Security and privacy in internet of things: methods, architectures, and solutions

Authors


OVERVIEW

Internet of Things (IoT) is a rapidly developing research area across various technological fields including computer science, electronic engineering, mobile and wireless communications, embedded systems, and so on. Many technologies serve as the building blocks of this new paradigm, such as wireless sensor networks, RFID, cloud services, machine-to-machine interfaces, and so on. IoT will allow billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments such as automotive, healthcare, logistics, environmental monitoring, and many others.

However, IoT introduces new challenges for the security of systems and processes and the privacy of individuals. Protecting the information in IoT is a complex and difficult task. IoT requires global connectivity and accessibility, which means that anyone can access anytime and anyway. It results in that the number of attack vectors available to malicious attackers might become staggering. Furthermore, the inherent complexity of the IoT, where multiple heterogeneous entities located in different contexts can exchange information with each other, further complicates the design and deployment of efficient, interoperable, and scalable security mechanisms. The ubiquitous and clouding computing also makes the problem of privacy leakage get urgent. As a result, there is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integrity, and availability of resources in IoT.

This special issue aims to bring together state-of-the-art contributions on IoT security and privacy, discover the existing IoT security challenges, introduce threats and attacker models that can be applied to IoT architectures, design methods of secure IoT applications and architectures, and collect quality research proposals with a solid background in both theoretical and practical aspects. Original, unpublished contributions are solicited in all aspects of this discipline.

Suitable topics include but are not limited to the following in the context of IoT:

  • Cyber security in the IoT
  • Secure policy, model, and architecture for the IoT
  • Security and privacy for the IoT network and systems
  • Secure communication technologies for the IoT
  • Security and privacy in cloud computing applied to the IoT
  • Security and privacy in sensor networks applied to the IoT
  • Security and privacy in parallel and distributed systems applied to the IoT
  • Intrusion detection and avoidance techniques for the IoT
  • Identity, authentication, authorization, and accounting techniques for the IoT
  • Threat and vulnerability modeling for the IoT
  • Lightweight cryptographic solutions for the IoT
  • Key agreement, distribution, and management techniques for the IoT
  • Privacy and anonymity techniques for the IoT
  • Trust establishment, negotiation, and management techniques for the IoT
  • Trusted network computing, operating systems, software, and applications for the IoT
  • Risk and reputation management techniques for the IoT
  • Secure network protocols and frameworks for the IoT
  • Secure access control technologies and frameworks for the IoT
  • Secure solutions for realization of IoT
  • Privacy-preserving IoT applications

IMPORTANT DATES

  • Manuscript submission deadline: 30 September 2014
  • Acceptance notification: 30 November 2014
  • Camera-ready papers due: 31 March 2015
  • Publication of special issue: summer/autumn, 2015 (tentative)

SUBMISSION PROCEDURE

Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journals. Submissions of both in-depth research papers and review/application-oriented papers are encouraged. All submissions should be carried out in Wiley's manuscript central whose web link is http://mc.manuscriptcentral.com/scn. For more detailed information on the submission requirements, please refer to the journal homepage at http://www.interscience.wiley.com/journal/security. When submitting the papers, the authors should make sure to choose the manuscript type as “Special Issue” and enter the “Running Head” and the “Special Issue title” as “SCN-SI-076” and “Security and Privacy in Internet of Things: Methods, Architectures, and Solutions,” respectively.

Ancillary