sensors-logo

Journal Browser

Journal Browser

On IoT Security, Privacy and Quality

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (15 August 2022) | Viewed by 23478

Special Issue Editors


E-Mail Website
Guest Editor
Computer Science, Baylor University, One Bear Place #97141, Waco, TX 76798, USA
Interests: code-analysis; distributed systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Computer Science & Engineering, New Mexico Tech, NM 87801, USA
Interests: cybersecurity; system security; usable security; software engineering/security

E-Mail Website
Guest Editor
School of Computer Science & Engineering, Soongsil University, Seoul 07027, Korea
Interests: system software; operating systems; software platforms; system security; IOT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Internet of Things (IoT) has evolved into a well-recognized term for solutions used across many industry segments. Despite the popularity, there are still multiple challenges. IoT is often seen as a network of connected smart devices providing a lot of data. Still, it can also become a nightmare when it comes to perspectives as security, privacy, and quality.

This Special Issue considers these three perspectives that deserve special attention. It aims for novel works, reviews, and comparative studies focusing on one of the core issue aspects. It welcomes novel approaches with promising preliminary results or work with a multi-disciplinary span, including Big Data, blockchain, machine learning, architecture reconstruction, architectural degradation, and cloud-computing, among others.

Prof. Dr. Tomas Cerny
Prof. Dr. Dongwan Shin
Prof. Dr. Jiman Hong
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT
  • Security
  • Privacy
  • Quality

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review, Other

14 pages, 2150 KiB  
Article
A Privacy-Preserved ID-Based Secure Communication Scheme in 5G-IoT Telemedicine Systems
by Tzu-Wei Lin
Sensors 2022, 22(18), 6838; https://doi.org/10.3390/s22186838 - 9 Sep 2022
Cited by 5 | Viewed by 1892
Abstract
5G networks have an efficient effect in providing quality of experience and massive Internet of things (IoT) communication. Applications of 5G-IoT networks have been expanded rapidly, including in smart medical healthcare. Emergency medical services (EMS) hold an assignable proportion in our lives, which [...] Read more.
5G networks have an efficient effect in providing quality of experience and massive Internet of things (IoT) communication. Applications of 5G-IoT networks have been expanded rapidly, including in smart medical healthcare. Emergency medical services (EMS) hold an assignable proportion in our lives, which has become a complex network of all types of professionals, including care in an ambulance. A 5G network with EMS can simplify the medical treatment process and improve the efficiency of patient treatment. The importance of healthcare-related privacy preservation is rising. If the work of privacy preservation fails, not only will medical institutes have economic and credibility losses but also property losses and even the lives of patients will be harmed. This paper proposes a privacy-preserved ID-based secure communication scheme in 5G-IoT telemedicine systems that can achieve the features below. (i) The proposed scheme is the first scheme that integrates the process of telemedicine systems and EMS; (ii) the proposed scheme allows emergency signals to be transmitted immediately with decreasing risk of secret key leakage; (iii) the information of the patient and their prehospital treatments can be transmitted securely while transferring the patient to the destination medical institute; (iv) the quality of healthcare services can be assured while preserving the privacy of the patient; (v) the proposed scheme supports not only normal situations but also emergencies. (vi) the proposed scheme can resist potential attacks. Full article
(This article belongs to the Special Issue On IoT Security, Privacy and Quality)
Show Figures

