The Convergence of Artificial Intelligence and Internet of Things Security: Shaping the Future of Secure Connected Systems

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Internet of Things (IoT)".

Deadline for manuscript submissions: 31 January 2026 | Viewed by 8596

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computing and Games, School of Computing Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UK
Interests: IoTs; AI; trustworthy AI; adversarial learning; cybersecurity
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing and Information Science, Anglia Ruskin University, Cambridge CB1 1PT, UK
Interests: cyber security risk management; threat intelligence; vulnerability assessment; AI enabled cyber security; incident response and business continuity; information security audit and assurance; cyber insurance
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute for High Performance Computing and Networking ICAR, National Research Council of Italy (CNR), 00185 Rome, Italy
Interests: parallel computing; natural language processing; artificial intelligence; deep learning; eHealth; big data analytics; cyber physical systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing and Information Systems, Athabasca University, Athabasca, AB T9S 3A3, Canada
Interests: cyber physical systems; IoTs; dynamic modeling; system analysis; data analytics; real-time systems; smart e-learning systems

Special Issue Information

Dear Colleagues,

The Internet of Things (IoTs) is rapidly changing our world, spanning every aspect of our lives, from homes and workplaces to cities and critical infrastructure, but the vast and ever-growing number of interconnected devices has also created a huge attack surface, making IoTs systems a lucrative target for cyberattacks. Therefore, the world has witnessed a hike in IoTs attacks, exposing the inadequacy and insufficiency of traditional security measures in addressing challenges posed by modern connected devises, i.e., IoTs space. These challenges include the following:

Heterogeneity and complexity: IoTs systems are made up of a wide range of devices from different vendors with different security capabilities. This heterogeneity makes it difficult to implement and manage security solutions throughout the system. 

Resource constraints: Many IoTs devices are resource-constrained, limiting the computing power and memory available for security solutions. Dynamic nature: IoTs systems are constantly evolving, with new devices being added and removed on a regular basis. This dynamism makes it difficult to keep security solutions up to date.

To address these challenges, there is a growing need for innovative security solutions that can protect IoTs systems effectively. Artificial intelligence (AI) is emerging as a promising technology with the potential to address the unique challenges of IoTs security. This Special Issue will focus on the convergence of AI in IoTs security. This Special Issue aims to solicit papers addressing the latest advances in AI-based IoTs security solutions. 

Significance and relevance to the journal: 
This Special Issue will explore the challenges and opportunities associated with using AI in IoTs security. This topic will be of interest to a wide range of researchers and practitioners working in the fields of IoTs security, AI, and cybersecurity. This Special Issue will contribute to the advancement of the state of the art in AI-based IoTs security and provide valuable insights for developing future secure IoTs systems.

Technical scope:
This Special Issue will consider papers that present original research on the use of AI in IoTs cybersecurity. Articles can be theoretical, experimental, or applied, and we also welcome survey and review papers. 
Papers addressing, but not limited to, the following topics are particularly encouraged: 

  • Anomaly detection and intrusion prevention in connected objects;
  • Threat intelligence and risk assessment in connected objects;
  • Vulnerability assessment and penetration testing in connected objects;
  • Secure data collection and transmission;
  • Privacy-preserving machine learning;
  • Adversarial machine learning;
  • Blockchain-based security solutions;
  • Explainable AI for cybersecurity;
  • The social and ethical implications of AI in IoTs security;
  • AI's role in identifying and preventing cyber threats in IoTs;
  • AI/ML/DL for predicting and preparing for future IoTs security challenges;
  • The ethical dimensions of AI in IoTs security;
  • AI-enhanced encryption and communication security for our IoTs;
  • Real-world case studies showcasing the real impact of AI in IoTs security;
  • Human-in-the-loop AI systems for IoTs security operations;
  • Emulating human decision-making and reasoning in IoTs threat assessment;
  • Explainable AI and interpretability in IoTs security;
  • Bias and fairness in AI systems used for IoTs cybersecurity;
  • Trustworthiness and accountability of AI in IoTs cybersecurity.

Dr. Zia Ush Shamszaman
Dr. Shareeful Islam
Dr. Stefano Silvestri
Dr. Xiaokun Zhang

Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoTs security
  • CPS security
  • secure ML and secure AI
  • trustworthy and safe AI
  • adversarial learning
  • CPS security
  • privacy in IoTs and CPS
  • secure connected systems
  • data privacy
  • data poisoning
  • secure VR/AR

