Table of Content

Security, Privacy and Trust Management for IoT-based Blockchain

Submission Deadline: 31 August 2022 (closed)

Guest Editors

Dr. Farhan Ullah, Northwestern Polytechnical University, China.
Dr. Sohail Jabbar, The University of Faisalabad, Pakistan.
Dr. Xiaochun Cheng, Middlesex University, UK.
Dr. Leonardo Mostarda, Camerino University, Italy.


The Internet of Things (IoT) is a network of physical objects (devices, vehicles, buildings, and other items) that are equipped with electronics, software, sensors, and network connectivity to process and analyze data. Massive overhead costs, concerns about centralized data control, and single points of failure are significantly reduced by moving IoT from a centralized data server architecture to a trustless, distributed peer-to-peer network. Currently, Blockchain is one of the most promising and effective technologies for enabling a trusted, secure, and distributed IoT ecosystem. Blockchain-based systems combine cryptography, public key infrastructure, and economic modeling to obtain distributed database synchronization through peer-to-peer networking and decentralized consensus. Security and privacy, as well as maintenance costs and support for time-critical IoT applications, are all factors to consider. The widespread acceptance of Blockchain for a trusted and secure environment highlights the concept that IoT requires Blockchain and vice versa. In addition, blockchain provides solutions to IoT impediments such as resilience, adaptability, trust, security, and privacy, as well as lower maintenance costs and less support for time-critical IoT applications. The more the digital twin emerges, the greater the risk and challenges in terms of the trust, security, and privacy. IoT, machine learning, artificial intelligence, and software analytics are, without a doubt, critical components of this technological transformation. This technical integration also poses a range of obstacles.

The key components of a trusted environment are immutability, transparency, fault tolerance, and security is not to be overlooked. Access control, availability and confidentiality, lightweight security and privacy, forensic, data integrity, management and storage, and performance and scalability analysis are among the most highlighted challenges from the trust, security, and privacy perspectives. Cyber attacks, ransomware, data breaches, and financial information breaches are the most common types of breaches. It must do so to build a long-term, trust-based data economy. A new data regulation following the General Data Protection Regulation (GDPR) is now in effect, requiring any organization handling personal data of EU citizens, regardless of location, to comply.

This Special Issue invites theoretical and applied cutting-edge research on standards, frameworks, models, and approaches for security, privacy, and trust management in the diverse and long list of Internet of Things applications. Being an active agent in the current technological revolution, the role of Blockchain from this solutions paradigm can't be separated. The research work should also address the solutions considering the synergistic mating environment of IoT and Blockchain. Articles covering innovations in tools and techniques for a secured decentralized paradigm of IoT, especially using Blockchain and its emergence in the fabrics of life, are also welcome. Topics of Interest include but not limited to are:


• Use cases, threat models, protocols, and assisting technologies of IoT and Blockchain Access control, authentication, firewalls, and intrusion detection for networks of smart objects

• Secure collective decision-making and adaptation

• Interface development and Lightweight data structure

• Secure software architectures and middleware in an integrated environment of IoT and Blockchain

• Privacy and anonymity in the IoT through Blockchain and other solutions: threats, mechanisms, guarantees, and policing

• Security, privacy, and trust management in an integrated environment of a digital twin for social networking, energy, smart grid, logistics and supply chain, monetization and e-business, notarization and e-government, healthcare, commerce, insurance, finance and banking, education, learning, crowdsourcing and crowdsensing, and other applications

• Trust, security, and privacy by design and its preserving

• Trust models for the IoT: policy specification, maintenance, and dynamics

• Legal, social and ethical issues in the IoT – in both developed and developing countries

• Forensic analysis of IoT crime scenes

• IoT Cybercrime and digital investigation

• Smart algorithms extending machine learning, artificial intelligence, and deep learning for a trusted environment of digital Twin

Tools, techniques, and algorithms for software analytics in digital twin applications


Privacy, Security, IoT, Blockchain, Cyber Intelligence

Share Link

WeChat scan