Recent Advances in Security and Privacy Issues for Internet of Things Applications
1COMSATS University Islamabad, Islamabad, Pakistan
2De Montfort University, Leicester, UK
3Université Paris-Est Marne-la-Vallée (UPEM), Marne-la-Vallée, France
4Queen's University Belfast, Belfast, UK
Recent Advances in Security and Privacy Issues for Internet of Things Applications
Description
Security and privacy are of paramount importance when considering modern-day smart city applications. Several wireless communications and mobile computing (WCMC) applications will use the future Internet of Things (IoT) to generate and store sensitive data in a wide range of industries, such as transportation, home automation, governance, education, and healthcare. However, it has been well documented that IoT applications face various challenges related to mobility, scalability, heterogeneity, seamless data aggregation, and, most notably, security and privacy.
With the number of modern technological applications increasing across various domains, securing data from intruders is among the key requirements for any IoT application. Several attempts have been made to cater for the increased user demand for greater security and privacy. These approaches include machine learning-based techniques to counter zero-day attacks, intelligent intrusion detection and avoidance systems, the utilization of bioinspired techniques, and the application of context-aware privacy preservation schemes.
The aim of this special issue therefore is to explore new approaches, technologies, methodologies, techniques, and theories relating to IoT security and privacy. Original research articles and review articles that present emerging approaches to cybersecurity and privacy in IoT applications are welcome.
Potential topics include but are not limited to the following:
- Security and privacy in IoT for WCMC applications
- Data privacy and device security techniques in IoT
- End-to-end system security models for IoT
- Security and privacy issues related to the design, analysis, and implementation of IoT
- Secure cloud and fog computing in IoT
- Novel machine learning-based techniques for intrusion detection and prediction of attacks on IoT applications
- Bioinspired optimization for securing IoT applications
- Future architectures of secure IoT applications
- Context-aware privacy techniques for IoT applications