Beyond Boundaries: Holistic Network Security in an Age of IoT, AI, ML, and Decentralized Computing

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 October 2024 | Viewed by 339

Special Issue Editors


E-Mail Website
Guest Editor
Centre for Smart Analytics, Federation University Australia, Gippsland, VIC 3841, Australia
Interests: Fog and Edge computing; IoT; cybersecurity; cloud computing and blockchain

E-Mail Website
Co-Guest Editor
School of Computer Science, University of Adelaide, Adelaide 5005, Australia
Interests: cyber security; intelligent transportation systems; human-AI interaction; machine and deep learning

Special Issue Information

Dear Colleagues,

In the rapidly metamorphosing digital cosmos, the quintessential pillars of IoT, AI, ML, and decentralized computing are introducing both unprecedented opportunities and challenges. While these technologies weave a richer digital tapestry, they also amplify the vulnerabilities in our network architectures. This Special Issue, "Beyond Boundaries: Holistic Network Security in an Age of IoT, AI, ML, and Decentralized Computing", endeavors to address these complex intersections, unearthing the transformative potential of these technologies in reshaping network security paradigms. Modern network security is no longer just about firewalls and intrusion detection systems. It is about predicting vulnerabilities before they can be exploited, adapting in real-time to emerging threats, and ensuring data integrity across myriad nodes, many of which were unimaginable a decade ago. The intricate mesh formed by billions of IoT devices introduces both complexity and vulnerability. They present attractive targets for malicious entities, given their often-limited security protocols and vast distribution. It is challenging to safeguard a world in which every appliance, vehicle, and utility could be a potential breach point.

AI and ML are powerful computational tools that can sift through vast datasets, identifying patterns and anomalies, predicting vulnerabilities, and even automating responses to certain types of threats. They herald the transformation from reactive to proactive security postures. However, they also bring about their own set of security challenges. Ensuring the algorithms themselves are robust and immune to manipulations is a difficult task. Furthermore, the decentralized realms of Fog and Edge computing makes the networking environment more complex in terms of security. As data processing moves closer to the source, we are faced with the challenge of ensuring that each of these decentralized nodes is as secure as a centralized data center. One of the aims of this Special Issue is to incorporate innovative methodologies that can be employed to make these computing paradigms both efficient and secure.

Dr. Ranesh Naha
Dr. Abdullahi Chowdhury
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • holistic network security
  • IoT vulnerabilities
  • ML-based threat detection
  • Fog computing security
  • decentralized data security and integrity
  • advanced security protocols
  • predictive cybersecurity

Published Papers

This special issue is now open for submission.
Back to TopTop