Wireless Communications and Mobile Computing

Security, Privacy, and Trust on Internet of Things


Publishing date
01 Jan 2019
Status
Published
Submission deadline
31 Aug 2018

1George Mason University, Fairfax, USA

2Technical University of Denmark, Copenhagen, Denmark

3University of the Aegean, Samos, Greece

4Central China Normal University, Wuhan, China


Security, Privacy, and Trust on Internet of Things

Description

The ability of commonplace and other modern smart objects to stay connected to the Internet for transmitting and receiving data is referred to as The Internet of Things (IoT). As per recent estimates, the number of IoT devices will surpass 50 billion by 2020. Unsurprisingly, this mushrooming of IoT devices has drawn the attention of attackers who seek to exploit them for their own benefit. Basically, IoT brings along a plethora of potential security and privacy risks to the end-users, including the unsanctioned access and abuse of private information, the enabling and strengthening of assaults against other systems, and the breeding of risks pertaining to personal safeness. Especially, IoT facilitates the creation of an assortment of privacy risks to the consumer associated with the collection of personal sensitive information, like their preferences, locations, habits, and so on. In the mid- or long-run these pieces of data can be used to, say, profile or impersonate the user or group of interest. On the other hand, such risks to security, privacy, and trust may significantly diminish end-user’s confidence in IoT and therefore impede its full realization.

The feature topic at hand intends to promote the dissemination of the latest methodologies, solutions, and case studies pertaining to IoT security and privacy issues. Its objective is to publish high-quality articles presenting security algorithms, protocols, policies, frameworks, and solutions for the IoT ecosystem. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or journal will be considered. Previously published or accepted conference papers must contain at least 40% new material to be considered for this special issue.

Potential topics include but are not limited to the following:

  • IoT-powered botnets
  • iBeacon security and privacy
  • Forensics on IoT devices
  • HCI and security and privacy in IoT
  • Mobile service privacy for IoT devices
  • Reverse engineering and automated analysis of IoT malware
  • Security and privacy in IoT operating systems and middleware
  • IoT payment applications
  • Standardization efforts related to IoT
  • Testbeds and case studies for IoT
  • Traffic monitoring and intrusion detection for IoT
  • Virtualization solutions to IoT security
  • Security and privacy for IoT-based smart cities
  • Ethics, legal, and social considerations in IoT security
  • Biometric modalities involved in IoT security
  • Cyberattacks detection and prevention systems for IoT networks
  • Cloud computing-based security solutions for IoT data
  • Security and privacy issues in heterogeneous IoT
  • Cloud of Things security and privacy issues
  • Intrusion detection for IoT
  • Trust Management for IoT

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 6452157
  • - Editorial

Security, Privacy, and Trust on Internet of Things

Constantinos Kolias | Weizhi Meng | ... | Jiageng Chen
  • Special Issue
  • - Volume 2019
  • - Article ID 6869307
  • - Research Article

FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks

Ngoc T. Luong | Tu T. Vo | Doan Hoang
  • Special Issue
  • - Volume 2018
  • - Article ID 1954121
  • - Research Article

Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks

Wei Yang | Yadong Wan | ... | Yuanlong Cao
  • Special Issue
  • - Volume 2018
  • - Article ID 5929828
  • - Research Article

A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN

Chi Yuan | Wenping Chen | Deying Li
  • Special Issue
  • - Volume 2018
  • - Article ID 1032761
  • - Review Article

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem | Khalid Elgazzar | Kasem Khalil
  • Special Issue
  • - Volume 2018
  • - Article ID 2051693
  • - Research Article

Towards Secure Network Computing Services for Lightweight Clients Using Blockchain

Yang Xu | Guojun Wang | ... | Cheng Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 8646973
  • - Research Article

On the RCCA Security of Hybrid Signcryption for Internet of Things

Honglong Dai | Ding Wang | ... | Maozhi Xu
  • Special Issue
  • - Volume 2018
  • - Article ID 2143897
  • - Review Article

Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure

Isma Masood | Yongli Wang | ... | Hassan Dawood
  • Special Issue
  • - Volume 2018
  • - Article ID 2783658
  • - Research Article

BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT

Yunru Zhang | Debiao He | Kim-Kwang Raymond Choo
  • Special Issue
  • - Volume 2018
  • - Article ID 4029591
  • - Research Article

A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts

Gholamreza Ramezan | Cyril Leung
Wireless Communications and Mobile Computing
 Journal metrics
Acceptance rate33%
Submission to final decision81 days
Acceptance to publication37 days
CiteScore1.470
Impact Factor1.396
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.