Wireless Communications and Mobile Computing

Recent Advances in Security and Privacy Issues for Internet of Things Applications


Publishing date
01 Apr 2020
Status
Closed
Submission deadline
29 Nov 2019

Lead Editor

1COMSATS University Islamabad, Islamabad, Pakistan

2De Montfort University, Leicester, UK

3Université Paris-Est Marne-la-Vallée (UPEM), Marne-la-Vallée, France

4Queen's University Belfast, Belfast, UK

This issue is now closed for submissions.

Recent Advances in Security and Privacy Issues for Internet of Things Applications

This issue is now closed for submissions.

Description

Security and privacy are of paramount importance when considering modern-day smart city applications. Several wireless communications and mobile computing (WCMC) applications will use the future Internet of Things (IoT) to generate and store sensitive data in a wide range of industries, such as transportation, home automation, governance, education, and healthcare. However, it has been well documented that IoT applications face various challenges related to mobility, scalability, heterogeneity, seamless data aggregation, and, most notably, security and privacy.

With the number of modern technological applications increasing across various domains, securing data from intruders is among the key requirements for any IoT application. Several attempts have been made to cater for the increased user demand for greater security and privacy. These approaches include machine learning-based techniques to counter zero-day attacks, intelligent intrusion detection and avoidance systems, the utilization of bioinspired techniques, and the application of context-aware privacy preservation schemes.

The aim of this special issue therefore is to explore new approaches, technologies, methodologies, techniques, and theories relating to IoT security and privacy. Original research articles and review articles that present emerging approaches to cybersecurity and privacy in IoT applications are welcome.

Potential topics include but are not limited to the following:

  • Security and privacy in IoT for WCMC applications
  • Data privacy and device security techniques in IoT
  • End-to-end system security models for IoT
  • Security and privacy issues related to the design, analysis, and implementation of IoT
  • Secure cloud and fog computing in IoT
  • Novel machine learning-based techniques for intrusion detection and prediction of attacks on IoT applications
  • Bioinspired optimization for securing IoT applications
  • Future architectures of secure IoT applications
  • Context-aware privacy techniques for IoT applications
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.