Skip to main content

Recent Advances in Internet of Things Security and Privacy

Internet of Things (IoT) enable both traditional electronics and everyday “things” embedded with sensors, computing, and networking capabilities to connect to the Internet as well as to send and receive data. Currently, IoT has been applied in many emerging applications, such as smart city and big data. It is no doubt that the power of typical IoT applications roots on their abilities to collect, understand, and interact with a user’s life in a pervasive and intimate fashion. Furthermore, the future IoT is doomed to be more complicated in terms of capability, adaptability, security, privacy, and usability. On the other hand, obviously, empowering intelligent IoT systems with massive private data can raise serious security and privacy issues. However, the industry has no effective ways to fully secure IoT, and the research for IoT systems is still at the very initial phase. Therefore, the investigation on IoT security and privacy is attracting more and more attentions from both industry and academia. The central theme of this special issue is to investigate novel methodologies and theories for IoT security and privacy. This special issue encourages submissions of high-quality unpublished papers reporting original works in both theoretical and experimental research in the area of recent advances in IoT.

Optimization methods are applied widely to several problems to wireless communications and information processing in general. These, among others, include convex optimization, heuristic methods, evolutionary algorithms (EAs), machine learning methods, and artificial neural networks (ANNs). The use of all of the above has an increasing impact to key enabling technologies. Additionally, hybrid combinations of Artificial Intelligence (AI) techniques and other optimization methods are also emerging.

Edited by: Wei Li, Meng Han, Sanish Rai, Chunqiang Hu,  Dongxiao Yu

  1. The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vul...

    Authors: Alexandra Balan, Titus Balan, Marcian Cirstea and Florin Sandu
    Citation: EURASIP Journal on Wireless Communications and Networking 2020 2020:231
  2. The popularization of mobile communication devices and location technology has spurred the increasing demand for location-based services (LBSs). While enjoying the convenience provided by LBS, users may be con...

    Authors: Lina Ni, Fulong Tian, Qinghang Ni, Yan Yan and Jinquan Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2019 2019:93
  3. With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, ever...

    Authors: Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun and Zhiliang Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2019 2019:74
  4. With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the char...

    Authors: Xiaoling Tao, Yang Liu, Feng Zhao, Changsong Yang and Yong Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:294
  5. The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on t...

    Authors: Jian Mao, Wenqian Tian, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou and Jianwei Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:279
  6. Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chai...

    Authors: Lixin Wang and Jianhua Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:276
  7. The birth of fog computing has given rise to many security threats. Distributed denial of service (DDoS) attacks by intruders on fog nodes will cause system resources to be illegally appropriate. Intrusion det...

    Authors: Xingshuo An, Jingtao Su, Xing Lü and Fuhong Lin
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:249