Special lssues
Table of Content

Internet of Things Perspectives in Cybersecurity

Submission Deadline: 31 March 2022 (closed)

Guest Editors

Dr. Muhammad Shafiq, Yeungnam University, Korea.
Dr. Azeem Irshad, Government Graduate College Asghar Mall, Pakistan.
Dr. Jin-Ghoo Choi, Yeungnam University, Korea.

Summary

In this digital revolution, mankind's dependence on technology in almost all walks of life is increasing substantially. Therefore, a large number of electronic devices are enabled with innovative information and communication technologies such as the Internet of Things (IoT), wireless sensors, actuators, and other low-end monitoring systems. The performance requirements of such IoT-enabled devices distinguish them greatly from traditional computing systems that require huge resources to maintain and operate. Conversely, the IoT devices require low power to play an indispensable role in interconnecting physical and virtual entities in the distributed systems. These entities are deployed together with sensors and the necessary software for data communication with other devices on the I nternet. Such technologies have great potential to contain environmental problems in terms of smart and sustainable systems including smart homes, smart cities, smart grid, smart industry, connected healthcare, connected cars, and much more. Despite these advantages, the ubiquitous IoT ecosystems have swallowed many active and passive attacks in the cyber domain. The IoT devices can generate a large volume of real-time data, which in turn is also vulnerable to cybersecurity threats, e.g. phishing, denial of service (DOS), Distributed DOS, SQL injection, man in the middle, etc.


In the past, network security has always been an issue. However, with the emergence of next-generation hardware miniaturization architectures of IoT system, network security has become a huge challenge due to data security and privacy issues. In addition, the rapid growth of innovative technology paradigms such as artificial intellige nce (AI), cloud and fog/edge computing, blockchain, software-defined networking, and post-quantum cryptography has made IoT networks very challenging and complex. Hence, the attackers may easily launch cyber-attacks to steal useful information in the limited memory of the distributed IoT devices. The ability of such IoT devices to bring real change to the world requires important considerations regarding cybersecurity. Therefore, we need to solve the problems related to security, authentication, and privacy in these IoT-enabled architectures in order to fully realize the potential of the sustainable systems.

The objective of this special issue is to present a useful reference regarding potential threats and their solutions, and featured algorithms in cybersecurity for the successful implementation of IoT technology in smart and suitable systems. The topics of interest include but are not limited to the followings:


• Modeling and evaluation of cybersecurity in IoT

• Security and privacy for embedded systems and IoT

• Security in distributed ledger and blockchain-based IoT scenarios

• Security and privacy in IoT-based cloud/fog/edge computing applications

• Securing IoT-based industrial control systems

• IoT forensics and fool-proof digital evidences

• High-performance resilient and sustainable IoT infrastructure

• IoT auditing with secure data and privacy in connected healthcare

• Enhancing security in IoT devices using AI/Machine learning/Deep learning approaches

• Security and privacy-preserved protocol for IoT-enabled wireless sensor networks

• Securing 5G and 6G-based communication in IoT ecosystem

• Intrusion detection sy stems/Anomaly detection/Malware analysis in IoT-based networks

• Enhancing IoT access control with improved authentication techniques

• Evaluation of vulnerabilities and threats in IoT system

• Security standards for innovations in smart and sustainable systems

• Efficient cryptography algorithms for sustainable IoT

• Optimized low power cybersecurity and privacy preservation techniques for suitable IoT

• Current practices and future perspectives for sustainable IoT systems

• Legal, ethical, and social considerations in the deployment of sustainable IoT


Keywords

IoT; Industrial IoT; Cybersecurity; Data privacy and Security; cryptography; Intrusion Detection; Anomaly detection; Authentication Protocols; Access Control Protocols; Smart and Satiable Systems.

Share Link