Special Issues
Table of Content

Security, Privacy, and Trust in Industrial IoTs

Submission Deadline: 01 June 2021 (closed) View: 112

Guest Editors

Dr. Ahmad Almogren, King Saud University, Saudi Arabia.
Dr. Ayman Radwan, Instituto de Telecomunicações and Universidade de Aveiro Campus Universitário de Santiago Aveiro, Portugal.
Dr. Hisham Almajed, King Saud University, Saudi Arabia.

Summary

The security threats in industrial IoT (IIoT) are increasing in rapid pace with smart and malicious attacks take place in different forms. These security threats are applied to the context in which the system operates whenever a new IoT device is introduced. Therefore, protecting the IIoT networks needs the development of efficient security protocols to improve communication among the different IoT devices. The systems threats and vulnerability have become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. Moreover, the types of threats and attacks have become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices.

The focus of this issue on topics of information and cybersecurity is on the mathematical models and the engineering applications in the IIoTs. Moreover, we are interested in both new theoretical developments and the studies of practical implementation concerning modeling, attacks, and system vulnerability. The objective of this Special Section is to identify, address and disseminate state-of-the-art research works on design, modeling and cybersecurity. Prospective authors are invited to submit original contributions, including survey papers, in this Special Section.


Keywords

Systems attack in IIoT
Trust analysis in IIoT
Cybersecurity rand mitigation in IIoT
Emerging lightweight security algorithms and protocols
Digital Signature in IIoT
AI and deep learning for intrusion detection in IIoT
Industrial service vulneraibilty
IIoT cloud and edge computing
IIoT hardware support for security

Published Papers


  • Open Access

    ARTICLE

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    Salaheddine Kably, Mounir Arioua, Nabih Alaoui
    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5271-5291, 2022, DOI:10.32604/cmc.2022.020833
    (This article belongs to the Special Issue: Security, Privacy, and Trust in Industrial IoTs)
    Abstract Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT). In concept, blockchain has a linear structure that grows with the number of transactions entered. This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments. Moreover, conventional consensus algorithms such as PoW, PoS are very computationally heavy. This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm. The Multi-Zone Direct Acyclic Graph (DAG) Blockchain (Multizone-DAG-Blockchain) framework is proposed for the fog-based IoT… More >

Share Link