SCOPE: Security and privacy have been the major concern for almost all Internet of Things (IoT) based applications and services. In spite of the many great benefits and merits enabled by IoT, the robustness of its systems, applications, and devices in front of security and privacy threats is still a big concern as new security issues are continuously emerging and getting more profound day after day. For instance, the fear of getting personal data compromised has amplified immensely thanks to the recent incidents of security breaches. Recent technologies like IoT connects several stakeholders and ensures seamless exchange and sharing; a breach of security or unauthorized access to confidential data also makes a huge impact in such a scenario due to its extensive span.
In order to confront and address such issues, this special issue is proposed with a two-fold approach — first, to highlight the theoretical and architectural aspects and foundation of the field in security and privacy; second, to widely illustrate the state-of-the-art in this domain, discussing several case studies and original research outcomes from a diverse set of authors from both academia and industry.
TOPICS (includes but not limited to):
Adaptive attack mitigation for IoT devices
Authentication and access control
Recovery and auditing
Data security and privacy for IoT Auditing
Embedded systems security and privacy in IoT
Intrusion detection in IoT
Key management in IoT scenario
Machine learning towards security and privacy
Lightweight crypto and security aspects
Security and privacy in industrial IoT
Vulnerability Analysis and Data Streaming in IoT
Wireless sensor network security and privacy
Digital Image Processing and Computer Vision Control
Wireless physical layer security approaches
5G and future 6G security issues and countermeasures
Covert communication security methods
The submitted papers should be original, not published, or currently under review for publications in any other journal. Submitted Articles have no page limits and can be any of the following types: technical, tutorial, survey, overview, magazine, letter, or commentary. Also, authors are allowed to submit multiple articles to the same issue.
Robin Singh Bhadoria (Lead Editor), Associate Professor, Department of Computer Science & Engineering, Birla Institute of Applied Sciences (BIAS) Bhimtal, Uttarakhand, India, Email: firstname.lastname@example.org
Ivan Perl, ITMO University, St. Petersburg, Russia, Email: Ivan.email@example.com
Ehsan Momeni Bashusqeh, Golestan Blockchain Lab - Golestan University, Email: firstname.lastname@example.org