IoT Security: Threat Detection, Analysis and Defense

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 31 August 2024 | Viewed by 2572

Special Issue Editors


E-Mail Website
Guest Editor
Computer Department, Faculty of Sciences, Université Libre de Bruxelles, Boulevard du Triomphe CP 212, 1070 Brussels, Belgium
Interests: computer science; computer security; cybersecurity; cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Cybersecurity Research Center, Ecole Polytechnique de Bruxelles, Université Libre de Bruxelles, 50 Avenue Franklin Roosevelt CP 165/56, 1050 Brussels, Belgium
Interests: cybersecurity; network security; IoT; wireless network; 5G
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet is gradually transforming from a communication platform for IT devices to the Internet of Things (IoT), which connects various devices and sensors together.

Internet of Things technologies are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.

However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architectures (URLLC—Ultra-Reliable Low Latency Communications and critical communications) and Industry 4.0. All these technologies are designed to support critical applications.

The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems (such as the Cloud or datacenter systems) rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.

This Special Issue aims to gather high-quality original research contributions and the latest research results in the field of threat detection within the IoT as well as cover threat analysis and corresponding defense techniques. The threats could be related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic keys management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc.

Prof. Dr. Olivier Markowitch
Prof. Dr. Jean-Michel Dricot
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 1119 KiB  
Article
A Survey on Energy-Aware Security Mechanisms for the Internet of Things
by Peixiong He, Yi Zhou and Xiao Qin
Future Internet 2024, 16(4), 128; https://doi.org/10.3390/fi16040128 - 08 Apr 2024
Viewed by 704
Abstract
The Internet of Things (IoT) employs sensors and the Internet for information exchange, enabling intelligent identification, monitoring, and management, which has deeply impacted various sectors such as power, medical care, and security, transforming social activities and lifestyles. Regrettably, IoT systems suffer from two [...] Read more.
The Internet of Things (IoT) employs sensors and the Internet for information exchange, enabling intelligent identification, monitoring, and management, which has deeply impacted various sectors such as power, medical care, and security, transforming social activities and lifestyles. Regrettably, IoT systems suffer from two main challenges, namely sustainability and security. Hence, pondering how to enhance sustainable and energy-efficient practices for IoT systems to mitigate risks becomes a worthwhile endeavor. To address this issue, we conduct a survey of energy-aware security mechanisms in the Internet of Things. Specifically, we examine the challenges that IoT is facing in terms of energy efficiency and security, and we inspect current energy-saving and privacy-preserving technologies for IoT systems. Moreover, we delineate a vision for the future of IoT, emphasizing energy-aware security mechanisms. Finally, we outline the challenges encountered in achieving energy-aware security mechanisms, as well as the direction of future research. Motivated by this study, we envision advancements in the IoT that not only harness the benefits of science and technology but also enhance the security and safety of our data. Full article
(This article belongs to the Special Issue IoT Security: Threat Detection, Analysis and Defense)
Show Figures

Figure 1

18 pages, 2202 KiB  
Article
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
by Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour
Future Internet 2024, 16(1), 9; https://doi.org/10.3390/fi16010009 - 28 Dec 2023
Viewed by 1443
Abstract
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smart meters—as connected devices—introduce new security challenges. [...] Read more.
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smart meters—as connected devices—introduce new security challenges. To overcome this significant obstacle to grid modernization, safeguarding privacy has emerged as a paramount concern. In this paper, we begin by evaluating the security levels of recently proposed authentication methods for smart meters. Subsequently, we introduce an enhanced protocol named PPSG, designed for smart grids, which incorporates physical unclonable functions (PUF) and an elliptic curve cryptography (ECC) module to address the vulnerabilities identified in previous approaches. Our security analysis, utilizing a real-or-random (RoR) model, demonstrates that PPSG effectively mitigates the weaknesses found in prior methods. To assess the practicality of PPSG, we conduct simulations using an Arduino UNO board, measuring computation, communication, and energy costs. Our results, including a processing time of 153 ms, a communication cost of 1376 bits, and an energy consumption of 13.468 mJ, align with the requirements of resource-constrained devices within smart grids. Full article
(This article belongs to the Special Issue IoT Security: Threat Detection, Analysis and Defense)
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Feature Selection Enhancement to Evaluate Attack Detection in Internet of Things Environment
Authors: Khawlah M. Harahsheh; Rami M Al-Naimat; Chung-Hao Chen
Affiliation: Old Dominion University
Abstract: Feature selection in machine learning involves the process of selecting a subset of the most relevant features, which are the input variables or attributes, from the original set of features. The primary objective of this work is to enhance the efficiency, performance, and speed of feature selection methods for evaluating intrusion detection in wireless networks, with a particular focus on the Internet of Things (IoT) environment. In the context of IoT, several limitations, such as constraints related to capacity, power, and computational processing, pose significant challenges in effectively detecting intrusions. To address these challenges, this work develops a lightweight feature selection approach. This approach is designed to reduce the computational overhead on IoT resources while simultaneously strengthening the capabilities of intrusion detection within the IoT environment.

Back to TopTop