欢迎投稿 Future Internet (IF:2.8) Special Issue
来源: 王光辉/
河南大学
386
1
0
2024-12-10

https://www.mdpi.com/journal/futureinternet/special_issues/UTH653VE8H

 

Emerging Technologies for Cybersecurity in the Internet of Things (IoT)

A special issue of Future Internet (IF:2.8, ISSN 1999-5903). Deadline for manuscript submissions: 31 May 2025

 

Dear Colleagues,

The Internet of Things (IoT), a key enabler of digital transformation and intelligent applications, has facilitated the interconnection of a wide range of devices and systems. However, with the rapid proliferation of IoT devices, cybersecurity concerns have become increasingly critical. As emerging technologies such as edge computing, blockchain, and artificial intelligence continue to evolve, so too do the strategies for securing IoT networks. Current research on IoT cybersecurity primarily focuses on addressing the fundamental security needs of IoT devices, including identity authentication, data encryption, and access control, while also mitigating cyber threats such as malware and denial-of-service attacks. Despite the introduction of several innovative solutions, significant challenges remain—especially in areas such as the design of secure mechanisms for multi-device collaboration and the standardization of cross-domain security protocols. This Special Issue seeks to strike a balance between technological innovation and practical application, with the goal of fostering the development of secure and reliable intelligent IoT systems.

Topics of interest include, but are not limited to, the following:

  • Artificial Intelligence and Machine Learning for Cybersecurity in IoT;

  • Secure Multi-Device Collaboration in IoT Systems;

  • Lightweight Cryptography for Cybersecurity in IoT;

  • Edge Computing for Cybersecurity in IoT;

  • Blockchain for Cybersecurity in IoT;

  • Zero Trust for Cybersecurity in IoT;

  • Privacy-Preserving Techniques for Cybersecurity in IoT;

  • Privacy-Enhanced Edge AI for Cybersecurity in IoT;

  • Federated Learning for Cybersecurity in IoT;

  • Risk Management for Cybersecurity in IoT;

  • Threat Intelligence Sharing Platforms for Cybersecurity in IoT;

  • AI-Powered Intrusion Detection Systems (IDSs) for Cybersecurity in IoT.

Dr. Fei Tong
Dr. Guanghui Wang
Guest Editors


登录用户可以查看和发表评论, 请前往  登录 或  注册
SCHOLAT.com 学者网
免责声明 | 关于我们 | 联系我们
联系我们: