Wireless Communications and Mobile Computing

Securing AI-powered Internet of Things (IoT) Ecosystems


Publishing date
01 Aug 2022
Status
Published
Submission deadline
01 Apr 2022

Lead Editor
Guest Editors

1Beijing Jiaotong University, Beijing, China

2Texas Christian University, Fort Worth, USA

3Bowling Green State University, Bowling Green, USA


Securing AI-powered Internet of Things (IoT) Ecosystems

Description

The Internet of Things (IoT) is becoming smarter and more capable empowered by recent advances in Artificial Intelligence (AI). As the deployment of IoT products grows rapidly in our cyber infrastructure, threats targeting IoT ecosystems are increasing at an alarming rate. Consequently, supporting and optimizing IoT security to increase the resilience of our critical cyber infrastructure is essential. Traditional methodologies cannot effectively scale up to the capability and efficacy required to keep up with today's ever-escalating cybersecurity threats. Thus, it is urgently necessary to design and develop novel approaches, algorithms, and technologies for securing AI-based IoT ecosystems.

AI can cause significant disruptions in IoT ecosystems whether it is a failure of the AI engine or because a malicious actor is causing it to behave in unexpected ways. Therefore, it is important to improve the security of the underlining AI algorithms and applications, and to detect improper AI usage in IoT systems.

The aim of this Special Issue is to collate original research and review articles with a focus on interpretable AI, AI application fault/risk detection and prevention, AI ethical privacy and AI safety amongst other topics.

Potential topics include but are not limited to the following:

  • Interpretable and transparent AI in IoT
  • Secured and privacy preserved IoT applications
  • AI based security/privacy issue detection in IoT
  • AI based privacy protection in IoT
  • AI based security enhancement in IoT
  • Federated learning in IoT
  • Incentive mechanism design for collaborative training in IoT
  • Novel collaborative training platform design in IoT
  • Secure collaborative training application design in IoT
  • Fairness control in collaborative training

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 8984789
  • - Research Article

DIM-Based Random Number Generation Using Quantum Noise Resources

Hansaem Wi | Seyoon Lee | Okyeon Yi
  • Special Issue
  • - Volume 2022
  • - Article ID 3678493
  • - Research Article

A Novel Intrusion Detection Method Based on Supplement Gate Recurrent Unit for IoT

Zi-yi Liu | Chang-song Yang | ... | Ke-xing Shi
  • Special Issue
  • - Volume 2022
  • - Article ID 3173995
  • - Research Article

A Hash-Based Fast Image Encryption Algorithm

Ruifeng Han
  • Special Issue
  • - Volume 2022
  • - Article ID 1903197
  • - Research Article

Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs

Won-Bin Kim | Su-Hyun Kim | ... | Im-Yeong Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 4518599
  • - Research Article

A Data-Secured Intelligent IoT System for Agricultural Environment Monitoring

Qing Zhou | Minghua Xiao | ... | Yulun Shi
  • Special Issue
  • - Volume 2022
  • - Article ID 6476274
  • - Review Article

A Survey on Zero Trust Architecture: Challenges and Future Trends

Yuanhang He | Daochao Huang | ... | Xiangjie Ma
  • Special Issue
  • - Volume 2022
  • - Article ID 4087816
  • - Research Article

A Study on Scalar Multiplication Parallel Processing for X25519 Decryption of 5G Core Network SIDF Function for mMTC IoT Environment

Changuk Jang | Juhong Han | ... | Okyeon Yi
  • Special Issue
  • - Volume 2022
  • - Article ID 9058048
  • - Research Article

Learning the Correlations between IoT Systems Consisting of Massive Sensors

Shuze Jia | You Ma | ... | Aijun Zhu
  • Special Issue
  • - Volume 2022
  • - Article ID 8003887
  • - Research Article

A GNN-Based Variable Partition Framework for DCOPs

Chun Chen | Li Ning | ... | Shengzhong Feng
  • Special Issue
  • - Volume 2022
  • - Article ID 2432351
  • - Research Article

Graph Embedding-Based Sensitive Link Protection in IoT Systems

Yanfei Lu | Zhilin Deng | ... | Tao Jing
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.