Preserving Privacy and Security in IoT

A special issue of Information (ISSN 2078-2489).

Deadline for manuscript submissions: closed (29 February 2016) | Viewed by 65840

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, The University of Auckland, New Zealand
Interests: access control; applied cryptography; security; privacy; cloud computing; distributed systems

E-Mail Website
Guest Editor
Department of Computer and Information Sciences, University of Strathclyde, UK
Interests: applied cryptography; security protocols; secure computation; data privacy; security policies

E-Mail Website
Guest Editor
Department of Computer Science, University of Otago, New Zealand
Interests: distributed access control systems; cloud computing; security policies; privacy controls

E-Mail Website
Guest Editor
Computer Science Lab, SRI International, CA, USA
Interests: data provenance; reproducibility; security; information-centric networking

E-Mail Website
Guest Editor
Department of Computer Science, The University of Auckland, Private Bag 92019, Auckland 1142, New Zealand
Interests: mobile security; searchable encryption; secure Pub/Sub systems; security for cloud; access control

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) provides the ability to connect and remotely manage a huge number of (embedded) devices that constantly collect and share information about their environments. Typically, IoT devices are pervasive and can be found in very diverse environments—from factories to hospitals, commercial building, and private houses. Given their pervasiveness, IoT devices may collect and handle a large amount of very sensitive data. Billions of additional connected devices in new locations and applications also increase the risk of cyber or physical attack, criminal subversion, and terrorism. Therefore, securing these devices and ensuring data privacy are of paramount importance.

With this Special Issue, we would like to solicit interested authors to submit previously unpublished contributions in several aspects of the IoT, with particular emphasis on data handling, security and privacy. Topics of interest include, but are not limited to, the following:

Preserving Privacy in IoT
Efficient Cryptography for IoT Devices
Authentication
IoT and the Cloud
Secure Communication
Securing Data
Key Management
Accountability
Anonymity
Resilient IoT Architecture
Physical Security
Trust Management
Audit and Provenance Management

Dr. Giovanni Russello
Dr. Muhammad Rizwan Asghar
Dr. Ashish Gehani
Dr. Changyu Dong
Dr. David Eyers
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT
  • Security
  • Privacy
  • Cryptography
  • Secure communication
  • Key management
  • Authentication
  • Data protection
  • Data reliability

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

1475 KiB  
Article
IoT Privacy and Security Challenges for Smart Home Environments
by Huichen Lin and Neil W. Bergmann
Information 2016, 7(3), 44; https://doi.org/10.3390/info7030044 - 13 Jul 2016
Cited by 267 | Viewed by 53533
Abstract
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different [...] Read more.
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation. Full article
(This article belongs to the Special Issue Preserving Privacy and Security in IoT)
Show Figures

Graphical abstract

1597 KiB  
Article
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
by Anhtuan Le, Jonathan Loo, Kok Keong Chai and Mahdi Aiash
Information 2016, 7(2), 25; https://doi.org/10.3390/info7020025 - 12 May 2016
Cited by 153 | Viewed by 11337
Abstract
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of [...] Read more.
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto profiling technique that constructs a high-level abstract of operations through network simulation traces, to use as reference for verifying the node behaviors. This specification, including all the legitimate protocol states and transitions with corresponding statistics, will be implemented as a set of rules in the intrusion detection agents, in the form of the cluster heads propagated to monitor the whole network. In order to save resources, we set the cluster members to report related information about itself and other neighbors to the cluster head instead of making the head overhearing all the communication. As a result, information about a cluster member will be reported by different neighbors, which allow the cluster head to do cross-check. We propose to record the sequence in RPL Information Object (DIO) and Information Solicitation (DIS) messages to eliminate the synchronized issue created by the delay in transmitting the report, in which the cluster head only does cross-check on information that come from sources with the same sequence. Simulation results show that the proposed Intrusion Detection System (IDS) has a high accuracy rate in detecting RPL topology attacks, while only creating insignificant overhead (about 6.3%) that enable its scalability in large-scale network. Full article
(This article belongs to the Special Issue Preserving Privacy and Security in IoT)
Show Figures

Figure 1

Back to TopTop