applsci-logo

Journal Browser

Journal Browser

IoT Security, Privacy, Resiliency and Trust: Challenges, New Trends and Applications

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Applied Industrial Technologies".

Deadline for manuscript submissions: closed (1 September 2022) | Viewed by 2472

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer, Mathematical and Natural Sciences, Morgan State University, Baltimore, MD, USA
Interests: network security, collaborative computing; nature-inspired computing and communication; internet of things; cloud computing

E-Mail Website
Guest Editor
Department of Computer Science, Virginia Tech, Blacksburg, VA 24060, USA
Interests: human–computer interaction; visual analytics; Internet of Things; extended reality
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the rapid evolution of the Internet of Things (IoT), numerous new applications, services and business opportunities have arisen. Over the past two decades, significant advancements in IoT and IoT-empowered cyber-physical systems have been witnessed, spanning almost every domain from transportation to agriculture, construction and smart cities, to healthcare, defense and national security. These systems are characterized as complex and sensitive with a highly dynamic, heterogeneous and distributed nature at varied scales. This requires efficient, robust, and cooperative monitoring, measurement, control and management for communication and data processing. As governments, organizations and individuals become increasingly reliant on these systems, it becomes even more crucial to understand and mitigate their vulnerabilities, and maintain their security, trustworthiness, privacy preservation and resilience to attacks whilst continuing to achieve effectiveness and performance goals. These issues raise new design and operational challenges that require innovative and creative sustainable solutions for thwarting cyber-physical crimes and attacks.

This Special Issue aims to serve as an archival reference for researchers and practitioners in the field. We are seeking research papers that provide a timely review of the essential fundamentals, latest developments and technologies; report on newly discovered vulnerabilities, threats, and attacks and present innovative methodologies, models, algorithms, frameworks, simulation studies and systems, focusing on the diverse challenges in IoT security, privacy, trust and resiliency.

Prof. Dr. Mohamed Eltoweissy
Prof. Dr. Denis Gracanin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at mdpi.longhoe.net by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • network security
  • resilience
  • trust management
  • IoT privacy
  • IoT application security
  • IoT in the cloud
  • cyber-physical systems
  • secure autonomous systems
  • resilient IoT platforms
  • nature-inspired IoT security
  • IoT-enabled security
  • AI-enabled IoT security
  • IoT vulnerabilities and attacks

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 16908 KiB  
Article
Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic
by Yipeng Zhang, Min Li, **aoming Zhang, Yueying He and Zhoujun Li
Appl. Sci. 2022, 12(17), 8408; https://doi.org/10.3390/app12178408 - 23 Aug 2022
Cited by 4 | Viewed by 2106
Abstract
The Industrial Control System (ICS) is a public facility that provides services to lots of users; thus, its security has always been a critical factor in measuring its availability. Recently, a new type of attack on ICS has occurred frequently, which realizes the [...] Read more.
The Industrial Control System (ICS) is a public facility that provides services to lots of users; thus, its security has always been a critical factor in measuring its availability. Recently, a new type of attack on ICS has occurred frequently, which realizes the extortion of users by invading the information domain and destroying the physical domain. However, due to the diversity and unavailability of an ICS control logic, the targets of such attacks are usually limited to PCs and servers, leaving more disruptive attack methods unexplored. To contribute more possible attack methods to strengthen the immunity of ICS, in this paper, we propose a novel ransomware attack method named Industrial Control System Automatic Ransomware Constructor (ICS-ARC). Compared to existing ICS ransomware, ICS-ARC can automatically generate an International Electrotechnical Commission (IEC) compliant payload to compromise the Programmable Logic Controller (PLC) without a pre-known control logic, dramatically reducing adversary requirements and leaving room for error. To evaluate the attack capability of ICS-ARC, we built a tap water treatment system as the simulation experiment target for verification. The experimental results determine that ICS-ARC can automatically generate malicious code without the control logic and complete the attack against target PLCs. In addition, to assist the related research on future attacks and defenses, we present the statistical results and corresponding analysis of PLC based on Shodan. Full article
Show Figures

Figure 1

Back to TopTop