Cybersecurity and Cryptography in the Internet of Things (IoT)

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (15 March 2024) | Viewed by 1884

Special Issue Editors


E-Mail Website
Guest Editor
Center for Digital Safety and Security, AIT Austrian Institute of Technology, 1210 Vienna, Austria
Interests: cybersecurity; safety; automotive; cyber-physical systems; IoT

E-Mail Website
Guest Editor
Center for Digital Safety and Security, AIT Austrian Institute of Technology, 1210 Vienna, Austria
Interests: virtualisation techniques
Department of Machine Design, KTH Royal Institute of Technology, SE 100 44 Stockholm, Sweden
Interests: systems theory; architecture design; ontological engineering; domain-specific language; logic programming; anomaly detection; safety engineering
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) has become a part of our daily lives, and it has changed our ways of working, studying, consuming entertainment, etc. It enables massive connectivity, automation, and self-decision-making processes in different situations. IoT devices could be different in their behaviors and roles. Each IoT device has a particular task: gathering data, processing data, communicating, and acting. For example, IoT sensors play an essential role in collecting a massive amount of data from different places under different conditions; then, the processing units act as smart units for processing data in order to reply to particular actions. The actions could be transferred as data transmission over a network channel using communication modules or directly transferred to actuators such as motors, robotic arms, etc.

Cybersecurity is considered one of the most essential topics in IoT, as a cyber-attack to a system could lead to severe impact. For example, "hijacking" the connection between an IoT and the other communicated terminals could give the attacker the possibility of stealing data packets and replacing them with compromised ones. That could impact confidentiality, integrity, or the availability of data or system assets, and has undesirable consequences for safety, operation, or privacy. Furthermore, cybersecurity plays an essential role in IoT, defining procedures and strategies to support building safe, secure, and reliable applications. It also protects sensitive data, prevents unauthorized access, and reaches the main security objectives for protecting data, assets, and other sensitive information from malicious activity.

In this Special Issue, we aim to cover cybersecurity topics related to IoT applications in order to find new innovative approaches and strategies to build a secure IoT application for future use. We welcome theoretical and experimental approaches in our Special Issue to provide the research community with new innovative discoveries in cybersecurity.

Potential topics to be covered:

  1. Security-by-design;
  2. Cryptographic mechanisms;
  3. Security communication protocols;
  4. Security policies;
  5. Threat modeling;
  6. Risk management;
  7. Data protection and privacy;
  8. Security requirements;
  9. Security testing;
  10. Security verification and validation;
  11. Transportation cybersecurity (e.g., automotive, railway, avionics, etc.).

Dr. Abdelkader Magdy Shaaban
Dr. Oliver Jung
Dr. Dejiu Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 348 KiB  
Article
Enhancing Field Multiplication in IoT Nodes with Limited Resources: A Low-Complexity Systolic Array Solution
by Atef Ibrahim and Fayez Gebali
Appl. Sci. 2024, 14(10), 4085; https://doi.org/10.3390/app14104085 - 11 May 2024
Viewed by 248
Abstract
Security and privacy concerns pose significant obstacles to the widespread adoption of IoT technology. One potential solution to address these concerns is the implementation of cryptographic protocols on resource-constrained IoT edge nodes. However, the limited resources available on these nodes make it challenging [...] Read more.
Security and privacy concerns pose significant obstacles to the widespread adoption of IoT technology. One potential solution to address these concerns is the implementation of cryptographic protocols on resource-constrained IoT edge nodes. However, the limited resources available on these nodes make it challenging to effectively deploy such protocols. In cryptographic systems, finite-field multiplication plays a pivotal role, with its efficiency directly impacting overall performance. To tackle these challenges, we propose an innovative and compact bit-serial systolic layout specifically designed for Montgomery multiplication in the binary-extended field. This novel multiplier structure boasts regular cell architectures and localized communication connections, making it particularly well suited for VLSI implementation. Through a comprehensive complexity analysis, our suggested design demonstrates significant improvements in both area and area–time complexities when compared to existing competitive bit-serial multiplier structures. This makes it an ideal choice for cryptographic systems operating under strict area utilization constraints, such as resource-constrained IoT nodes and tiny embedded devices. Full article
(This article belongs to the Special Issue Cybersecurity and Cryptography in the Internet of Things (IoT))
Show Figures

Figure 1

17 pages, 1897 KiB  
Article
An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain
by Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni
Appl. Sci. 2023, 13(18), 10477; https://doi.org/10.3390/app131810477 - 19 Sep 2023
Viewed by 983
Abstract
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based [...] Read more.
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Security Modules (HSMs) to provide required cryptographic primitives through a Near-Field Communication (NFC) connection. In our approach, each transfer of the assets is authenticated, verified, and recorded in the blockchain through the HSM. Transaction entries are signed, thus providing a guarantee of ownership and authenticity. The proposed infrastructure has been subject of an exhaustive security analysis and proved resilient against counterfeiting attempts, stakeholder repudiations, and misleading information. Full article
(This article belongs to the Special Issue Cybersecurity and Cryptography in the Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop