Special Issues
Table of Content

Security and Privacy in IoT: Cross-Domain Approaches and Cryptographic Innovations

Submission Deadline: 20 June 2026 View: 1114 Submit to Special Issue

Guest Editors

Dr. Bassam Al-Shargabi

Email: bal-shargabi@cardiffmet.ac.uk

Affiliation: Cardiff School of Technologies, Cardiff Metropolitan University , Cardiff, CF5 2YB , UK

Homepage:

Research Interests: IoT, cyber security, image encryption, privacy & trust, data security, service oriented architecture, and data mining


Dr. Abdelrahman Abuarqoub

Email: aabuarqoub@cardiffmet.ac.uk

Affiliation: Cardiff School of Technologies, Cardiff Metropolitan University , Cardiff, CF5 2YB , UK

Homepage:

Research Interests: information and network security management, decentralized algorithms, communication, and cross-layered solutions to the Internet of Things, and wireless sensor networks


Summary

The rapid integration of the Internet of Things (IoT) across various sectors, including healthcare, smart cities, industrial automation, and consumer electronics, has revolutionised data collection, automation, and service delivery. However, the scale, heterogeneity, and critical nature of IoT networks introduce complex security and privacy challenges. Traditional cryptographic solutions often struggle to meet the demanding requirements of modern IoT environments, such as lightweight computation, real-time data integrity, and resilience against evolving cyber threats.


This Special Issue seeks to showcase innovative research on securing IoT systems across various domains. We particularly welcome contributions that present novel encryption frameworks, efficient key management schemes, intelligent threat detection models, and robust architectures tailored to the unique constraints of IoT devices and networks.


By exploring secure solutions applicable to a broad range of IoT use cases, including but not limited to healthcare, industrial control systems, smart homes, and vehicular networks, this issue aims to foster interdisciplinary dialogue and advance the state of the art in IoT security.


Suggested Themes:
· Lightweight encryption protocols for resource-constrained IoT environments
· Domain-specific cryptographic methods (e.g., medical, industrial, or automotive IoT)
· Secure transmission and storage of sensitive sensor data
· Chaotic and biologically inspired encryption models for real-time systems
· Blockchain-based security for decentralised IoT ecosystems
· AI-enabled intrusion detection systems across IoT domains
· Secure authentication and access control in multi-device environments
· Privacy-preserving data aggregation and edge computing security
· Post-quantum cryptographic solutions for future IoT networks
· Resilient architectures against ransomware and IoT-targeted cyberattacks


Keywords

IoT Security, Lightweight Encryption, Privacy-Preserving Systems, Chaotic Cryptography, Blockchain in IoT, Secure Data Transmission, Intrusion Detection, Post-Quantum Cryptography, Domain-Specific Security.

Published Papers


  • Open Access

    ARTICLE

    Secure IoT Data Transmission Using MPEG Derived Motion Vectors and Dual Encryption Techniques

    Sara H. Elsayed, Rodaina Abdelsalam, Mahmoud A. Ismail Shoman, Raed Alotaibi, Omar Reyad
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.079018
    (This article belongs to the Special Issue: Security and Privacy in IoT: Cross-Domain Approaches and Cryptographic Innovations)
    Abstract In today’s digitally connected world, where cyber threats are becoming increasingly complex, finding modern and secure text encryption solutions that maintain maximum runtime performance while offering high-level protection is more crucial. The deployment of sophisticated security paradigms is often accompanied by a significant escalation in computational overhead. Thus, the fundamental objective resides in the mitigation of computational overhead while maintaining an uncompromising security posture. Internet of Things (IoT) devices require strong security measures for data transmission. Also, protecting communication channels against illegal access and eavesdropping has become crucial due to the exponential expansion of the… More >

Share Link