Special Issue "Security, Privacy, and Trust in Industrial IoTs"

Submission Deadline: 01 June 2021
Submit to Special Issue
Guest Editors
Dr. Ahmad Almogren, King Saud University, Saudi Arabia.
Dr. Ayman Radwan, Instituto de Telecomunicações and Universidade de Aveiro Campus Universitário de Santiago Aveiro, Portugal.
Dr. Hisham Almajed, King Saud University, Saudi Arabia.

Summary

The security threats in industrial IoT (IIoT) are increasing in rapid pace with smart and malicious attacks take place in different forms. These security threats are applied to the context in which the system operates whenever a new IoT device is introduced. Therefore, protecting the IIoT networks needs the development of efficient security protocols to improve communication among the different IoT devices. The systems threats and vulnerability have become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. Moreover, the types of threats and attacks have become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices.

The focus of this issue on topics of information and cybersecurity is on the mathematical models and the engineering applications in the IIoTs. Moreover, we are interested in both new theoretical developments and the studies of practical implementation concerning modeling, attacks, and system vulnerability. The objective of this Special Section is to identify, address and disseminate state-of-the-art research works on design, modeling and cybersecurity. Prospective authors are invited to submit original contributions, including survey papers, in this Special Section.


Keywords
Systems attack in IIoT
Trust analysis in IIoT
Cybersecurity rand mitigation in IIoT
Emerging lightweight security algorithms and protocols
Digital Signature in IIoT
AI and deep learning for intrusion detection in IIoT
Industrial service vulneraibilty
IIoT cloud and edge computing
IIoT hardware support for security