Special lssues
Table of Content

Enhancing IoT Cyber-Resilience: Convergence of AI, Digital Twins, and the Metaverse

Submission Deadline: 30 October 2024 Submit to Special Issue

Guest Editors

Prof. Zhenyong Zhang, Guizhou University, China
Prof. Xin Zhang, Sheffield University, UK
Prof. Ximeng Liu, Fuzhou University, China
Prof. Tianju Sui, Dalian University of Technology, China
Dr. Yue Zhang, Drexel University, USA
Dr. Sen Tan, Aalborg University, Denmark
Dr. Mengxiang Liu, Sheffield University, UK

Summary

In the contemporary landscape dominated by the Internet of Things (IoT), the convergence of Artificial Intelligence (AI), Digital Twins, and the Metaverse presents both novel challenges and unprecedented opportunities for safeguarding cyber-resilience. As these technologies become increasingly intertwined, it is crucial to address the unique security concerns that arise from their integration. The integration of IoT, AI, Digital Twins, and the Metaverse has the potential to revolutionize various industries. However, it also introduces a host of complex security challenges. This special issue aims to explore innovative strategies for strengthening IoT ecosystems against dynamic and evolving cyber threats. By harnessing the transformative potential of AI, Digital Twins, and the Metaverse, we seek to provide practical insights and solutions to fortify IoT cyber-resilience in the swiftly evolving digital epoch.


Topics of Interest:

· AI-Driven Security Solutions: We invite contributions that delve into AI-driven security solutions capable of dynamically adapting to emergent cyber threats in real-time. Topics include AI-fueled threat intelligence, machine learning algorithms for anomaly detection, and adaptive security frameworks.

· Digital Twins for Threat Modeling: Digital Twins, which emulate physical objects within a virtual environment, offer a formidable tool for augmenting IoT cyber-resilience. We encourage submissions that explore the application of Digital Twins for comprehensive threat modeling, robust risk assessment, and efficient incident response in diverse IoT deployments.

· Security in the Metaverse: The Metaverse, an immersive virtual universe, introduces both new vistas and challenges in securing IoT ecosystems. Safeguarding the integrity, confidentiality, and availability of data within this expansive digital landscape is of paramount importance. Contributions addressing innovative security strategies tailored for IoT devices within the Metaverse are highly sought after.

· Regulatory Frameworks and Compliance: In addition to technical solutions, we welcome case studies and contributions pertaining to regulatory frameworks and compliance, which play a vital role in ensuring the security and privacy of IoT ecosystems.

By exploring these key areas, this special issue aims to provide a comprehensive understanding of the challenges and opportunities in securing IoT ecosystems in the context of the integrated IoT, AI, Digital Twins, and the Metaverse landscape.


Keywords

Internet of Things, Cyber-resiliency, Artificial intelligence, Digital Twin, Metaverse

Published Papers


  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu, Zhe Zhang, Shengrong Hu, Song Sun, Dapeng Liu, Zhenyu Qiu
    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099
    (This article belongs to the Special Issue: Enhancing IoT Cyber-Resilience: Convergence of AI, Digital Twins, and the Metaverse )
    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

Share Link