Wireless Communications and Mobile Computing

Security, Trust and Privacy in Internet of Things


Publishing date
01 Oct 2021
Status
Closed
Submission deadline
21 May 2021

Lead Editor

1Shandong University of Science and Technology, Qingdao, China

2California State University, Fresno, USA

3Indian Institute of Information Technology Kalyani, West Bengal, India

This issue is now closed for submissions.
More articles will be published in the near future.

Security, Trust and Privacy in Internet of Things

This issue is now closed for submissions.
More articles will be published in the near future.

Description

From Internet of Things (IoT) technology, various intelligent devices have been developed and integrated into daily life. IoT technologies have achieved unprecedented success, both concerning scalability and applicable scenarios.

However, because of the open nature of internet connectivity, IoT presents a significant challenge for the security community; attackers can access critical vulnerabilities in a wide variety of IoT applications and devices to perform their malicious activities. As a consequence, IoT security is now becoming a major concern. Without a doubt, there is an immediate need to consider IoT-related attacks in terms of defensive security. This will help in the design of effective security mechanisms.

The aim of this Special Issue is to collate original research articles that emphasize cutting-edge research from both academia and industry. We welcome submissions particularly focussing on addressing security, trust, and privacy in IoT. Review articles discussing the current state of the art are also welcomed.

Potential topics include but are not limited to the following:

  • Security architectures and protection mechanisms for IoT
  • Threat detection/prevention methods in IoT
  • Trust computation and analysis in IoT
  • Risk identification and mitigation methods in IoT
  • Emerging lightweight security algorithms and protocols
  • Authentication methods in IoT
  • Machine and deep learning for solving security in IoT
  • Blockchain technologies in IoT
  • Federated models for privacy and security of IoT services
  • Big data analytics for heterogeneous IoT systems
  • Novel architectures, concepts, and models in IoT security

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 5499173
  • - Research Article

Multiconstraint Fuzzy Prediction Analysis Improved the Algorithm in Internet of Things

Xiaoya Deng
  • Special Issue
  • - Volume 2021
  • - Article ID 9510858
  • - Research Article

Network Intrusion Detection Based on Sparse Autoencoder and IGA-BP Network

Hongli Deng | Tao Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 6650784
  • - Research Article

FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection

Siliang Dong | Zhixin Zeng | Yining Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5560621
  • - Research Article

Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid

Yuxin Zhong | Mi Zhou | ... | Muchuang Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 5537018
  • - Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Tsu-Yang Wu | Lei Yang | ... | Sachin Kumar
  • Special Issue
  • - Volume 2021
  • - Article ID 5565663
  • - Research Article

Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms

Xin Xie | Yu-Chi Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 6627217
  • - Research Article

IoT-Based Smart Alert System for Drowsy Driver Detection

Anil Kumar Biswal | Debabrata Singh | ... | Ming-Hour Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 5594159
  • - Research Article

EPPDA: An Efficient and Privacy-Preserving Data Aggregation Scheme with Authentication and Authorization for IoT-Based Healthcare Applications

Faris A. Almalki | Ben Othman Soufiene
  • Special Issue
  • - Volume 2021
  • - Article ID 6654427
  • - Research Article

Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT

Huijiao Wang | Lin Wu | ... | Hua Jiang
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate33%
Submission to final decision81 days
Acceptance to publication37 days
CiteScore4.300
Impact Factor2.336
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.