A special issue of Applied Sciences: Cybersecurity and Cryptography in the Internet of Things (IoT) (Journal)

Activity: Editorial and Review ActivitiesPeer Review of a Journal, Publisher or Event

Description

The Internet of Things (IoT) has become a part of our daily lives, and it has changed our ways of working, studying, consuming entertainment, etc. It enables massive connectivity, automation, and self-decision-making processes in different situations. IoT devices could be different in their behaviors and roles. Each IoT device has a particular task: gathering data, processing data, communicating, and acting. For example, IoT sensors play an essential role in collecting a massive amount of data from different places under different conditions; then, the processing units act as smart units for processing data in order to reply to particular actions. The actions could be transferred as data transmission over a network channel using communication modules or directly transferred to actuators such as motors, robotic arms, etc.

Cybersecurity is considered one of the most essential topics in IoT, as a cyber-attack to a system could lead to severe impact. For example, "hijacking" the connection between an IoT and the other communicated terminals could give the attacker the possibility of stealing data packets and replacing them with compromised ones. That could impact confidentiality, integrity, or the availability of data or system assets, and has undesirable consequences for safety, operation, or privacy. Furthermore, cybersecurity plays an essential role in IoT, defining procedures and strategies to support building safe, secure, and reliable applications. It also protects sensitive data, prevents unauthorized access, and reaches the main security objectives for protecting data, assets, and other sensitive information from malicious activity.

In this Special Issue, we aim to cover cybersecurity topics related to IoT applications in order to find new innovative approaches and strategies to build a secure IoT application for future use. We welcome theoretical and experimental approaches in our Special Issue to provide the research community with new innovative discoveries in cybersecurity.
Period202315 Mar 2024
ISSN2076-3417
Degree of RecognitionInternational

Research Field

  • Dependable Systems Engineering
  • Cyber Security

Keywords

  • Security-by-design
  • Cryptographic mechanisms
  • Security communication protocols
  • Security policies
  • Threat modeling
  • Risk management
  • Data protection and privacy
  • Security requirements
  • Security testing
  • Security verification and validation
  • Transportation cybersecurity (e.g., automotive, railway, avionics, etc.)