applsci-logo

Journal Browser

Journal Browser

IoT Technology and Information Security

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 August 2025 | Viewed by 1140

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, Queen's University, Kingston, ON K7K 7J8, Canada
Interests: mobile network security; applied cryptography; machine learning security; cyber-physical system security; blockchain technology

E-Mail Website
Guest Editor
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
Interests: cybersecurity situation awareness; network security; big data analysis; network security evaluation

E-Mail Website
Guest Editor
Institute for Infocomm Research (I2R), Agency for Science, Technology and Research (A*STAR), Singapore 138632, Singapore
Interests: machine-to-machine communications; wireless networking protocols; vehicular communications

Special Issue Information

Dear Colleagues,

The successful development of Internet of Things (IoT) technology has forced us to continuously take the issue of cybersecurity into account when developing information security frameworks in IoT. This represents a broad research scope in which the integration of new technologies with IoT and the related security threats, as well as the use of novel technologies in solving information security problems in IoT, need further exploration. We therefore announce a Special Issue entitled “IoT Technology and Information Security” that welcomes research papers investigating the aforementioned research scenario. Potential topics include, but are not limited to, the following:

  • IoT technology (signal processing, network protocols, etc.)
  • Integration of IoT technology and emerging technologies
  • Industrial IoT (IIoT)
  • Artificial Intelligence (AI) -enabled IoT
  • IoT cyber threats and vulnerabilities
  • IoT hardware (edge devices, sensors, gateways, etc.) security
  • IoT security defense technology: authentication, access control and trust
  • IoT secure communication (authentication, secure protocols, etc.)
  • Privacy preservation in IoT
  • Intrusion detection in IoT
  • IoT security and application of emerging technologies (6G, generative AI, edge AI, etc.)

Original research highlighting the latest IoT technology and information security problems and technical developments is encouraged, but review papers providing a comprehensive overview of the state of the art in IoT technology and information security are also welcome.

Prof. Dr. Beibei Li
Dr. Jianbing Ni
Prof. Dr. Yuling Liu
Dr. Ming Zhao
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • information security
  • cyberthreats against the IoT
  • vulnerability

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 387 KiB  
Article
Verifiable Key-Aggregate Searchable Encryption Scheme for Fog-Based Internet of Autonomous Vehicles
by Sultan Basudan and Abdulrahman Alamer
Appl. Sci. 2025, 15(6), 3081; https://doi.org/10.3390/app15063081 - 12 Mar 2025
Viewed by 377
Abstract
The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. As vehicles generate unique keys for encryption and receive keyword details from data requesters for the secure transmission of specialized environmental data, FB-IAV increases the [...] Read more.
The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. As vehicles generate unique keys for encryption and receive keyword details from data requesters for the secure transmission of specialized environmental data, FB-IAV increases the risk of key leakage increases. Additionally, the fog server may be manipulated to alter search results. Current approaches do not adequately consider the potential for vehicles to inadvertently disclose keyword details of data requesters. Moreover, the cost of verifying search results is substantial for these systems. To tackle these problems, we offer a new blockchain-verifiable, multiple-keyword searching method for FB-IAV. At first glance, the proposed scheme is based on key-aggregate searchable encryption, which achieves safe key aggregation by using blockchain technology and an oblivious search request. The method uses a dual-verified technique to provide efficient verification for the outcomes of the search. The suggested plan can achieve authorization, requester privacy, accountability, and dual validation, in addition to ensuring secure search. Furthermore, the efficiency of the suggested scheme in accomplishing the specified security goals is demonstrated by the security analysis and proof. Lastly, the performance study shows that the proposed scheme is both significantly feasible and scalable. Full article
(This article belongs to the Special Issue IoT Technology and Information Security)
Show Figures

Figure 1

Back to TopTop