Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 

Advances in Internet of Things (IoT) Technologies and Cybersecurity

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 31 August 2024 | Viewed by 1459

Special Issue Editors


E-Mail Website
Guest Editor
1. Department of Information Technology, University of Library Studies and Information Technologies, 1784 Sofia, Bulgaria
2. Department of Computer Engineering and Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan
Interests: mobile security; industrial security; autonomous systems; agents; data science; knowledge/data modeling; preprocessing; machine learning

E-Mail Website
Guest Editor
Australian Cyber Security Cooperative Research Centre (CRC) & Security Research Institute, Edith Cowan University, Perth, WA 6027, Australia
Interests: cybersecurity; AI and machine learning; data science; IoT and smart city applications; digital twin and critical infrastructure security

Special Issue Information

Dear Colleagues,

The rapidly growing Internet of Things technologies (IoT) and constantly changing threats force the developers of contemporary cybersecurity ecosystems to resolve a bundle of rapidly changing and sometimes controversial tasks. Everybody should pay for their comfort requirements, which are embedded in security, quality, and life standards. First, mobile security should be data-driven; otherwise, it will eventually be destroyed using machine learning/chatbots and many other tools available on the dark side of the Internet. The main goal of this Special Issue is the ideas, methods, and results of how to build a combination of active and passive defense instruments as a base for construction of autonomous ecosystems.

Architectures, standards, devices, control methods: each aspect of the advanced technology field under consideration gives us a small picture of a large cybersecurity puzzle task. There is no general solution; the innovative system must forecast and prepare for new, unknown types of attacks. The desired cybersecurity ecosystems include, but are not limited to, cloud/fog security applications; twin, virtual, and other modeling possibilities; methods for transfer from algorithms to autonomous evolving systems; machine learning, deep learning, the application of big datasets, the usage of reasoners, and other types of software agents, etc.

This Special Issue includes original and innovative research papers in the overlapping fields of:

  • Secured IoT and Smart City Applications;
  • Data-driven security computing;
  • Artificial intelligence and machine learning in Cybersecurity;
  • Data science applications in cyber defense systems;
  • Big data security applications;
  • Ontologies and other security knowledge/data modeling tools;
  • Cloud/edge/fog computing;
  • Architectures of industrial and other novel security systems;
  • Defense ecosystems for Industry 4.0;
  • High-performance cybersecurity computing;
  • Forensic methods against intelligent types of attacks;
  • Other corresponding research fields.

Prof. Dr. Vladimir Simov Jotsov
Dr. Iqbal H. Sarker
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT security
  • secure smart cities, mobile security
  • cloud/fog cybersecurity
  • data science
  • AI and machine learning
  • autonomous defense tools and instruments

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 454 KiB  
Article
Extending Product Lifecycles—An Initial Model with New and Emerging Existential Design Aspects Required for Long and Extendable Lifecycles
by John Lindström, Petter Kyösti, Foivos Psarommatis, Karl Andersson and Kristiina Starck Enman
Appl. Sci. 2024, 14(13), 5812; https://doi.org/10.3390/app14135812 - 3 Jul 2024
Viewed by 513
Abstract
This paper introduces an evaluated initial model for how product lifecycles can be extended considering new and emerging existential design aspects concerning both general as well as digital/connected products. The initial model, which is cyclic, includes reverse logistics of components and raw materials, [...] Read more.
This paper introduces an evaluated initial model for how product lifecycles can be extended considering new and emerging existential design aspects concerning both general as well as digital/connected products. The initial model, which is cyclic, includes reverse logistics of components and raw materials, as well as information on how to manage data at the end of lifecycles. The aim is to improve long-term sustainability with a high degree of circularity while also achieving increased profitability and competitiveness. Further, we highlighted that product providers must start to evaluate and prepare for how to improve product durability, manage long and extendable lifespans, and achieve circularity with reverse logistics to close the loops. Additionally, updatability and upgradability are also required to stay current with time and create value while being cybersecure. Otherwise, customers’ expectations, various legal and regulatory aspects, as well as other existential design aspects can halt or even terminate a product’s lifecycle. Full article
(This article belongs to the Special Issue Advances in Internet of Things (IoT) Technologies and Cybersecurity)
Show Figures

Figure 1

13 pages, 828 KiB  
Article
Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums
by Julio Fenner, Patricio Galeas, Francisco Escobar and Rail Neira
Appl. Sci. 2024, 14(12), 5354; https://doi.org/10.3390/app14125354 - 20 Jun 2024
Viewed by 327
Abstract
We introduce an innovative approach for secure communication in the Internet of Things (IoT) environment using a one-time pad (OTP) protocol. This protocol is augmented by incorporating a secure multiparty sum protocol to produce OTP keys from genuine random numbers obtained from the [...] Read more.
We introduce an innovative approach for secure communication in the Internet of Things (IoT) environment using a one-time pad (OTP) protocol. This protocol is augmented by incorporating a secure multiparty sum protocol to produce OTP keys from genuine random numbers obtained from the physical phenomena observed in each device. We have implemented our method using ZeroC-Ice v.3.7, dependable middleware for distributed computing, demonstrating its practicality in various hybrid IoT scenarios, particularly in devices with limited processing capabilities. The security features of our protocol are evaluated under the Dolev–Yao threat model, providing a thorough assessment of its defense against potential cyber threats. Full article
(This article belongs to the Special Issue Advances in Internet of Things (IoT) Technologies and Cybersecurity)
Show Figures

Figure 1

Back to TopTop