Special Issue "Security and Computing in Internet of Things"

Submission Deadline: 31 December 2020 (closed)
Guest Editors
Mr. Partha Pratim Ray, Sikkim University, India
Dr. Nour Moustafa, Theme Lead of Intelligent Security and Lecturer in Cyber Security, The University of New South Wales, Canberra @ADFA, Australia
Dr. Kien Nguyen, Graduate School of Engineering, Chiba University, Japan

Summary

Heterogeneity and non-standardization of Internet of Things (IoT) systems cause security and privacy issues. Recent growth of smart technologies has leveraged various new ways of destructing security and privacy of IoT ecosystems. Although, scientific works have proven their effectiveness in catering such issues in IoT, they don’t conform completely with the mitigation of notions of IoT like heterogeneity, non-standardization, flexibility, embedded intelligence, and scalability. New programming technique, tools, platforms as well as novel IoT-centric design and developments are very much needed to mitigate privacy and security aspects in IoT.

 

We encourage or especially welcome authors to contribute their unpublished work in the related fields of research. Articles containing novel applications, concept, and demonstrations could be submitted in this special issue. State-of-the-art about recent advancements on these areas could be explored. Furthermore, survey, tutorial and systematic reviews in this regard are also welcome.

 

Potential topics include but are not limited to the following:

• Big data analytics for heterogeneous IoT systems

• Security models based AI for protecting IoT networks

• Federated models for privacy and Security of IoT services

• Privacy-preserving and Blockchain for IoT networks

• Intrusion Detection for IoT systems

• Threat models for IoT systems

• Light-weight programming platform for development of IoT security and privacy

• Embedded systems security for IoT ecosystem

• Machine and deep learning for solving security in IoT

• Novel applications in IoT-based security and privacy

• Use case scenarios in IoT security

• Novel architectures, concepts, and models in IoT security

• Survey, review, tutorial in IoT security and privacy

 

Warm reminder: Please select Special Issue: Security and Computing in Internet of Things when you submit your article in CMC submission system



Keywords
IoT, Security, Computing, Pervasive Computing

Published Papers
  • Quranic Script Optical Text Recognition Using Deep Learning in IoT Systems
  • Abstract Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things (IoT) systems, much research has been done in using machine learning methods to recognize IoT sensors data. This is particularly the case for optical character recognition of handwritten scripts. Recognizing text in images has several useful applications, including content-based image retrieval, searching and document archiving. The Arabic language is one of the mostly used tongues in the world. However, Arabic text recognition in imagery is still very much in the nascent stage, especially handwritten text. This is mainly due to the language complexities, different writing… More
  •   Views:273       Downloads:207        Download PDF

  • A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
  • Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM). Cluster Members (CMs) sign SMs… More
  •   Views:407       Downloads:267        Download PDF

  • A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System
  • Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has two objectives; The first one… More
  •   Views:878       Downloads:257        Download PDF

  • Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption
  • Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the designing of these S-boxes is… More
  •   Views:1132       Downloads:745        Download PDF

  • A Secure NDN Framework for Internet of Things Enabled Healthcare
  • Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More
  •   Views:589       Downloads:443        Download PDF

  • Approach for Training Quantum Neural Network to Predict Severity of COVID-19 in Patients
  • Abstract Currently, COVID-19 is spreading all over the world and profoundly impacting people’s lives and economic activities. In this paper, a novel approach called the COVID-19 Quantum Neural Network (CQNN) for predicting the severity of COVID-19 in patients is proposed. It consists of two phases: In the first, the most distinct subset of features in a dataset is identified using a Quick Reduct Feature Selection (QRFS) method to improve its classification performance; and, in the second, machine learning is used to train the quantum neural network to classify the risk. It is found that patients’ serial blood counts (their numbers of… More
  •   Views:1029       Downloads:571        Download PDF