Special Issue: Emerging security and privacy issues and their countermeasures in Industrial Internet of Things (IIoT)

Theme and Scope

The technologies developed using the Internet of Things (IoT) consist of a set of mechanical & digital computing systems which are interconnected to transmit data over a network without relying on any human interference. Moreover, in recent years, developers have popularised the concept using IoT services coupled with Artificial intelligence (AI) to provide real-time applications. These applications have enhanced the development and productivity of sectors such as agriculture, healthcare, transportation, and many more. Furthermore, IoT technologies are also integrated with machine learning (ML) models which result in the enhancement of complex applications in the fields of smart cities, synthetic vision, etc. This provides a significant push to the existing state-of-the-art techniques to scale up to a wide variety of high-level tasks. Therefore, a lot of industries are putting emphasis on gearing up their developments and research work to channel ML and AI techniques into their IoT-based endeavours. Since, the existing big data analytics, depth learning, deep intelligence, fog computing, and sustainable networks, are all part of the complex IoT application environment, it is difficult to keep track of advanced security threats posed by external attackers and malicious users who attempt to hack these IoT networks. Therefore, it is high time to generate awareness among end users & companies that rely on IoT-based applications, especially monetary applications, to safeguard them against such emerging threats.

 This Special Issue invites researchers and academics to present their ideas on advanced development in AI and ML technologies that can be integrated with IoT to enhance medical, industrial, agricultural, and healthcare systems. Since IoT networks operate on vast volumes of data and complex algorithms, using AI and ML techniques helps in managing the huge datasets and also enables the applications to perform in real-time. The special issue will draw readers from various research domains, such as industrial IoT developers, big data analysts, smart farming experts, and health monitoring developers. The solutions provided by researchers in this special edition will help strengthen the relationship between customers and IoT applications and further promote the use of ML & AI-based applications in this field.

 The following list comprises the topics related to key aspects of IoT networks, machine learning, intelligent data processing, and artificial intelligence:

  • Secured and privacy-preserved communication protocols in IIoT
  • Blockchain assisted cybersecurity solutions in wireless communications networks
  • Information security and privacy protection for emerging technologies such as cloud/edge/dew/mobile computing
  • Artificial intelligence-based cryptography theory, verification, and application for wireless communication enabled industrial IoTs
  • Secure data transmission in wireless communication enabled IoTs
  • Privacy and accountability of AI-enabled sustainable IoT systems
  • AI and blockchain powered sustainable architectures for IoT applications
  • New trends in cybersecurity to tackle security vulnerabilities and cyber security models for reliable and secure wireless networks
  • Deep learning techniques for identifying micro issues in IoTs devices.

Important Dates

  • Manuscript submission deadline: November 30, 2023 July 31, 2024
  • First notification: January 31, 2024 September 30, 2024
  • Revised notification: February 28, 2024 October 31, 2024
  • Final notification: March 31, 2024 November 30, 2024
  • Tentative Publication Date: in the fourth quarter of 2025

Instructions for Manuscripts

  • Prospective authors should ONLY submit an electronic copy of their complete manuscript through emails to Dr. Chia-Chen Lin (Leading Guest Editor), ally.cclin@ncut.edu.tw
  • Each paper, written in English, the maximum word number in each paper should be below 8,000 words, including the references, illustrations and short biographies. More information can be found at https://jit.ndhu.edu.tw/. Authors should read over the journal’s Author Guidelines carefully before submission, which are located at https://jit.ndhu.edu.tw/about/submissions#authorGuidelines. The manuscript template can also be found in the Author Guidelines. Again, prospective authors should ONLY submit an electronic copy of their complete manuscript through emails to Dr. Chia-Chen Lin (Leading Guest Editor), ally.cclin@ncut.edu.tw. Please DO NOT submit the manuscripts via online submission system.


Guest Editors

  • Dr. Chia-Chen Lin (Leading Guest Editor)
  • Distinguished Professor,
  • Department of Computer Science and Information Engineering, National of Chin-Yi University of Technology, Taiwan
  • E-mail: ally.cclin@ncut.edu.tw

  • Dr. Rajeev Kumar
  • Assistant Professor,
  • Department of Computer Science & Engineering, Delhi Technological University (Formerly Delhi College of Engineering), India
  • E-mail: rajeevkumar@dtu.ac.in

  • Dr. Yu-Dong Zhang
  • Full Professor,
  • School of Computing and Mathematic Sciences, University of Leicester, UK
  • E-mail: yudong.zhang@le.ac.uk

  • Dr. Hyun Sung Kim
  • Professor,
  • Department of Cyber Security, Kyungil University, Republic of Korea
  • E-mail: kim@kiu.ac.kr