Table of Content

Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks

Submission Deadline: 29 August 2021 (closed)

Guest Editors

Dr. Mujahid Tabassum, University of Technology and Applied Sciences, Oman.
Dr. Sundresan Perumal, Universiti Sains Islam Malaysia, Malaysia.
Dr. Jubaer Ahmed, Swinburne University of Technology, Malaysia.
Dr. Hadi Nabipour Afrouzi, Swinburne University of Technology, Malaysia.
Dr. Saad Bin Abul Kashem, Academic Bridge Program, Qatar Foundation, Australia.


This Special Issue will accept and presents selected peer-reviewed papers from the researchers.

It will focus on the latest IoT related technological and smart solutions using Artificial Intelligence (AI) and Machine Learning (ML) techniques.

The Internet of Things (IoT) is a collection of interrelated computing systems, mechanical and digital systems which have a specific identity and the capacity to transmit data across a network without human-to-human or human-to-machine interaction to enhance the network efficiency. Artificial intelligence (AI) and its applications are now the hottest research areas. In recent years, there have been more and more AI applications have been used in every field. AI technology is promoting the development of the agricultural, transportation, medical and health industries. IoT industry is increasing and influences many industries/applications such as e-health care, smart cities, smart transportation, and industrial engineering. The recent progress in artificial intelligence and machine learning techniques have revolutionized various fields of synthetic vision, significantly pushing the state of the art of artificial vision systems into a wide range of high-level tasks. Therefore, a lot of developments and research are going on to enhance IoT performance and productivity in various industries using machine learning and artificial intelligence. Furthermore, big data analytics, deep intelligence, depth learning, fog computing, cloud computing, sustainable networks, intelligent solutions have been used in IoT base medical, agricultural, industrial and health care systems. Today, many fraudulent and malicious activities are rising to hack these networks. It is essential to create awareness among customers and companies while performing financial transactions.

This Special Issue focus on advanced AI and ML techniques use in IoT base medical, agricultural, industrial and health care systems. This SI will provide opportunities for researchers and practitioners to publish their latest innovative contributions in the areas of IoT using latest AI and ML techniques. IoT network deals with a large quantity of data which is hard to access and analyse without using an appropriate algorithm. AI and ML techniques play an essential role in effective analysing of extensive data. The special issue will attract readers from different research areas, including novel algorithms and applications for IoT industrial applications, big data analysis, as well as devices and tools for smart farming, smart monitoring, and health monitoring. Cybersecurity provides legitimate solutions to online communication platforms to ensure trust between the client and companies.

We are comprising topics related to diverse aspects of IoT smart and technological networks, wireless sensor networks, machine learning, intelligent data processing, artificial intelligence and cyber security.

· Machine learning approaches in IoT.

· IoT solutions and automation.

· Edge computing for smart agriculture.

· Resource optimization and Context-aware data algorithm solutions for IoT applications.

· Latest architectures and models for IoT network.

· Designs and implementations for IoT ecosystem.

· Energy-efficient sensing techniques in IoT.

· Data Mining and processing in Wireless Sensor Network.

· Big data management and analytic techniques in the IoT network.

· Big Data Analytics for prediction in the medical application for COVID-19.

· Deep learning techniques for identifying micro issues in IoT devices.

· Decision support systems and making (AI, machine learning).

· Security and data processing in the IoT and WSN networks.

· New trends in cybersecurity to tackle security vulnerabilities and Cybersecurity models for E-commerce.

· Possible attacks across the E-commerce.

· Advance cybersecurity algorithms to enhance security measures in online financial transactions.

· Advance cybersecurity and big data mining methodologies.

· Blockchain assisted cybersecurity solutions for E-commerce.


IoT networks, Wireless Sensor Network, Smart Systems, Mobile and Wireless Communication, Big data, Machine Learning, Computational intelligence, Intelligent Data Processing, Control Systems and Robotics, Cloud Computing, Security and Networks

Published Papers

  • Open Access


    DNNBoT: Deep Neural Network-Based Botnet Detection and Classification

    Mohd Anul Haq, Mohd Abdul Rahim Khan
    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1729-1750, 2022, DOI:10.32604/cmc.2022.020938
    (This article belongs to this Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract The evolution and expansion of IoT devices reduced human efforts, increased resource utilization, and saved time; however, IoT devices create significant challenges such as lack of security and privacy, making them more vulnerable to IoT-based botnet attacks. There is a need to develop efficient and faster models which can work in real-time with efficiency and stability. The present investigation developed two novels, Deep Neural Network (DNN) models, DNNBoT1 and DNNBoT2, to detect and classify well-known IoT botnet attacks such as Mirai and BASHLITE from nine compromised industrial-grade IoT devices. The utilization of PCA was made to feature extraction and improve… More >

  • Open Access


    Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime

    Raniyah Wazirali, Rami Ahmad
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4922-4946, 2022, DOI:10.32604/cmc.2022.020044
    (This article belongs to this Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) and Distributed DoS (DDoS) is one of the WSN networks security tasks. Traditional packet deep scan systems that rely on open field inspection in transport layer security packets and the open field encryption trend are making machine learning-based systems the only viable choice for these types of attacks. This paper contributes to the evaluation of the use machine learning algorithms in WSN nodes traffic and their effect on WSN network life time. We examined the performance metrics… More >

  • Open Access


    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    Nojood O. Aljehane
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3915-3929, 2021, DOI:10.32604/cmc.2021.017905
    (This article belongs to this Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion… More >

  • Open Access


    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour, Moheb R. Girgis
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064
    (This article belongs to this Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques,… More >

Share Link

WeChat scan