Security and Communication Networks

Privacy and Security of Information Processing in Industrial Big Data and Internet of Things


Publishing date
01 Aug 2019
Status
Closed
Submission deadline
15 Mar 2019

1Hubei University of Technology, Wuhan, China

2University of Missouri-Kansas City, Kansas City, USA

3University of Electronic Science and Technology, Chengdu, China

This issue is now closed for submissions.

Privacy and Security of Information Processing in Industrial Big Data and Internet of Things

This issue is now closed for submissions.

Description

With the development of technologies in Internet of Things and Cloud Computing, big data has been focused and applied to almost every industry, retail, healthcare, financial services, government, and so on. Particularly for the era of Industrial 4.0 and industrial Internet of Things (iIoT), more and more data gathering devices and communication technologies are implemented, leading to the new information-processing requirement of volume, variety, velocity, and veracity for industrial big data. The iIoT allows people and things to be connected anyplace, anytime, with anything and anyone using any network and any service. However, such procedures can also lead to node or user privacy issues.

Privacy and security issues during big-data processing in industrial Internet-of-Things age did receive significant attention over the last few years. Although industrial big data has potential to stimulate plenty of applications in future, considerable technical issues are challenging and need to be solved. Firstly, privacy leakage in volume of industrial big data is considered with various structures by multiple types of devices communicating with each other.

Interoperability, real-time processing and action lead the security threats in integrating heterogeneous data during data analysis and decision-making. Malicious attacks may occur anytime anywhere in the whole iIoT system, and users’ privacy may be exposed and threatened. Therefore, the security and privacy are crucial issues during data processing and transmission in every level of Industrial 4.0 and iIoT frameworks. Precaution against security attacks and privacy protection via novel security-aware techniques are imperious needs for researchers in academia and industry.

This issue aims to discuss some of the main challenges of security and privacy in information-processing in iIoT and opportunities for current research and innovation. We welcome research and review articles on the state of the art in industrial big-data processing and securing in Industrial 4.0 and iIoT. Particularly, we are soliciting theoretical and applied research including protocols, algorithms, technologies, and applications.

Potential topics include but are not limited to the following:

  • Models and algorithms for the security and privacy in Industrial 4.0, iIoT, and industrial big data
  • Infrastructures for secure big-data acquisition, storage, and transmission for iIoT
  • Privacy-preserving solutions to outsourced data processing in iIoT
  • Security and privacy-based schemes and protocols in Industrial 4.0 and iIoT
  • Privacy-preserving analytic and predictive models for industrial big data
  • Security and privacy for the convergence of heterogeneous industrial data
  • Intelligent models and algorithms for secure optimization, control, and automation
  • Node/user privacy in industrial Internet of Things
  • Secure and efficient hardware, devices, and designs for Internet of Things
  • Privacy-preserving machine learning and deep learning in industrial-level data process and control
  • Secure data analysis and diagnostics for real-time reporting in the industrial clouds

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 5076324
  • - Research Article

Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface

Dong Wang | Xiaosong Zhang | ... | Jingwei Li
  • Special Issue
  • - Volume 2019
  • - Article ID 9060756
  • - Research Article

Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data

Hefeng Chen | Hsiao-Ling Wu | ... | Long-Sheng Chen
  • Special Issue
  • - Volume 2019
  • - Article ID 1283495
  • - Research Article

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection

Yanping Shen | Kangfeng Zheng | ... | Yixian Yang
  • Special Issue
  • - Volume 2019
  • - Article ID 6293970
  • - Research Article

An Approach Enabling Various Queries on Encrypted Industrial Data Stream

Tao Wang | Bo Yang | ... | Juncai Guo
  • Special Issue
  • - Volume 2019
  • - Article ID 8105787
  • - Research Article

A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things

Qinglan Zhao | Shuntong Yang | ... | Baodong Qin
  • Special Issue
  • - Volume 2019
  • - Article ID 1694702
  • - Research Article

Fingerprint Protected Password Authentication Protocol

Chao Yang | Junwei Zhang | ... | Jianfeng Ma
  • Special Issue
  • - Volume 2019
  • - Article ID 6045251
  • - Research Article

A Novel Device Identification Method Based on Passive Measurement

Wei Sun | Hao Zhang | ... | Jian-guo Jiang
  • Special Issue
  • - Volume 2019
  • - Article ID 2062697
  • - Research Article

Security Cryptanalysis of NUX for the Internet of Things

Yu Liu | Xiaolei Liu | Yanmin Zhao
  • Special Issue
  • - Volume 2019
  • - Article ID 5860286
  • - Research Article

CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving

Yong Xie | Songsong Zhang | ... | Yuan Chai
  • Special Issue
  • - Volume 2019
  • - Article ID 8319508
  • - Research Article

Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme

Quanbo Qu | Baocang Wang | ... | Zhili Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.