Submission Deadline: 31 March 2022 (closed) View: 79
In
this digital revolution, mankind's dependence on technology in almost all walks
of life is increasing substantially. Therefore, a large number of electronic
devices are enabled with innovative information and communication technologies
such as the Internet of Things (IoT), wireless sensors, actuators, and other
low-end monitoring systems. The performance requirements of such IoT-enabled
devices distinguish them greatly from traditional computing systems that
require huge resources to maintain and operate. Conversely, the IoT devices
require low power to play an indispensable role in interconnecting physical and
virtual entities in the distributed systems. These entities are deployed
together with sensors and the necessary software for data communication with
other devices on the I nternet. Such technologies have great potential to
contain environmental problems in terms of smart and sustainable systems
including smart homes, smart cities, smart grid, smart industry, connected
healthcare, connected cars, and much more. Despite these advantages, the
ubiquitous IoT ecosystems have swallowed many active and passive attacks in the
cyber domain. The IoT devices can generate a large volume of real-time data,
which in turn is also vulnerable to cybersecurity threats, e.g. phishing,
denial of service (DOS), Distributed DOS, SQL injection, man in the middle,
etc.
In the past, network security has always been an issue. However, with the emergence of next-generation hardware miniaturization architectures of IoT system, network security has become a huge challenge due to data security and privacy issues. In addition, the rapid growth of innovative technology paradigms such as artificial intellige nce (AI), cloud and fog/edge computing, blockchain, software-defined networking, and post-quantum cryptography has made IoT networks very challenging and complex. Hence, the attackers may easily launch cyber-attacks to steal useful information in the limited memory of the distributed IoT devices. The ability of such IoT devices to bring real change to the world requires important considerations regarding cybersecurity. Therefore, we need to solve the problems related to security, authentication, and privacy in these IoT-enabled architectures in order to fully realize the potential of the sustainable systems.
The objective of this special issue is to present a useful reference regarding potential threats and their solutions, and featured algorithms in cybersecurity for the successful implementation of IoT technology in smart and suitable systems. The topics of interest include but are not limited to the followings:
• Modeling and evaluation of cybersecurity in IoT
• Security and privacy for embedded systems and IoT
• Security in distributed ledger and blockchain-based IoT scenarios
• Security and privacy in IoT-based cloud/fog/edge computing applications
• Securing IoT-based industrial control systems
• IoT forensics and fool-proof digital evidences
• High-performance resilient and sustainable IoT infrastructure
• IoT auditing with secure data and privacy in connected healthcare
• Enhancing security in IoT devices using AI/Machine learning/Deep learning approaches
• Security and privacy-preserved protocol for IoT-enabled wireless sensor networks
• Securing 5G and 6G-based communication in IoT ecosystem
• Intrusion detection sy stems/Anomaly detection/Malware analysis in IoT-based networks
• Enhancing IoT access control with improved authentication techniques
• Evaluation of vulnerabilities and threats in IoT system
• Security standards for innovations in smart and sustainable systems
• Efficient cryptography algorithms for sustainable IoT
• Optimized low power cybersecurity and privacy preservation techniques for suitable IoT
• Current practices and future perspectives for sustainable IoT systems
• Legal, ethical, and social considerations in the deployment of sustainable IoT