Special Issues
Table of Content

Advanced Cryptographic Protocols and Intelligent Security Solutions for Internet of Things

Submission Deadline: 31 January 2027 View: 61 Submit to Special Issue

Guest Editors

Assoc. Prof. Huaqun Guo

Email: huaqun.guo@singaporetech.edu.sg

Affiliation: Infocomm Technology Cluster, Singapore Institute of Technology, Singapore, Singapore

Homepage:

Research Interests: network security, industrial IoT security, AI for cyber security, cyber-physical system security

image1 (4).jpeg


Dr. Eyasu Getahun Chekole

Email: eyasu_chekole@sutd.edu.sg

Affiliation: Information Systems Technology and Design, Singapore University of Technology and Design, Singapore, Singapore

Homepage:

Research Interests: multi-factor security, biometrics, applied cryptography, blockchain, ML-driven security, ICS/CPS security, memory safety

image2 (6).jpeg


Summary

The widespread shift toward IoT in sectors like smart cities and healthcare has left a massive security gap: traditional cryptographic tools are simply too heavy for resource-strapped hardware. This Special Issue is about closing that gap. We're looking for research that moves beyond theoretical models to provide practical cryptographic protocols—specifically those designed to be lightweight, scalable, and resilient enough for real-world IoT deployments. The core idea is to see how these cryptographic foundations can work alongside AI-driven intelligence to build adaptive defenses that actually catch evolving cyber threats in real-time.

Potential areas for submission include:
· Lightweight Primitives: New ciphers, hash functions, and authentication specifically for low-power IoT nodes.
· Scaling Identity Management: Key exchange and credential verification that works across massive, messy device networks.
· Quantum-Resistant IoT: Moving toward post-quantum cryptography (PQC) in long-term infrastructure.
· Privacy-First Protocols: Secure multi-party computation and homomorphic encryption for IoMT (Medical) or IoV (Automotive) data.
· Intelligence-led Defense: Combining Machine Learning/Federated Learning with crypto models for proactive threat detection, · Lightweight AI for edge threat detection, IoT network behavior analytics, AI-driven and adaptive IoT security, intelligent threat detection and resilience for IoT.
· Hardware-Rooted Trust: Using Trusted Execution Environment (TEE), Physical Unclonable Function (PUF), or blockchain-based protocols to ensure end-to-end integrity.


Keywords

IoT security, cryptographic protocols, lightweight cryptography, AI-driven security, federated learning, blockchain, post-quantum cryptography, zero trust, edge security, privacy preservation

Share Link