Figure 1

19 pages, 807 KiB  
Article
CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing
by Yuanpei Li, Qinglei Zhou, Bin Li and Yan Zhuang
Sensors 2022, 22(16), 6044; https://doi.org/10.3390/s22166044 - 12 Aug 2022
Cited by 5 | Viewed by 2090
Abstract
Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether a device is being control-flow hijacked by launching a challenge–response process. In the growing landscape of the Internet of Things, more and more [...] Read more.
Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether a device is being control-flow hijacked by launching a challenge–response process. In the growing landscape of the Internet of Things, more and more peer devices need to communicate to share sensed data and conduct inter-operations without the involvement of a trusted center. Toward the scalability of CFA mechanisms and mitigating the single-point failure, it is important to design a decentralized CFA schema. This paper proposed a decentralized schema (CFRV) to verify the control flow on remote devices. Moreover, it introduces a token (asymmetric secret slices) into peer devices to make the attestation process mutual. In this case, CFRV can mitigate a particular kind of man-in-the-middle attack called response defraud. We built our prototype toolbox on Raspberry-Pi to formulate our proof of concept. In our evaluation, CFRV protects the verification process from malicious verifiers and the man-in-the-middle attack. The proposed mechanism can also limit the PKI (Public Key Infrastructure) usage to a single stage to save the peer devices’ computational cost. Compared to related decentralized schemes, the cryptographic operation’s duration is reduced by 40%. Full article
(This article belongs to the Special Issue On IoT Security, Privacy and Quality)
Show Figures

Figure 1

Review

Jump to: Research, Other

26 pages, 560 KiB  
Review
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey
by Zawar Shah, Imdad Ullah, Huiling Li, Andrew Levula and Khawar Khurshid
Sensors 2022, 22(3), 1094; https://doi.org/10.3390/s22031094 - 31 Jan 2022
Cited by 60 | Viewed by 11558
Abstract
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT. Attackers can easily exploit the vulnerabilities [...] Read more.
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT. Attackers can easily exploit the vulnerabilities of IoT devices and control them as part of botnets to launch DDoS attacks. This is because IoT devices are resource-constrained with limited memory and computing resources. As an emerging technology, Blockchain has the potential to solve the security issues in IoT. Therefore, it is important to analyse various Blockchain-based solutions to mitigate DDoS attacks in IoT. In this survey, a detailed survey of various Blockchain-based solutions to mitigate DDoS attacks in IoT is carried out. First, we discuss how the IoT networks are vulnerable to DDoS attacks, its impact over IoT networks and associated services, the use of Blockchain as a potential technology to address DDoS attacks, in addition to challenges of Blockchain implementation in IoT. We then discuss various existing Blockchain-based solutions to mitigate the DDoS attacks in the IoT environment. Then, we classify existing Blockchain-based solutions into four categories i.e., Distributed Architecture-based solutions, Access Management-based solutions, Traffic Control-based solutions and the Ethereum Platform-based solutions. All the solutions are critically evaluated in terms of their working principles, the DDoS defense mechanism (i.e., prevention, detection, reaction), strengths and weaknesses. Finally, we discuss future research directions that can be explored to design and develop better Blockchain-based solutions to mitigate DDoS attacks in IoT. Full article
(This article belongs to the Special Issue On IoT Security, Privacy and Quality)
Show Figures

Figure 1

Other

Jump to: Research, Review

24 pages, 604 KiB  
Systematic Review
Systematic Review of Authentication and Authorization Advancements for the Internet of Things
by Michal Trnka, Amr S. Abdelfattah, Aishwarya Shrestha, Michael Coffey and Tomas Cerny
Sensors 2022, 22(4), 1361; https://doi.org/10.3390/s22041361 - 10 Feb 2022
Cited by 23 | Viewed by 6773
Abstract
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security. When we design a robust system, it is important [...] Read more.
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security. When we design a robust system, it is important to know the available options for facing common tasks related to access control, authentication, and authorization. In this review, we systematically analyze 1622 peer-reviewed publications from October 2017 to December 2020 to find the taxonomy of security solutions. In addition, we assess and categorize current practices related to IoT security solutions, commonly involved technologies, and standards applied in recent research. This manuscript provides a practical road map to recent research, guiding the reader and providing an overview of recent research efforts. Full article
(This article belongs to the Special Issue On IoT Security, Privacy and Quality)
Show Figures

Figure 1

Back to TopTop