Wireless Communications and Mobile Computing

Security, Privacy, and Trust on Internet of Things


Publishing date
01 Jan 2019
Status
Published
Submission deadline
31 Aug 2018

1George Mason University, Fairfax, USA

2Technical University of Denmark, Copenhagen, Denmark

3University of the Aegean, Samos, Greece

4Central China Normal University, Wuhan, China


Security, Privacy, and Trust on Internet of Things

Description

The ability of commonplace and other modern smart objects to stay connected to the Internet for transmitting and receiving data is referred to as The Internet of Things (IoT). As per recent estimates, the number of IoT devices will surpass 50 billion by 2020. Unsurprisingly, this mushrooming of IoT devices has drawn the attention of attackers who seek to exploit them for their own benefit. Basically, IoT brings along a plethora of potential security and privacy risks to the end-users, including the unsanctioned access and abuse of private information, the enabling and strengthening of assaults against other systems, and the breeding of risks pertaining to personal safeness. Especially, IoT facilitates the creation of an assortment of privacy risks to the consumer associated with the collection of personal sensitive information, like their preferences, locations, habits, and so on. In the mid- or long-run these pieces of data can be used to, say, profile or impersonate the user or group of interest. On the other hand, such risks to security, privacy, and trust may significantly diminish end-user’s confidence in IoT and therefore impede its full realization.

The feature topic at hand intends to promote the dissemination of the latest methodologies, solutions, and case studies pertaining to IoT security and privacy issues. Its objective is to publish high-quality articles presenting security algorithms, protocols, policies, frameworks, and solutions for the IoT ecosystem. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or journal will be considered. Previously published or accepted conference papers must contain at least 40% new material to be considered for this special issue.

Potential topics include but are not limited to the following:

  • IoT-powered botnets
  • iBeacon security and privacy
  • Forensics on IoT devices
  • HCI and security and privacy in IoT
  • Mobile service privacy for IoT devices
  • Reverse engineering and automated analysis of IoT malware
  • Security and privacy in IoT operating systems and middleware
  • IoT payment applications
  • Standardization efforts related to IoT
  • Testbeds and case studies for IoT
  • Traffic monitoring and intrusion detection for IoT
  • Virtualization solutions to IoT security
  • Security and privacy for IoT-based smart cities
  • Ethics, legal, and social considerations in IoT security
  • Biometric modalities involved in IoT security
  • Cyberattacks detection and prevention systems for IoT networks
  • Cloud computing-based security solutions for IoT data
  • Security and privacy issues in heterogeneous IoT
  • Cloud of Things security and privacy issues
  • Intrusion detection for IoT
  • Trust Management for IoT
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.