Special Issues
Table of Content

Security and Computing in Internet of Things

Submission Deadline: 31 December 2020 (closed) View: 47

Guest Editors

Mr. Partha Pratim Ray, Sikkim University, India
Dr. Nour Moustafa, Theme Lead of Intelligent Security and Lecturer in Cyber Security, The University of New South Wales, Canberra @ADFA, Australia
Dr. Kien Nguyen, Graduate School of Engineering, Chiba University, Japan


Heterogeneity and non-standardization of Internet of Things (IoT) systems cause security and privacy issues. Recent growth of smart technologies has leveraged various new ways of destructing security and privacy of IoT ecosystems. Although, scientific works have proven their effectiveness in catering such issues in IoT, they don’t conform completely with the mitigation of notions of IoT like heterogeneity, non-standardization, flexibility, embedded intelligence, and scalability. New programming technique, tools, platforms as well as novel IoT-centric design and developments are very much needed to mitigate privacy and security aspects in IoT.


We encourage or especially welcome authors to contribute their unpublished work in the related fields of research. Articles containing novel applications, concept, and demonstrations could be submitted in this special issue. State-of-the-art about recent advancements on these areas could be explored. Furthermore, survey, tutorial and systematic reviews in this regard are also welcome.


Potential topics include but are not limited to the following:

• Big data analytics for heterogeneous IoT systems

• Security models based AI for protecting IoT networks

• Federated models for privacy and Security of IoT services

• Privacy-preserving and Blockchain for IoT networks

• Intrusion Detection for IoT systems

• Threat models for IoT systems

• Light-weight programming platform for development of IoT security and privacy

• Embedded systems security for IoT ecosystem

• Machine and deep learning for solving security in IoT

• Novel applications in IoT-based security and privacy

• Use case scenarios in IoT security

• Novel architectures, concepts, and models in IoT security

• Survey, review, tutorial in IoT security and privacy


Warm reminder: Please select Special Issue: Security and Computing in Internet of Things when you submit your article in CMC submission system


IoT, Security, Computing, Pervasive Computing

Published Papers

  • Open Access


    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    Merna Gamal, Hala M. Abbas, Nour Moustafa, Elena Sitnikova, Rowayda A. Sadek
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1823-1837, 2021, DOI:10.32604/cmc.2021.012877
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on… More >

  • Open Access


    Quranic Script Optical Text Recognition Using Deep Learning in IoT Systems

    Mahmoud Badry, Mohammed Hassanin, Asghar Chandio, Nour Moustafa
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1847-1858, 2021, DOI:10.32604/cmc.2021.015489
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things (IoT) systems, much research has been done in using machine learning methods to recognize IoT sensors data. This is particularly the case for optical character recognition of handwritten scripts. Recognizing text in images has several useful applications, including content-based image retrieval, searching and document archiving. The Arabic language is one of the mostly used tongues in the world. However, Arabic text recognition in imagery is still very much in the nascent stage, especially handwritten text. This is mainly due to… More >

  • Open Access


    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter, A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, Ahmet Zengin
    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM).… More >

  • Open Access


    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani
    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has… More >

  • Open Access


    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam, Asif Ali, Tariq Shah, Ghazanfar Farooq
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the… More >

  • Open Access


    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah, Saddam Hussain, Abdu Gumaei, Hussain AlSalman
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt… More >

  • Open Access


    Approach for Training Quantum Neural Network to Predict Severity of COVID-19 in Patients

    Engy El-shafeiy, Aboul Ella Hassanien, Karam M. Sallam, A. A. Abohany
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1745-1755, 2021, DOI:10.32604/cmc.2020.013066
    (This article belongs to the Special Issue: Security and Computing in Internet of Things)
    Abstract Currently, COVID-19 is spreading all over the world and profoundly impacting people’s lives and economic activities. In this paper, a novel approach called the COVID-19 Quantum Neural Network (CQNN) for predicting the severity of COVID-19 in patients is proposed. It consists of two phases: In the first, the most distinct subset of features in a dataset is identified using a Quick Reduct Feature Selection (QRFS) method to improve its classification performance; and, in the second, machine learning is used to train the quantum neural network to classify the risk. It is found that patients’ serial More >

Share Link