Wireless Communications and Mobile Computing

Security and Privacy in Massive Internet of Things


Publishing date
01 Jan 2022
Status
Closed
Submission deadline
10 Sep 2021

Lead Editor

1Chongqing University of Posts and Telecommunications, Chongqing, China

2Vanderbilt University, Nashville, USA

3Carleton University, Ottawa, Canada

This issue is now closed for submissions.

Security and Privacy in Massive Internet of Things

This issue is now closed for submissions.

Description

Driven by fifth-generation technology (5G), the future Internet of Things (IoT) will need to support the interconnection between smart devices and systems. It will provide access to users everywhere at any time. Massive connectivity is one of the most important factors affecting the success of various IoT domains. For example, to apply future driverless cars in Internet of Vehicles (IoV), we need to ensure secure and robust connectivity between a large number of in-motion vehicles in a high-speed dynamic environment. How to design ultra-reliable and secure connectivity mechanisms/protocols in massive connected IoT has become a research hotspot.

Even so, large-scale interconnection and the broadcast nature of wireless communications make massive IoT applications vulnerable to internal threats and external attacks. Due to essential differences in scale and requirements, most standard security solutions designed for conventional wireless communication systems are not applicable to 5G-IoT applications. As a result, there are some IoT-specific security and protection challenges in massive connected IoT. Therefore, it is essential to pursue research on new security theories, architectures, and technologies in massive connected IoT. We can then build a more secure and robust IoT-connectivity system.

The aim of this Special Issue is to attract original research articles and review articles highlighting current and advanced security and privacy approaches in massive IoT. Both theoretical and practical perspectives are welcome.

Potential topics include but are not limited to the following:

  • Dynamic vulnerability analysis and recovery for massive IoT
  • High fault-tolerance connectivity mechanism in massive IoT
  • Flexible and lightweight security mechanisms for massive IoT applications
  • Mobile edge/fog computing advantages for secure interconnection in massive IoT
  • Artificial intelligence (AI) and deep learning approaches for enhancing security in massive IoT
  • IoT cooperation strategies for resisting attacks and preventing privacy leaks in massive IoT
  • Blockchain technology for security in massive IoT
  • Trust model and management in massive IoT
  • Incentive mechanism for enhancing security in massive IoT
  • Privacy protection for multi-entity and large-scale interconnection in massive IoT
  • Intrusion detection and prevention for massive IoT
  • Physical-layer security in massive IoT
  • Optical wireless enhanced security in massive IoT (e.g., Li-Fi and infrared wireless)

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9990193
  • - Research Article

H2SA-ALSH: A Privacy-Preserved Indexing and Searching Schema for IoT Data Collection and Mining

Guangjun Wu | Bingqing Zhu | ... | Yungang Jia
  • Special Issue
  • - Volume 2021
  • - Article ID 9076211
  • - Research Article

HMBI: A New Hybrid Deep Model Based on Behavior Information for Fake News Detection

Jian Xing | Shupeng Wang | ... | Yu Ding
  • Special Issue
  • - Volume 2021
  • - Article ID 6244525
  • - Research Article

DC-LTM: A Data Collection Strategy Based on Layered Trust Mechanism for IoT

An He | Guangwei Wu | Jinhuan Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 1730655
  • - Review Article

Indoor Visible Light Applications for Communication, Positioning, and Security

Xiangyu Liu | Lei Guo | Xuetao Wei
  • Special Issue
  • - Volume 2021
  • - Article ID 8414503
  • - Review Article

A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications

Ali Seyfollahi | Ali Ghaffari
  • Special Issue
  • - Volume 2021
  • - Article ID 9976837
  • - Research Article

Impact of Artificial Noise on Security Capability of Energy Harvesting Overlay Networks

Khuong Ho-Van | Thiem Do-Dac
  • Special Issue
  • - Volume 2021
  • - Article ID 9952218
  • - Research Article

Efficient Byzantine Consensus Mechanism Based on Reputation in IoT Blockchain

Xu Yuan | Fang Luo | ... | Yucheng Li
  • Special Issue
  • - Volume 2021
  • - Article ID 5585896
  • - Research Article

Node Value and Content Popularity-Based Caching Strategy for Massive VANETs

Jinyuan Gu | Yancheng Ji | ... | Guoan Zhang
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.