Submission Deadline: 31 January 2027 View: 61 Submit to Special Issue
Assoc. Prof. Huaqun Guo
Email: huaqun.guo@singaporetech.edu.sg
Affiliation: Infocomm Technology Cluster, Singapore Institute of Technology, Singapore, Singapore
Research Interests: network security, industrial IoT security, AI for cyber security, cyber-physical system security

Dr. Eyasu Getahun Chekole
Email: eyasu_chekole@sutd.edu.sg
Affiliation: Information Systems Technology and Design, Singapore University of Technology and Design, Singapore, Singapore
Research Interests: multi-factor security, biometrics, applied cryptography, blockchain, ML-driven security, ICS/CPS security, memory safety

The widespread shift toward IoT in sectors like smart cities and healthcare has left a massive security gap: traditional cryptographic tools are simply too heavy for resource-strapped hardware. This Special Issue is about closing that gap. We're looking for research that moves beyond theoretical models to provide practical cryptographic protocols—specifically those designed to be lightweight, scalable, and resilient enough for real-world IoT deployments. The core idea is to see how these cryptographic foundations can work alongside AI-driven intelligence to build adaptive defenses that actually catch evolving cyber threats in real-time.
Potential areas for submission include:
· Lightweight Primitives: New ciphers, hash functions, and authentication specifically for low-power IoT nodes.
· Scaling Identity Management: Key exchange and credential verification that works across massive, messy device networks.
· Quantum-Resistant IoT: Moving toward post-quantum cryptography (PQC) in long-term infrastructure.
· Privacy-First Protocols: Secure multi-party computation and homomorphic encryption for IoMT (Medical) or IoV (Automotive) data.
· Intelligence-led Defense: Combining Machine Learning/Federated Learning with crypto models for proactive threat detection, · Lightweight AI for edge threat detection, IoT network behavior analytics, AI-driven and adaptive IoT security, intelligent threat detection and resilience for IoT.
· Hardware-Rooted Trust: Using Trusted Execution Environment (TEE), Physical Unclonable Function (PUF), or blockchain-based protocols to ensure end-to-end integrity.


Submit a Paper
Propose a Special lssue