Security and Communication Networks

Privacy and Security of Information Processing in Industrial Big Data and Internet of Things


Publishing date
01 Aug 2019
Status
Published
Submission deadline
15 Mar 2019

1Hubei University of Technology, Wuhan, China

2University of Missouri-Kansas City, Kansas City, USA

3University of Electronic Science and Technology, Chengdu, China


Privacy and Security of Information Processing in Industrial Big Data and Internet of Things

Description

With the development of technologies in Internet of Things and Cloud Computing, big data has been focused and applied to almost every industry, retail, healthcare, financial services, government, and so on. Particularly for the era of Industrial 4.0 and industrial Internet of Things (iIoT), more and more data gathering devices and communication technologies are implemented, leading to the new information-processing requirement of volume, variety, velocity, and veracity for industrial big data. The iIoT allows people and things to be connected anyplace, anytime, with anything and anyone using any network and any service. However, such procedures can also lead to node or user privacy issues.

Privacy and security issues during big-data processing in industrial Internet-of-Things age did receive significant attention over the last few years. Although industrial big data has potential to stimulate plenty of applications in future, considerable technical issues are challenging and need to be solved. Firstly, privacy leakage in volume of industrial big data is considered with various structures by multiple types of devices communicating with each other.

Interoperability, real-time processing and action lead the security threats in integrating heterogeneous data during data analysis and decision-making. Malicious attacks may occur anytime anywhere in the whole iIoT system, and users’ privacy may be exposed and threatened. Therefore, the security and privacy are crucial issues during data processing and transmission in every level of Industrial 4.0 and iIoT frameworks. Precaution against security attacks and privacy protection via novel security-aware techniques are imperious needs for researchers in academia and industry.

This issue aims to discuss some of the main challenges of security and privacy in information-processing in iIoT and opportunities for current research and innovation. We welcome research and review articles on the state of the art in industrial big-data processing and securing in Industrial 4.0 and iIoT. Particularly, we are soliciting theoretical and applied research including protocols, algorithms, technologies, and applications.

Potential topics include but are not limited to the following:

  • Models and algorithms for the security and privacy in Industrial 4.0, iIoT, and industrial big data
  • Infrastructures for secure big-data acquisition, storage, and transmission for iIoT
  • Privacy-preserving solutions to outsourced data processing in iIoT
  • Security and privacy-based schemes and protocols in Industrial 4.0 and iIoT
  • Privacy-preserving analytic and predictive models for industrial big data
  • Security and privacy for the convergence of heterogeneous industrial data
  • Intelligent models and algorithms for secure optimization, control, and automation
  • Node/user privacy in industrial Internet of Things
  • Secure and efficient hardware, devices, and designs for Internet of Things
  • Privacy-preserving machine learning and deep learning in industrial-level data process and control
  • Secure data analysis and diagnostics for real-time reporting in the industrial clouds

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 4752612
  • - Research Article

A Practical Authentication Framework for VANETs

Baosheng Wang | Yi Wang | Rongmao Chen
  • Special Issue
  • - Volume 2019
  • - Article ID 3249726
  • - Research Article

Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud

Yujiao Song | Hao Wang | ... | Lei Wu
  • Special Issue
  • - Volume 2019
  • - Article ID 2516963
  • - Review Article

Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments

Ping Wang | Bin Li | ... | Ding Wang
  • Special Issue
  • - Volume 2019
  • - Article ID 9126376
  • - Research Article

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification

Rui Zhu | Li Xu | ... | Xun Yi
  • Special Issue
  • - Volume 2019
  • - Article ID 8431074
  • - Research Article

Detection of Dummy Trajectories Using Convolutional Neural Networks

Jiaji Pan | Yining Liu | Weiming Zhang
  • Special Issue
  • - Volume 2019
  • - Article ID 1348639
  • - Research Article

Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things

Yu Zhou | Yongzhuang Wei | Fengrong Zhang
  • Special Issue
  • - Volume 2019
  • - Article ID 9078176
  • - Research Article

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication

Tianbo Lu | Ting Meng | ... | Xiaoyan Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.