Security in the Internet of Things

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: closed (31 March 2018) | Viewed by 36275

Special Issue Editors


grade E-Mail Website
Guest Editor
Department of Information Technology, Old Dominion University, Norfolk, VA 23529, USA
Interests: industrial information integration engineering; industrial information systems; industrial informatics; enterprise systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Interests: cryptography; blockchain; cybersecurity; information society
Special Issues, Collections and Topics in MDPI journals
Department of Computer Science, Xi’an Jiaotong University, Xi’an, China
Interests: security; network traffic; mobile security; online social network security

Special Issue Information

Dear Colleagues,

An increasing number of smart objects are connecting to the Internet of Things (IoT) to generate meaningful results and convenience to the user community. IoT has been a new IT platform that can provide services of all sorts, ranging from smart homes to industrial applications, and from tiny monitoring systems to smart city services. However, there are still many technical challenges in IoT, such as IoT devices access control, IoT security, data privacy, data protection, safety, governance and trust, etc. This Special Issue on “Security in the Internet of Things” aims to exploit feasibility ways of improving the security, data protection, privacy, and data assurance in IoT and promoting IoT services. Potential topics include, but not limited to:

  •  Privacy and security issues in IoT
  •  Trustworthy user interfaces
  •  Secure machine-to-machine communications
  •  Dynamic trust management for IoT applications
  •  SCADA system
  •  Intrusion detection and prevention in IoT
  •  Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
  •  Security and safety in Industrial IoT 
  •  Security metrics and performance evaluation, traffic analysis techniques
  •  Social, economic and policy issues of trust, security and privacy
  •  Lightweight cryptography and security solution for IoT
  •  Cyber risk in IoT
  •  Cybercrime and digital forensics in IoT        

Dr. Shancang Li
Prof. Li Da Xu
Prof. Houbing Song
Prof. Bill William Buchanan
Prof Tao Qin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT Security

  • Intrusion and vulnerability detection in IoT

  • Lightweight cryptography

  • Industry IoT security and safety

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 2228 KiB  
Article
Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption
by Régis Leveugle, Asma Mkhinini and Paolo Maistri
Information 2018, 9(5), 114; https://doi.org/10.3390/info9050114 - 08 May 2018
Cited by 5 | Viewed by 4020
Abstract
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to [...] Read more.
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to be processed in the cloud. Security is therefore one of the design constraints but must be achieved without the usual level of resources. In this paper, we address two very different examples showing how embedded hardware/software co-design can help in improving security in the IoT context. The first example targets so-called “hardware attacks” and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC). A very lightweight countermeasure is implemented against Simple Power Analysis (SPA), taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be guaranteed by homomorphic encryption at a lower computational cost by taking advantage of a hardware accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Show Figures

Figure 1

18 pages, 2512 KiB  
Article
Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
by David Airehrour, Nisha Vasudevan Nair and Samaneh Madanian
Information 2018, 9(5), 110; https://doi.org/10.3390/info9050110 - 03 May 2018
Cited by 29 | Viewed by 19719
Abstract
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assessed the major aspects and [...] Read more.
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assessed the major aspects and underlying concepts of social engineering attacks and their influence in the New Zealand banking sector. The study further identified attack stages and provided a user-reflective model for the mitigation of attacks at every stage of the social engineering attack cycle. The outcome of this research was a model that provides users with a process of having a reflective stance while engaging in online activities. Our model is proposed to aid users and, of course, financial institutions to re-think their anti-social engineering strategies while constantly maintaining a self-reflective assessment of whether they are being subjected to social engineering attacks while transacting online. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Show Figures

Figure 1

20 pages, 1393 KiB  
Article
On the Users’ Acceptance of IoT Systems: A Theoretical Approach
by Rino Falcone and Alessandro Sapienza
Information 2018, 9(3), 53; https://doi.org/10.3390/info9030053 - 01 Mar 2018
Cited by 26 | Viewed by 5291
Abstract
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. [...] Read more.
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Show Figures

Figure 1

14 pages, 2712 KiB  
Article
Lightweight S-Box Architecture for Secure Internet of Things
by A. Prathiba and V. S. Kanchana Bhaaskaran
Information 2018, 9(1), 13; https://doi.org/10.3390/info9010013 - 08 Jan 2018
Cited by 16 | Viewed by 6392
Abstract
Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box) suited to Internet of Things (IoT) applications is proposed [...] Read more.
Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box) suited to Internet of Things (IoT) applications is proposed in this work. The structure of the 4 × 4 S-box is devised in the finite fields GF (24) and GF ((22)2). The finite field S-box is realized by multiplicative inversion followed by an affine transformation. The multiplicative inverse architecture employs Euclidean algorithm for inversion in the composite field GF ((22)2). The affine transformation is carried out in the field GF (24). The isomorphic mapping between the fields GF (24) and GF ((22)2) is based on the primitive element in the higher order field GF (24). The recommended finite field S-box architecture is combinational and enables sub-pipelining. The linear and differential cryptanalysis validates that the proposed S-box is within the maximal security bound. It is observed that there is 86.5% lesser gate count for the realization of sub field operations in the composite field GF ((22)2) compared to the GF (24) field. In the PRESENT lightweight cipher structure with the basic loop architecture, the proposed S-box demonstrates 5% reduction in the gate equivalent area over the look-up-table-based S-box with TSMC 180 nm technology. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Show Figures

Figure 1

Back to TopTop