Wireless Communications and Mobile Computing

Securing AI-powered Internet of Things (IoT) Ecosystems


Publishing date
01 Aug 2022
Status
Published
Submission deadline
01 Apr 2022

Lead Editor
Guest Editors

1Beijing Jiaotong University, Beijing, China

2Texas Christian University, Fort Worth, USA

3Bowling Green State University, Bowling Green, USA


Securing AI-powered Internet of Things (IoT) Ecosystems

Description

The Internet of Things (IoT) is becoming smarter and more capable empowered by recent advances in Artificial Intelligence (AI). As the deployment of IoT products grows rapidly in our cyber infrastructure, threats targeting IoT ecosystems are increasing at an alarming rate. Consequently, supporting and optimizing IoT security to increase the resilience of our critical cyber infrastructure is essential. Traditional methodologies cannot effectively scale up to the capability and efficacy required to keep up with today's ever-escalating cybersecurity threats. Thus, it is urgently necessary to design and develop novel approaches, algorithms, and technologies for securing AI-based IoT ecosystems.

AI can cause significant disruptions in IoT ecosystems whether it is a failure of the AI engine or because a malicious actor is causing it to behave in unexpected ways. Therefore, it is important to improve the security of the underlining AI algorithms and applications, and to detect improper AI usage in IoT systems.

The aim of this Special Issue is to collate original research and review articles with a focus on interpretable AI, AI application fault/risk detection and prevention, AI ethical privacy and AI safety amongst other topics.

Potential topics include but are not limited to the following:

  • Interpretable and transparent AI in IoT
  • Secured and privacy preserved IoT applications
  • AI based security/privacy issue detection in IoT
  • AI based privacy protection in IoT
  • AI based security enhancement in IoT
  • Federated learning in IoT
  • Incentive mechanism design for collaborative training in IoT
  • Novel collaborative training platform design in IoT
  • Secure collaborative training application design in IoT
  • Fairness control in collaborative training

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5230594
  • - Research Article

Energy-Efficient Computational Offloading for Secure NOMA-Enabled Mobile Edge Computing Networks

Haiping Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 6951849
  • - Research Article

Adaptive Differential Evolution Algorithm with Simulated Annealing for Security of IoT Ecosystems

Qianqian Liu | Xiaoyan Zhang | ... | Haipeng Li
  • Special Issue
  • - Volume 2022
  • - Article ID 9584894
  • - Research Article

Convolution Neural Network-Based Sensitive Security Parameter Identification and Analysis

Hyunki Kim | Donghyun Kim | Okyeon Yi
  • Special Issue
  • - Volume 2022
  • - Article ID 3096961
  • - Research Article

2PN: A Unified Panoptic Segmentation Network with Attention Module

Jianwen Wang | Zhiqin Liu
  • Special Issue
  • - Volume 2022
  • - Article ID 3501329
  • - Research Article

A New Heuristic Computation Offloading Method Based on Cache-Assisted Model

Junhua Wu | Cang Fan | ... | Yuanwang Zheng
  • Special Issue
  • - Volume 2022
  • - Article ID 1290129
  • - Review Article

Current Status and Security Trend of OSINT

Yong-Woon Hwang | Im-Yeong Lee | ... | Donghyun Kim
  • Special Issue
  • - Volume 2022
  • - Article ID 1424078
  • - Research Article

Trajectory Privacy Preserving for Continuous LBSs in VANET

Zhihong Li | Xiaoshuang Xing | ... | Gaofei Sun
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision194 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.