Intrusion Detection and Trust Provisioning in Edge-of-Things Environment

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "ICT Infrastructures for Cybersecurity".

Deadline for manuscript submissions: 30 September 2025 | Viewed by 1285

Special Issue Editors


E-Mail Website
Guest Editor
Computer Science and Information Technology, La Trobe University, Melbourne, VIC 3086, Australia
Interests: cybersecurity; cloud security; security modelling and analysis; AI in cyber defence

E-Mail Website
Guest Editor
Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC 3086, Australia
Interests: different aspects of cybersecurity and blockchain: access control; applied cryptography; blockchain; distributed systems; edge and cloud computing; Internet of Things; digital health
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Edge of Things (EoT) is a new computing paradigm adopted for Internet-of-Things (IoT) applications to improve responsiveness and conserve communication resources. With the growing number of IoT applications leveraging edge computing, there is a rising demand to shift more computations to edge servers. However, this shift may introduce a significant range of security and privacy challenges. As the EoT system brings services typically provided by cloud computing and IoT closer to the end user, many of its security and privacy issues are inherited directly from cloud and IoT environments. These concerns are now distributed across the various layers of the edge architecture. However, ensuring robust security at different layers of an EoT environment such as infrastructure layers is crucial. Intrusion detection techniques have demonstrated their effectiveness in analysing and capturing cyber threats across different contexts. In the context of EoT computing, more robust and resilience intrusion detection should be designed to effectively evaluate and capture cyber threats across various layers of the edge architecture. This Special Issue focuses on the development of intrusion detection systems tailored for EoT environments. Given the limitations of data availability and the dynamic nature of edge networks, distributed IDS models with real-time data collection, refinement and evaluation are crucial. This Special Issue invites papers covering security, privacy and trust challenges in EoT, offering novel strategies to improve the detection of intrusions and provisioning of trust in this cutting-edge paradigm.

Dr. Hooman Alavizadeh
Dr. Ahmad Salehi Shahraki
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • AI-based intrusion detection
  • Edge-of-Things computing
  • Internet of Things (IoT)
  • cloud computing
  • real-time monitoring
  • security modelling and analysis
  • trust provisioning
  • threat modelling and situation awareness
  • privacy-preserving techniques
  • deep learning-based IDS for EoT

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

21 pages, 542 KiB  
Article
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram and Muhammad Awais Azam
Computers 2025, 14(1), 4; https://doi.org/10.3390/computers14010004 - 27 Dec 2024
Viewed by 726
Abstract
The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. Intrusion detection systems (IDSs) are crucial for the detection and the mitigation of the increasing risk of cyber attacks. False and disregarded alarms are [...] Read more.
The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. Intrusion detection systems (IDSs) are crucial for the detection and the mitigation of the increasing risk of cyber attacks. False and disregarded alarms are a common problem for traditional IDSs in high-bandwidth and large-scale network systems. While applying learning techniques to intrusion detection, researchers are facing challenges mainly due to the imbalanced training sets and the high dimensionality of datasets, resulting from the scarcity of attack data and longer training periods, respectively. Thus, this leads to reduced efficiency. In this research study, we propose a strategy for dealing with the problems of imbalanced datasets and high dimensionality in IDSs. In our efficient and novel framework, we integrate an oversampling strategy that uses Generative Adversarial Networks (GANs) to overcome the difficulties introduced by imbalanced datasets, and we use the Random Forest (RF) importance algorithm to select a subset of features that best represent the dataset to reduce the dimensionality of a training dataset. Then, we use three deep learning techniques, Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM), to classify the attacks. We implement and evaluate this proposed framework on the CICIDS2017 dataset. Experimental results show that our proposed framework outperforms state-of-the-art approaches, vastly improving DL model detection accuracy by 98% using CNN. Full article
Show Figures

Figure 1

Review

Jump to: Research

44 pages, 642 KiB  
Review
Overview on Intrusion Detection Systems for Computers Networking Security
by Lorenzo Diana, Pierpaolo Dini and Davide Paolini
Computers 2025, 14(3), 87; https://doi.org/10.3390/computers14030087 - 3 Mar 2025
Viewed by 234
Abstract
The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review of Intrusion Detection System (IDS) [...] Read more.
The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review of Intrusion Detection System (IDS) technologies for network security, examining both traditional methods and recent advancements. The review covers IDS architectures and types, key detection techniques, datasets and test environments, and implementations in modern network environments such as cloud computing, virtualized networks, Internet of Things (IoT), and industrial control systems. It also addresses current challenges, including scalability, performance, and the reduction of false positives and negatives. Special attention is given to the integration of advanced technologies like Artificial Intelligence (AI) and Machine Learning (ML), and the potential of distributed technologies such as blockchain. By maintaining a broad-spectrum analysis, this review aims to offer a holistic view of the state-of-the-art in IDSs, support a diverse audience, and identify future research and development directions in this critical area of cybersecurity. Full article
Show Figures

Figure 1

Back to TopTop