Wireless Communications and Mobile Computing

Security, Trust and Privacy in Internet of Things


Publishing date
01 Oct 2021
Status
Closed
Submission deadline
21 May 2021

Lead Editor

1Shandong University of Science and Technology, Qingdao, China

2California State University, Fresno, USA

3Indian Institute of Information Technology Kalyani, West Bengal, India

This issue is now closed for submissions.
More articles will be published in the near future.

Security, Trust and Privacy in Internet of Things

This issue is now closed for submissions.
More articles will be published in the near future.

Description

From Internet of Things (IoT) technology, various intelligent devices have been developed and integrated into daily life. IoT technologies have achieved unprecedented success, both concerning scalability and applicable scenarios.

However, because of the open nature of internet connectivity, IoT presents a significant challenge for the security community; attackers can access critical vulnerabilities in a wide variety of IoT applications and devices to perform their malicious activities. As a consequence, IoT security is now becoming a major concern. Without a doubt, there is an immediate need to consider IoT-related attacks in terms of defensive security. This will help in the design of effective security mechanisms.

The aim of this Special Issue is to collate original research articles that emphasize cutting-edge research from both academia and industry. We welcome submissions particularly focussing on addressing security, trust, and privacy in IoT. Review articles discussing the current state of the art are also welcomed.

Potential topics include but are not limited to the following:

  • Security architectures and protection mechanisms for IoT
  • Threat detection/prevention methods in IoT
  • Trust computation and analysis in IoT
  • Risk identification and mitigation methods in IoT
  • Emerging lightweight security algorithms and protocols
  • Authentication methods in IoT
  • Machine and deep learning for solving security in IoT
  • Blockchain technologies in IoT
  • Federated models for privacy and security of IoT services
  • Big data analytics for heterogeneous IoT systems
  • Novel architectures, concepts, and models in IoT security

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 3984099
  • - Research Article

LPPS-AGC: Location Privacy Protection Strategy Based on Alt-Geohash Coding in Location-Based Services

Zekun Zhang | Xiaoting Sun | ... | Yongquan Liang
  • Special Issue
  • - Volume 2022
  • - Article ID 9942270
  • - Research Article

Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)

Muhammad Nasir Mumtaz Bhutta | Surbhi Bhattia | ... | Zhili Sun
  • Special Issue
  • - Volume 2021
  • - Article ID 8967819
  • - Research Article

Federated Learning Model with Adaptive Differential Privacy Protection in Medical IoT

Lina Ni | Peng Huang | ... | Jinquan Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 5677978
  • - Research Article

Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns

Xiaomei Zhang | Pengming Zhang | Haomin Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 2098530
  • - Research Article

Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment

Hakjun Lee | Dongwoo Kang | ... | Dongho Won
  • Special Issue
  • - Volume 2021
  • - Article ID 5499173
  • - Research Article

Multiconstraint Fuzzy Prediction Analysis Improved the Algorithm in Internet of Things

Xiaoya Deng
  • Special Issue
  • - Volume 2021
  • - Article ID 9510858
  • - Research Article

Network Intrusion Detection Based on Sparse Autoencoder and IGA-BP Network

Hongli Deng | Tao Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 6650784
  • - Research Article

FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection

Siliang Dong | Zhixin Zeng | Yining Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5560621
  • - Research Article

Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid

Yuxin Zhong | Mi Zhou | ... | Muchuang Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 5537018
  • - Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Tsu-Yang Wu | Lei Yang | ... | Sachin Kumar
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate55%
Submission to final decision44 days
Acceptance to publication26 days
CiteScore3.500
Journal Citation Indicator0.410
Impact Factor2.146
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.