IoT Security: Threat Detection, Analysis and Defense
A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".
Deadline for manuscript submissions: 31 August 2024 | Viewed by 2572
Special Issue Editors
Interests: computer science; computer security; cybersecurity; cryptography
Special Issues, Collections and Topics in MDPI journals
Interests: cybersecurity; network security; IoT; wireless network; 5G
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
The Internet is gradually transforming from a communication platform for IT devices to the Internet of Things (IoT), which connects various devices and sensors together.
Internet of Things technologies are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.
However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architectures (URLLC—Ultra-Reliable Low Latency Communications and critical communications) and Industry 4.0. All these technologies are designed to support critical applications.
The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems (such as the Cloud or datacenter systems) rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.
This Special Issue aims to gather high-quality original research contributions and the latest research results in the field of threat detection within the IoT as well as cover threat analysis and corresponding defense techniques. The threats could be related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic keys management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc.
Prof. Dr. Olivier Markowitch
Prof. Dr. Jean-Michel Dricot
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Planned Papers
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Title: Feature Selection Enhancement to Evaluate Attack Detection in Internet of Things Environment
Authors: Khawlah M. Harahsheh; Rami M Al-Naimat; Chung-Hao Chen
Affiliation: Old Dominion University
Abstract: Feature selection in machine learning involves the process of selecting a subset of the most relevant features, which are the input variables or attributes, from the original set of features. The primary objective of this work is to enhance the efficiency, performance, and speed of feature selection methods for evaluating intrusion detection in wireless networks, with a particular focus on the Internet of Things (IoT) environment. In the context of IoT, several limitations, such as constraints related to capacity, power, and computational processing, pose significant challenges in effectively detecting intrusions. To address these challenges, this work develops a lightweight feature selection approach. This approach is designed to reduce the computational overhead on IoT resources while simultaneously strengthening the capabilities of intrusion detection within the IoT environment.