Submission Deadline: 20 October 2025 View: 200 Submit to Special Issue
Assoc. Prof. Il-Gu Lee
Email: iglee@sungshin.ac.kr
Affiliation: Department of Convergence Security Engineering, Sungshin Women's University, Seoul, 02844, Republic of Korea
Research Interests: IoT, Security, AI/ML, Communication and Networks, Data security
Assoc. Prof. Jung Hoon Lee
Email: tantheta@hufs.ac.kr
Affiliation: Department of Electronics Engineering and Applied Communications Research Center, Hankuk University of Foreign Studies (HUFS), Yongin 17035, Republic of Korea
Research Interests: Physical layer security, Information theory, Communications and Networks
Assist. Prof. Seongmin Kim
Email: sm.kim@sungshin.ac.kr
Affiliation: Department of Convergence Security Engineering, Sungshin Women's University, Seoul, 02844, Republic of Korea
Research Interests: Cloud Computing, System Security, Networked Systems
Assist. Prof. JunHo Hong
Email: hjh@sungshin.ac.kr
Affiliation: Department of Convergence Security Engineering, Sungshin Women's University, Seoul, 02844, Republic of Korea
Research Interests: Information Security, Personal Information Protection, Industry Security
1) The issue introduction includes the background and the importance of this research area.
The Internet of Things (IoT) connects billions of devices, transforming industries by enabling automation, data collection, and real-time decision-making. However, the rapid growth of IoT introduces significant security challenges, including data breaches, device hijacking, and threats to critical infrastructure. IoT devices often lack robust security measures due to limited computational power and diverse environments, increasing their vulnerability. Enhancing IoT security through intelligence-driven solutions, such as AI and machine learning, is essential for real-time threat detection, anomaly detection, and automated responses. These advancements are critical to protecting sensitive data, ensuring system reliability, building user trust, addressing scalability issues, and complying with evolving cybersecurity regulations. Strengthening IoT security is a foundational step toward creating a safer, more reliable, and widely adopted IoT ecosystem.
2) The aim and scope of the Special Issue shall be highlighted.
This special issue aims to explore cutting-edge research, innovative approaches, and practical solutions to enhance the intelligence and security of the Internet of Things (IoT). With the exponential growth of IoT applications across diverse sectors, the need for advanced, scalable, and adaptive security measures is more critical than ever. This issue seeks to provide a platform for researchers, practitioners, and policymakers to share their findings and contribute to the development of a secure and resilient IoT ecosystem.
3) Suggested themes shall be listed.
This special issue welcomes original research articles, reviews, and case studies on topics including, but not limited to:
IoT Security Frameworks and Architectures: Design and implementation of scalable, lightweight and adaptive security frameworks for IoT systems.
AI and ML in IoT Security: Application of artificial intelligence and machine learning for threat detection, anomaly analysis, and real-time response in IoT environments.
Cryptographic Solutions for IoT: Lightweight encryption and authentication methods suitable for resource-constrained IoT devices.
Threat Modeling and Risk Assessment for IoT: New approaches to modeling and mitigating security risks specific to IoT networks and applications.
Privacy Protection for IoT: Mechanisms to safeguard user privacy and ensure compliance with data protection regulations in IoT systems.
Secure IoT Communication Protocols: Development and evaluation of secure communication protocols tailored for heterogeneous IoT devices.
Intrusion Detection and Mitigation for IoT: Advanced techniques to identify and counteract cyberattacks targeting IoT infrastructure.
IoT Security for Critical Infrastructure: Security challenges and solutions for IoT applications in healthcare, energy, transportation, and other critical sectors.
Cloud-based Security and Privacy Enhancement for IoTs: methods and frameworks to enhance the security and privacy of IoT data during transmission, storage, and processing in cloud environments
Blockchain and IoT Security: Integration of blockchain technology to enhance IoT security and data integrity.
Policy and Regulation for IoT: Analysis of global cybersecurity regulations and standards relevant to IoT within a digital business context to reconceptualize cybersecurity awareness toward business transformation;