Skip to content


Recent Advances in Internet of Things Security and Privacy

Internet of Things (IoT) enable both traditional electronics and everyday “things” embedded with sensors, computing, and networking capabilities to connect to the Internet as well as to send and receive data. Currently, IoT has been applied in many emerging applications, such as smart city and big data. It is no doubt that the power of typical IoT applications roots on their abilities to collect, understand, and interact with a user’s life in a pervasive and intimate fashion. Furthermore, the future IoT is doomed to be more complicated in terms of capability, adaptability, security, privacy, and usability. On the other hand, obviously, empowering intelligent IoT systems with massive private data can raise serious security and privacy issues. However, the industry has no effective ways to fully secure IoT, and the research for IoT systems is still at the very initial phase. Therefore, the investigation on IoT security and privacy is attracting more and more attentions from both industry and academia. The central theme of this special issue is to investigate novel methodologies and theories for IoT security and privacy. This special issue encourages submissions of high-quality unpublished papers reporting original works in both theoretical and experimental research in the area of recent advances in IoT.

Optimization methods are applied widely to several problems to wireless communications and information processing in general. These, among others, include convex optimization, heuristic methods, evolutionary algorithms (EAs), machine learning methods, and artificial neural networks (ANNs). The use of all of the above has an increasing impact to key enabling technologies. Additionally, hybrid combinations of Artificial Intelligence (AI) techniques and other optimization methods are also emerging.

Edited by: Wei Li, Meng Han, Sanish Rai, Chunqiang Hu,  Dongxiao Yu

  1. Content type: Research

    The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on t...

    Authors: Jian Mao, Wenqian Tian, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou and Jianwei Liu

    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:279

    Published on:

  2. Content type: Review

    Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chai...

    Authors: Lixin Wang and Jianhua Yang

    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:276

    Published on:

  3. Content type: Research

    The birth of fog computing has given rise to many security threats. Distributed denial of service (DDoS) attacks by intruders on fog nodes will cause system resources to be illegally appropriate. Intrusion det...

    Authors: Xingshuo An, Jingtao Su, Xing Lü and Fuhong Lin

    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:249

    Published on: