Wireless Communications and Mobile Computing

Information Security Protection Technology in Industrial Internet of Things


Publishing date
01 Dec 2021
Status
Closed
Submission deadline
06 Aug 2021

Lead Editor

1Qingdao University, Qingdao, China

2Universitat Politecnica de Valencia, Valencia, Spain

3University of Quebec, Montreal, Canada

This issue is now closed for submissions.
More articles will be published in the near future.

Information Security Protection Technology in Industrial Internet of Things

This issue is now closed for submissions.
More articles will be published in the near future.

Description

As the third information technology revolution after computers and the internet, the Internet of Things (IoT) has attracted much attention in modern technology. It has changed the traditional way of human-computer interaction (HCI), innovated interactions between machines and machines, and brought about historical changes. IoT technology has improved production efficiency and economic benefits and brought great convenience to people’s lives. Since its initial development, IoT technology has been applied in many fields and has the highest popularity and the broadest range of applications in the industrial field. Industrial IoT technology is an organic combination of industrial automation and IoT technology and is becoming increasingly widely used to monitor and manage production equipment, supply chain management, and industrial operations and maintenance. The application of industrial IoT fully integrates industrial production systems, industrial monitoring systems, and industrial management systems to both improve industrial efficiency and product quality during manufacturing and to effectively reduce management costs.

Given the broad application of industrial IoT technology in the industrial field, the information security of industrial IoT has become the focus of attention. Industrial control systems, networking equipment, and industrial cloud platforms are more vulnerable to intrusions under increasingly open network connections, causing system downtime, production interruptions, and asset losses. Therefore, it is particularly important to study information security protection technology in industrial IoT. Among various industrial IoT security protection technologies, secure software development methods should be followed, appropriate open-source software should be selected, and multi-level security protection methods should be constructed following the necessary industrial IoT levels. Firewalls can protect the entire industrial IoT system, and the various structural levels of the industrial IoT can be simultaneously defended through in-depth traffic inspection, communication authentication and encryption, and virus detection defence. At the current stage, information security technology involves IoT traffic analysis, communication protection, and equipment protection.

This Special Issue aims to provide opportunities and platforms for exchanges between academia and industry by discussing information security prevention and control technologies in the field of industrial IoT, and to highlight the importance of security protection technologies. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • IoT botnet virus detection
  • Data traffic deep packet inspection
  • Abnormal traffic monitoring of industrial IoT
  • IoT data transmission encryption
  • Security protection of industrial IoT equipment
  • IoT firewall optimisation
  • IoT security protection strategy design
  • Industrial IoT port scanning
  • Communication server access control
  • Industrial IoT data processing
  • IoT identity authentication
  • Industrial IoT information cracking detection
  • Optimisation of industrial IoT defence systems
  • Industrial IoT virus detection
  • Secure transmission of industrial IoT traffic

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 7106104
  • - Research Article

Intelligent Communication Management Terminal in the Construction of Human Resource Management Mode

Shumei Wu
  • Special Issue
  • - Volume 2021
  • - Article ID 2295130
  • - Research Article

Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security

Yifeng He | Nan Ye | Rui Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 8172282
  • - Research Article

Tourism Resource Evaluation and Countermeasures Based on Network Communication and TOPSIS Algorithm

Weiguang Xie | Yunchi Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 5171713
  • - Research Article

Wireless Network Communication in the XML Metadata Storage of Wushu Historical Archives

Xin Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 9723379
  • - Research Article

RPA and Artificial Intelligence in Budget Management Based on Multiperspective Recognition Based on Network Communication Integration

Haiying Luo | Haichang Luo
  • Special Issue
  • - Volume 2021
  • - Article ID 3265934
  • - Research Article

Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs

Yan-Yan Yang | Bei Gong | ... | Yu-Chu He
  • Special Issue
  • - Volume 2021
  • - Article ID 7520862
  • - Research Article

English Translation Teaching Model of Flipped Classroom Based on the Fusion Algorithm of Network Communication and Artificial Intelligence

Lei Li
  • Special Issue
  • - Volume 2021
  • - Article ID 5065957
  • - Research Article

Optimization Design and Economic Development of Cruise Travel Routes Based on Wireless Communication Networks and Genetic Algorithms

Jiahui Ji | Wei Liu | Hong Zhen
  • Special Issue
  • - Volume 2021
  • - Article ID 3329581
  • - Review Article

Artificial Intelligence Application in Cybersecurity and Cyberdefense

Yao Jun | Alisa Craig | ... | Lule Sharif
  • Special Issue
  • - Volume 2021
  • - Article ID 6830372
  • - Research Article

LCHI: Low-Order Correlation and High-Order Interaction Integrated Model Oriented to Network Intrusion Detection

Shengwei Lei | Chunhe Xia | Tianbo Wang
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate33%
Submission to final decision81 days
Acceptance to publication37 days
CiteScore4.300
Journal Citation Indicator0.390
Impact Factor2.336
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.