Special Issue on A Multidisciplinary Approach to Internet of Things Cybersecurity and Risk Management
• 大类 : 工程技术 - 3区
• 小类 : 计算机：信息系统 - 3区
Internet of Things (IoT) links physical and virtual objects by leveraging data capture and communication capabilities. Increasingly, IoT can be found in a broad range of commercial (e.g., smart and connected cities, and industry 4.0) and national security applications (e.g., critical infrastructure and Internet of Battlefield and Military Things). Due to the interconnectivity of IoT and the broader society, it is important to ensure the security of IoT and the underpinning systems. While there is no foolproof solution, we need to take a transdisciplinary approach to understand the cybersecurity risk and threat landscape, in order to formulate appropriate risk mitigation strategies.
How do we design more effective solutions that mitigate existing and emerging threats to IoT and the underpinning systems, such as physics attacks, sliding channels attacks, environmental attacks, cryptanalysis attacks, software attacks, and network attacks, without affecting users’ quality of experience and quality?
How do we take a transdisciplinary approach to understanding the cybersecurity risk and threat landscape, and take into consideration the imperfection of cybersecurity and physical security management system in the design of the next generation cybersecurity and risk management solutions?
How do we balance the need for higher level of security (and user privacy) with legitimate surveillance and lawful data access (e.g., in law enforcement investigations)?
In this special issue, we will focus on cutting edge research from both academia and industry to address the above research questions, with a particular focus on multidisciplinary research. Topics of interest include, but are not limited to the below categories (however, crypto-oriented topics are beyond the scope of this journal and special issue):
Cybersecurity and risk management
IoT cybersecurity incident response and management
Cybercrime prevention strategies, relating to IoT systems
Data protection in cloud-enhanced IoT systems
Physical security management of IoT systems
Secure network access in IoT systems
Identity management and authentication of IoT
Secure edge-powered IoT design
IoT trust and governance
IoT secure middleware design
IoT mobility security and risk management
Blockchain-enabled risk management method
Emerging threats to IoT
Secure information integrity of IoT
Other security and privacy-related issues in connected critical infrastructure
Enhancing and/or preserving IoT data privacy
Legal issues relating to surveillance and user privacy, relating to IoT systems
Transparency and accountability of IoT systems
IoT forensics and anti-forensics
Secure data provenance in IoT
High quality survey papers on the above topics are welcome.