Skip to main content

EDITORIAL article

Front. Comput. Sci., 17 March 2023
Sec. Computer Security
This article is part of the Research Topic Security and Privacy for the Internet of Things View all 4 articles

Editorial: Security and privacy for the Internet of Things

  • 1Department of Informatics, Modelling, Electronics and Systems, University of Calabria, Cosenza, Italy
  • 2Department of Computer Science, Boise State University, Boise, ID, United States

Editorial on the Research Topic
Security and privacy for the Internet of Things

IoT devices represent one of the major targets for malicious activities. The grounds for this are manifold: first, since security requires investments, for commercial reasons, manufacturers may sell vulnerable products, leaving users with security concerns that are unlikely to be fixed. Second, many IoT devices lack the processing power to execute security software or even permit its installation. Third, the heterogeneity of applications, hardware, and software widens the attack surface while also making the implementation of comprehensive security solutions more difficult.

As a result, IoT networks are subject to a variety of cyber threats coming from the Internet as well as from other infected IoT devices, such as denial of service attacks, information theft, ransomware, and cryptominers. To counter such a variety of attacks, the IoT calls for security and privacy-preserving technologies, such as intrusion prevention, detection and reaction systems, and privacy-preserving protocols, that, with the proliferation of IoT devices in everyday life, have become a critical requirement.

This Research Topic focuses on the recent advances in the area of security and privacy solutions for the IoT. It consists of four papers that were selected by experts via a peer-review process. In the following, we summarize these articles and highlight their major contributions.

Ayres-Pereira et al. examine how various factors, such as the degree of e-privacy concerns and control over data access permissions, can influence a user's intention to install a smartphone app. They conducted two survey-based experiments with 441 participants and concluded that the type of app plays a central role in determining both the perceived benefit of installing the app and the level of e-privacy concerns. Finally, they discuss the implications of the achieved results regarding psychological factors involved in the app installation decision-making process and the importance of promoting data protection by design.

Saheed et al. propose a hybrid Autoencoder and Modified Particle Swarm Optimization algorithm for feature selection and a deep neural network (DNN) for the detection and classification of on-going attacks. The PSO with modification of inertia weight is utilized to optimize the parameters of the DNN. The findings obtained by analyzing the proposed solution against a generic attack in the UNSW-NB15 dataset gave high classification accuracy and detection rate.

Jairam et al. (in press) study whether a subset of features that embody human cognitive motor features can be used to identify a particular user with the aim of identifying intruders. They consider how security might be made more efficient by embodying Principal Component Analysis (PCA) into the interface, which has the potential to reduce the features utilized in the identification of intruders.

Hamoud and Aïmeur analyse different attack vectors examining the techniques used against end-users, who are targeted as a way of accessing larger organizations. They show how the information that is disclosed to social networks can be transformed to provide insights about an organization and the role of the victim in this process. The proposed model is a solution to help organizations establish security-conscious behaviors among their employees.

Author contributions

All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Jairam, A., Halevi, T., and Raphan, T. Machine learning methods for improving mobile device security: a behavioral biometric approach. Front. Comput. Sci. (in press) 42.

Keywords: Internet of Things, security, privacy, mobile, network

Citation: Rullo A, Ianni M and Serra E (2023) Editorial: Security and privacy for the Internet of Things. Front. Comput. Sci. 5:1173296. doi: 10.3389/fcomp.2023.1173296

Received: 24 February 2023; Accepted: 09 March 2023;
Published: 17 March 2023.

Edited by:

Nicola Zannone, Eindhoven University of Technology, Netherlands

Reviewed by:

Savio Sciancalepore, Eindhoven University of Technology, Netherlands

Copyright © 2023 Rullo, Ianni and Serra. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Antonino Rullo, n.rullo@dimes.unical.it

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.