Special Issues
Table of Content

Emerging Security and Privacy Mechanisms in Next-Generation IoT, IIoT, and UAV Communication

Submission Deadline: 31 July 2025 View: 1040 Submit to Special Issue

Guest Editors

Prof. Dr. Chun-Ta Li

Email: 157278@mail.fju.edu.tw

Affiliation: Bachelor's Program of Artificial Intelligence and Information Security, Fu Jen Catholic University, New Taipei City, 242062, Taiwan

Homepage:

Research Interests: Information and Network Security, Wireless Sensor Networks, Mobile Computing Security, Internet of Things Security, Cloud Computing Security, Blockchain, Security and Its Application, RFID Security and Its Application, Telemedicine Information System Security, Security Protocols for Ad Hoc Networks, Information Retrieval and Dictionary Search

 图片1.png

 

Dr. Tuan-Vinh Le

Email: tvle@mail.fju.edu.tw

Affiliation: Bachelor's Program of Artificial Intelligence and Information Security, Fu Jen Catholic University, New Taipei City, 242062, Taiwan

Homepage:

Research Interests: Information Security, Cryptography, Blockchain, Smart Contract, Smart Healthcare, Smart Grid, Internet of Things

 图片2.png

 

Dr. Anwar Ghani

Email: anwar.ghani@jejunu.ac.kr

Affiliation: Big Data Research Center, Department of Computer Engineering, Jeju National University, Jeju-si, 63243, South Korea

Homepage:

Research Interests: Wireless Sensor Networks, Information Security, Internet of Things, Edge Computing, Machine Learning

 图片3.png

 

Prof. Dr. Hamed Taherdoost

Email: hamed.taherdoost@gmail.com

Affiliation: RSAC, University Canada West, Vancouver, V6B 1V9, Canada

Homepage:

Research Interests: Management Information Systems, Blockchain, Cybersecurity, AI

图片4.png


Summary

The rapid development of next-generation Internet of Things (IoT), Industrial Internet of Things (IIoT), and Unmanned Aerial Vehicle (UAV) communication has significantly driven innovation in areas such as smart cities, industrial automation, and national defense. However, the widespread adoption of these technologies is accompanied by severe security and privacy challenges. For instance, the heterogeneity and resource constraints of IoT devices make them vulnerable to cyberattacks, while the open architecture of UAV communication increases the risks of data tampering and interception. Furthermore, the illegal collection and misuse of private data have raised growing societal concerns. Therefore, designing innovative security and privacy mechanisms is critical to addressing these challenges.


The key research directions of this special issue include AI-based threat detection and defense, the application of blockchain in IoT and UAV systems, the development of lightweight encryption algorithms, privacy protection technologies, and post-quantum cryptography. Additionally, it emphasizes the design of multi-layer security architectures, security in edge and cloud computing, dynamic security mechanisms for UAV communication, the establishment of cross-domain collaborative security standards, and the use of behavioral analysis to enhance intrusion detection accuracy.


Keywords

This special issue calls for research papers, communications, and review articles on topics including but not limited to the following:
1. Security of IoT and IIoT
2. Security of UAV communication
3. Privacy protection
4. Threat detection
5. Blockchain technology and lightweight encryption
6. Post-Quantum cryptography
7. Security architecture design
8. Security of edge computing

Share Link