Manuscript Submission Deadline
Call for Articles
With the advent of the IoT (Internet of Things), various industries have made considerable progress, including agriculture, utilities, manufacturing, and retail industries. IoT solutions help to increase productivity and efficiency in factories and workplaces. Meanwhile, in smart cities, interconnected traffic lights and parking lots are established through IoT technologies to alleviate traffic problems. Currently, IoT security has become the main concern in practical applications. In the field of AIoT (Artificial Intelligence of Things), AI (Artificial Intelligence) is realized through various technical supports, especially ML (Machine Learning) technology. ML can analyze data, learn from them, and infer or predict with specific algorithms. ML can solve practical problems that are difficult for simple rules using data and is widely used in complex tasks, such as SE (Search Engine), AD (Autonomous Driving), MT (Machine Translation), medical diagnosis, spam filtering, computer games, face recognition, data matching, and credit rating. In particular, ML technology can shape the surrounding environment into a personal preference under the IoT, which is very practical.
IoT security threats, such as DDoS (Distributed Denial of Service Attack), extortion software, and social engineering, can steal the key data of individuals and organizations. Hackers can attack IoT infrastructures over the Internet through security vulnerabilities. Many communication technologies can be used over IoT, such as WiFi, Bluetooth, and IoT cards. IoT cards are sure to spread throughout IoT as a basic communication means among IoT devices. Convenience services have come along with information security threats with the appearance of IoT. Eavesdropping can hardly be avoided in traditional cable and optical fiber communication even through software encryption. In the field of 5G (Fifth Generation Mobile Networks) + AIoT, the number of intelligent terminals is enormous, most of which have security vulnerabilities, such as weak passwords, mutual attacks, and neighboring infections. These IoT security problems should be solved from multiple perspectives and comprehensively. Specifically, safety regulations, design, standards, technologies, and management should be improved and deepened. Various methods can be adopted in AIoT to reject miscellaneous attacks. The mechanisms of most attacks are to send data randomly over IoT and get unanticipated results. Forms of attacks are diverse, including collision attacks, blocking attacks, and information tampering, hindering the development of the IoT. Security authentication identifies intelligent devices based on security identity to prevent unauthorized access and forgery, thus improving security from the source. Operators provide the main authentication with the 5G network unified authentication framework to ensure legitimate access. Slicing authentication is carried out through slice ID to avoid unauthorized user occupation of slicing resources. The combination of encryption, authentication technology, and multi-channel transmission has a very broad application prospect for the secure communication of multi-channel transmission. It is a new solution to the security problems, such as anti-intermediary attacks and key cracking.
With the popularization of 5G, IoT technology will be extended to various industries vertically, and a new marketing space will be created. Meanwhile, the importance of IoT security issues cannot be overemphasized.
Manuscripts should conform to the standard format as indicated in the Information for Authors section of the Article Submission Guidelines. All manuscripts to be considered for publication must be submitted by the deadline through Manuscript Central. Select “March 2022/Secure Communications over The Internet of Artificially Intelligent Things” from the drop-down menu of Topic/Series titles.
30 September 2021 24 October 2021 15 November 2021 (Extended Deadline)
First Decision Date: 30 November 2021
Revisions Due: 30 December 2021
Final Decision Date: 15 January 2022
Camera-ready Files Due: 31 January 2022
Publication Date: March 2022
Qingdao University, China
Polytechnic University of Valencia, Spain
Embry-Riddle Aeronautical University, USA
School of Computing and Information Technology, University of Wollongong, Australia
Warsaw University of Technology, Poland