sensors-logo

Journal Browser

Journal Browser

Artificial Intelligence-Enabled Security and Privacy for IoT

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: closed (29 February 2024) | Viewed by 5765

Special Issue Editors


E-Mail Website
Guest Editor
Ampliación Campus de Teatinos, Universidad de Málaga, 29071 Málaga, Spain
Interests: secure elements and trusted computing system design; security engineering (security patterns); monitoring of security properties in clouds
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Telecommunications Department, University Politehnica of Bucharest, Bucharest, Romania
Interests: Internet of Things; blockchain; security; software engineering; cloud computing; eHealth Systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Artificial intelligence (AI) is a discipline that is gaining attention exponentially. Techniques such as machine learning and deep learning are being used to solve problems that were difficult to solve before they appeared. Large technology companies are exploring the application of AI in different markets such as healthcare, financial technology and autonomous vehicles. AI is currently driving transformations in various fields, including cybersecurity, which is another cross-cutting discipline. Security has been applying AI to improve the security posture of networks, systems and devices, with significant success. However, along with the benefits of AI, new threats are emerging as attackers themselves make use of deep learning or machine learning techniques to improve their malware. In fact, data protection, data quality and adversarial attacks that exploit vulnerabilities in AI systems are on the rise. This does not stop there; AI can also be used to create more sophisticated attacks that trigger an AI arms race between defenders and attackers. To effectively use AI in the cybersecurity domain and address these challenges, novel ideas and effective approaches need to be explored. To meet this plethora of new challenges, measures of different types need to be applied without losing sight of the fact that the basics of software engineering must remain during all phases in the secure software lifecycle. This Special Issue aims to collect contributions by leading researchers both from academia and industry, show the latest research results in the field of IoT monitoring, security and privacy and provide valuable information to researchers as well as practitioners, standards developers and policymakers. Its aim is to focus on the research challenges and issues in IoT security. Manuscripts regarding novel algorithms, architectures, implementations and experiences are welcome. Topics include, but are not limited to, the following:

  • Formal security and resilience analysis of AI;
  • Risk management and governance for AI application;
  • Adversarial machine learning;
  • AI for detection, prevention, response and recovery against potential threats;
  • AI for wide-area situational awareness and traceability;
  • Applied cryptography for AI and IIoT;
  • Applications of formal methods to systems security;
  • Embedded systems security;
  • Privacy-preserving machine learning;
  • Case studies of malware analysis in IoT environments;
  • Security diagnosis tools;
  • Trust frameworks and secure/private collaboration mechanisms;
  • Operative systems security;
  • Deep learning and AI for security;
  • Specifically tailored security and privacy solutions;
  • Secure methodologies for emerging technologies;
  • Secure elements (TPM, TEE, SGX, ARM, etc.) in security engineering;
  • AI cryptography in secure elements.

Dr. Antonio Muñoz
Dr. Alexandru Vulpe
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 4031 KiB  
Article
Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks
by Shafiullah Khan, Muhammad Altaf Khan and Noha Alnazzawi
Sensors 2024, 24(5), 1641; https://0-doi-org.brum.beds.ac.uk/10.3390/s24051641 - 02 Mar 2024
Viewed by 606
Abstract
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to environmental monitoring. However, WSNs are vulnerable to routing attacks that might jeopardize network performance and data integrity due to their inherent vulnerabilities. This work suggests a unique method for enhancing WSN [...] Read more.
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to environmental monitoring. However, WSNs are vulnerable to routing attacks that might jeopardize network performance and data integrity due to their inherent vulnerabilities. This work suggests a unique method for enhancing WSN security through the detection of routing threats using feed-forward artificial neural networks (ANNs). The proposed solution makes use of ANNs’ learning capabilities to model the network’s dynamic behavior and recognize routing attacks like black-hole, gray-hole, and wormhole attacks. CICIDS2017 is a heterogeneous dataset that was used to train and test the proposed system in order to guarantee its robustness and adaptability. The system’s ability to recognize both known and novel attack patterns enhances its efficacy in real-world deployment. Experimental assessments using an NS2 simulator show how well the proposed method works to improve routing protocol security. The proposed system’s performance was assessed using a confusion matrix. The simulation and analysis demonstrated how much better the proposed system performs compared to the existing methods for routing attack detection. With an average detection rate of 99.21% and a high accuracy of 99.49%, the proposed system minimizes the rate of false positives. The study advances secure communication in WSNs and provides a reliable means of protecting sensitive data in resource-constrained settings. Full article
(This article belongs to the Special Issue Artificial Intelligence-Enabled Security and Privacy for IoT)
Show Figures

Figure 1

17 pages, 1664 KiB  
Article
Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
by Paul Zanna, Peter Radcliffe and Dinesh Kumar
Sensors 2022, 22(23), 9481; https://0-doi-org.brum.beds.ac.uk/10.3390/s22239481 - 04 Dec 2022
Cited by 4 | Viewed by 2031
Abstract
Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies [...] Read more.
Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks. Full article
(This article belongs to the Special Issue Artificial Intelligence-Enabled Security and Privacy for IoT)
Show Figures

Figure 1

16 pages, 1186 KiB  
Article
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform
by George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamà, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz and Christos Xenakis
Sensors 2022, 22(17), 6527; https://0-doi-org.brum.beds.ac.uk/10.3390/s22176527 - 30 Aug 2022
Cited by 2 | Viewed by 2413
Abstract
IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture composed of different licensing entities that manage access to [...] Read more.
IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture composed of different licensing entities that manage access to different resources within a network infrastructure. They are conducted on the basis of well-drawn policy rules. At the same time, the security side of these resources is also placed through a context awareness module. Together with this technology, IoT is used and Blockchain is enabled (for network consolidation, as well as the transparency with which to monitor the platform). The ultimate goal is to implement a secure and scalable security platform for the Smart Grid. The paper presents the work undertaken in the SealedGRID project and the steps taken for implementing security policies specifically tailored to the Smart Grid, based on advanced concepts such as Opinion Dynamics and Smart Grid-related Attribute-based Access Control. Full article
(This article belongs to the Special Issue Artificial Intelligence-Enabled Security and Privacy for IoT)
Show Figures

Figure 1

Back to TopTop