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

16 pages, 2397 KiB  
Article
Trust-Enabled Framework for Smart Classroom Ransomware Detection: Advancing Educational Cybersecurity Through Crowdsourcing
by Qatrunnada Ismail, Shatha Almutairi and Heba Kurdi
Information 2025, 16(4), 312; https://doi.org/10.3390/info16040312 - 14 Apr 2025
Viewed by 164
Abstract
The proliferation of e-learning has exposed smart classroom devices and online learning platforms to ransomware attacks, threatening the integrity of educational processes. This study introduced a novel trust-based crowdsourcing framework to mitigate such attacks in smart classrooms. We evaluated our framework using two [...] Read more.
The proliferation of e-learning has exposed smart classroom devices and online learning platforms to ransomware attacks, threatening the integrity of educational processes. This study introduced a novel trust-based crowdsourcing framework to mitigate such attacks in smart classrooms. We evaluated our framework using two trust management algorithms, EigenTrust and Trust Network Analysis with Subjective Logic (TNaSL), comparing them against a baseline scenario without trust management. Experimental results, based on success rate, accuracy, precision, and recall metrics, demonstrated the significant enhancement of security in crowdsourcing processes. Both implementations exhibited resilience against increasing proportions of malicious nodes. This study contributes to cybersecurity in smart educational settings by demonstrating the efficacy of trust-based crowdsourcing in ransomware detection. Our framework paves the way for more secure digital learning spaces, addressing the cybersecurity challenges in IoT-enabled educational environments. Full article
Show Figures

Figure 1

16 pages, 11114 KiB  
Article
Real-Time Analysis of Industrial Data Using the Unsupervised Hierarchical Density-Based Spatial Clustering of Applications with Noise Method in Monitoring the Welding Process in a Robotic Cell
by Tomasz Blachowicz, Jacek Wylezek, Zbigniew Sokol and Marcin Bondel
Information 2025, 16(2), 79; https://doi.org/10.3390/info16020079 - 22 Jan 2025
Viewed by 862
Abstract
The application of modern machine learning methods in industrial settings is a relatively new challenge and remains in the early stages of development. Current computational power enables the processing of vast numbers of production parameters in real time. This article presents a practical [...] Read more.
The application of modern machine learning methods in industrial settings is a relatively new challenge and remains in the early stages of development. Current computational power enables the processing of vast numbers of production parameters in real time. This article presents a practical analysis of the welding process in a robotic cell using the unsupervised HDBSCAN machine learning algorithm, highlighting its advantages over the classical k-means algorithm. This paper also addresses the problem of predicting and monitoring undesirable situations and proposes the use of the real-time graphical representation of noisy data as a particularly effective solution for managing such issues. Full article
Show Figures

Graphical abstract

18 pages, 1819 KiB  
Article
Detecting Adversarial Attacks in IoT-Enabled Predictive Maintenance with Time-Series Data Augmentation
by Flora Amato, Egidia Cirillo, Mattia Fonisto and Alberto Moccardi
Information 2024, 15(11), 740; https://doi.org/10.3390/info15110740 - 20 Nov 2024
Viewed by 1593
Abstract
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study [...] Read more.
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study aims to offer comprehensive insights into the cybersecurity challenges associated with predictive maintenance, proposing a novel methodology that leverages generative AI for data augmentation, enhancing threat detection capabilities. Experimental evaluations conducted using the NASA Commercial Modular Aero-Propulsion System Simulation (N-CMAPSS) dataset affirm the viability of this approach leveraging the state-of-the-art TimeGAN model for temporal-aware data generation and building a recurrent classifier for attack discrimination in a balanced dataset. The classifier’s results demonstrate the satisfactory and robust performance achieved in terms of accuracy (between 80% and 90%) and how the strategic generation of data can effectively bolster the resilience of intelligent maintenance systems against cyber threats. Full article
Show Figures

Figure 1

Review

Jump to: Research

17 pages, 2218 KiB  
Review
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
by Omar Alshamsi, Khaled Shaalan and Usman Butt
Information 2024, 15(10), 631; https://doi.org/10.3390/info15100631 - 13 Oct 2024
Cited by 6 | Viewed by 4413
Abstract
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack susceptibilities. This systematic literature review investigates machine learning methodologies for detecting malware in smart homes, with [...] Read more.
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack susceptibilities. This systematic literature review investigates machine learning methodologies for detecting malware in smart homes, with a specific emphasis on identifying common threats such as denial-of-service attacks, phishing efforts, and zero-day vulnerabilities. By examining 56 publications published from 2019 to 2023, this analysis uncovers that users are the weakest link and that there is a possibility of attackers disrupting home automation systems, stealing confidential information, or causing physical harm. Machine learning approaches, namely, deep learning and ensemble approaches, are emerging as effective tools for detecting malware. In addition, this analysis highlights prevention techniques, such as early threat detection systems, intrusion detection systems, and robust authentication procedures, as crucial measures for improving smart home security. This study offers significant insights for academics and practitioners aiming to protect smart home settings from growing cybersecurity threats by summarizing the existing knowledge. Full article
Show Figures

Figure 1

Back to TopTop