dense, and pervasive collection, processing, and dissemination of data in the midst of people’s private lives gives rise to serious security and privacy concerns.

The goal of this Special Issue is to solicit high quality research articles addressing key challenges and state-of-the-art solutions for security and privacy issues of intelligent IoT devices. We aim to enhance our understanding of a broad range of topics and specialties in security and privacy for intelligent IoT devices, from fundamentals and theories to practical aspects. Original research as well as high-quality review articles are all welcome.

Potential topics include but are not limited to the following:

  • IoT operating system security
  • IoT malicious code defence technology
  • IoT system and firmware security update technology
  • Vulnerability mining technology for intelligent IoT devices
  • Trust issues in intelligent IoT devices
  • Intelligent IoT device testing framework
  • Physical security of intelligent IoT devices
  • Software and hardware attacks for intelligent IoT devices
  • Run-time protection technology for intelligent IoT devices
  • Intelligent care security and privacy
  • Artificial intelligence-enabled counter measures in IoT security
  • Secure machine learning technique for IoT data analysis
  • Blockchains and smart contracts for IoT
  • Efficient cryptography for intelligent IoT devices
  • Secure data integrity and validation techniques for intelligent IoT devices
  • Remote attestation for intelligent IoT devices
  • Security threat detection theories and technologies for intelligent IoT devices
  • New privacy challenges in intelligent IoT devices

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 4905763
  • - Research Article

Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds

Meng Zhao | Yong Ding
  • Special Issue
  • - Volume 2022
  • - Article ID 2985308
  • - Research Article

DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks

Congcong Chen | Lifei Wei | ... | Jianting Ning
  • Special Issue
  • - Volume 2022
  • - Article ID 2500213
  • - Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Wenbo Zhang | Jing Zhang | ... | Jingyu Feng
  • Special Issue
  • - Volume 2022
  • - Article ID 8259927
  • - Research Article

TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs

Zongtao Duan | Jabar Mahmood | ... | Shehzad Ashraf Chaudhry
  • Special Issue
  • - Volume 2022
  • - Article ID 6974101
  • - Research Article

Encoding Test Pattern of System-on-Chip (SOC) Using Annular Scan Chain

Guilin Huang | Zhengjin Zhang | ... | Qilin Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 6128155
  • - Research Article

Blockchain-Assisted Distributed Fog Computing Control Flow Attestation

Hongchao Li | Tao Shen | ... | Bei Gong
  • Special Issue
  • - Volume 2022
  • - Article ID 5655314
  • - Research Article

Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis

Ting Yang | Guanghua Zhang | ... | Yuqing Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 4548374
  • - Research Article

A Traceable and Anonymous Data Aggregation Scheme with Fog Computing Devices for Smart Grid

Fan Wu | Xiong Li
  • Special Issue
  • - Volume 2022
  • - Article ID 9505808
  • - Research Article

TADW: Traceable and Anti-detection Dynamic Watermarking of Deep Neural Networks

Jinwei Dong | He Wang | ... | Gaofei Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 4468301
  • - Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Chien-Ming Chen | Shuangshuang Liu | ... | Long Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.