Security and Communication Networks

Security and Privacy Challenges for Intelligent Internet of Things Devices


Publishing date
01 Oct 2021
Status
Published
Submission deadline
11 Jun 2021

Lead Editor

1Nanjing University of Science and Technology, Nanjing, China

2University of Technology Sydney, Sydney, Australia

3Queen's University Belfast, Belfast, UK

4Xi’an University of Posts and Telecommunications, Xi'an, China


Security and Privacy Challenges for Intelligent Internet of Things Devices

Description

With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth. Billions of intelligent IoT devices (embedded with electronics, software, sensors, actuators, and network connectivity) collect data through wireless technology and are able to interoperate within the existing internet infrastructure.

However, the large-scale deployment of the IoT is causing rapidly increasing major security concerns. On the one hand, most of these intelligent IoT devices are easy to hack and compromise, as typically these devices are limited in computing, storage, and network capacity, and are therefore more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. On the other hand, the increasingly invisible, dense, and pervasive collection, processing, and dissemination of data in the midst of people’s private lives gives rise to serious security and privacy concerns.

The goal of this Special Issue is to solicit high quality research articles addressing key challenges and state-of-the-art solutions for security and privacy issues of intelligent IoT devices. We aim to enhance our understanding of a broad range of topics and specialties in security and privacy for intelligent IoT devices, from fundamentals and theories to practical aspects. Original researches as well as high-quality review articles are all welcome.

Potential topics include but are not limited to the following:

  • IoT operating system security
  • IoT malicious code defence technology
  • IoT system and firmware security update technology
  • Vulnerability mining technology for intelligent IoT devices
  • Trust issues in intelligent IoT devices
  • Intelligent IoT device testing framework
  • Physical security of intelligent IoT devices
  • Software and hardware attacks for intelligent IoT devices
  • Run-time protection technology for intelligent IoT devices
  • Intelligent care security and privacy
  • Artificial intelligence-enabled counter measures in IoT security
  • Secure machine learning technique for IoT data analysis
  • Blockchains and smart contracts for IoT
  • Efficient cryptography for intelligent IoT devices
  • Secure data integrity and validation techniques for intelligent IoT devices
  • Remote attestation for intelligent IoT devices
  • Security threat detection theories and technologies for intelligent IoT devices
  • New privacy challenges in intelligent IoT devices

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 9520941
  • - Research Article

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks

Yong Ding | Hui Xu | ... | Hai Liang
  • Special Issue
  • - Volume 2021
  • - Article ID 4485311
  • - Research Article

Privacy-Preserving Redactable Blockchain for Internet of Things

Yanli Ren | Xianji Cai | Mingqi Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 5308206
  • - Research Article

A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain

Xiaofeng Lu | Songbing Fu | ... | Pietro Lio
  • Special Issue
  • - Volume 2021
  • - Article ID 9396141
  • - Research Article

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques

Shudong Li | Qianqing Zhang | ... | Zhihong Tian
  • Special Issue
  • - Volume 2021
  • - Article ID 4660875
  • - Research Article

V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System

Liquan Chen | Tianyang Tu | ... | Yingchao Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 3530509
  • - Research Article

A LoRa-Based Lightweight Secure Access Enhancement System

Yu Jiang | Hua Fu | ... | Wen Sun
  • Special Issue
  • - Volume 2021
  • - Article ID 7525092
  • - Research Article

ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System

Feng Xiao | Enhong Chen | ... | Xianguo Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 9946022
  • - Research Article

GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing

Zhiqiang Wang | Yuheng Lin | ... | Tao Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 4133474
  • - Research Article

Modeling and Control of Malware Propagation in Wireless IoT Networks

Qing Yan | Lipeng Song | ... | Shanshan Feng
  • Special Issue
  • - Volume 2021
  • - Article ID 5562275
  • - Research Article

An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things

Hanrui Zhang | Qianmu Li | ... | Chaoxian Lv
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.