Special Issue: Securing the IoT against Fault Injection Attacks using Digital Sensors

Because of side-channel and fault attacks, theoretically secure primitives were vulnerable when implemented in practice. Such a wide range of attacks, for instance, those that target electromagnetic radiations, power consumption, or execution time, often target tiny platforms like microchips. Physical security has assumed a prominent role in research because of the large rise of embedded devices dealing with sensitive information from various disciplines and the exponential increase in the number of linked devices from the Internet of Things. Intelligent networks may be used and controlled effectively due to the connectedness and accessibility of their sensors. However, because sensor networks are publicly accessible, outside assaults are possible. Due to these flaws, we must implement certain security measures to prevent issues brought on by contact with adversarial agents. These precautions are especially required for smart grids, which are crucial in addition to the availability of the electrical system itself. The assets that make up these networks must thus be protected since they are considered important infrastructures.

This Special Issue's objective is to offer the basis for debate and development toward improving IoT security and functional safety characteristics and their developing applications. This IoT revolution has helped a variety of vertical industries as well as industrial organizations. Still, it has also opened up the previously unheard-of potential for exploiting new attack vectors. The issue will concentrate on cutting-edge IoT Fault Injection Attacks methods that consider the security of individual devices and the grid-connected network.


  1. Cybersecurity for IoT
  2. Technology for attestation and decentralized roots of trust
  3. Binary trading of control flows and RISC-V security
  4. IoT networks that use trusted execution environments 
  5. Security in edge and fog computing and security in the smart grid
  6. Formal validation of security procedures
  7. Data security for IoT networks during transmission and storage
  8. Applications for cybersecurity based on blockchain
  9. Safe on- and off-chain knowledge management and data exchange using cryptographic trust anchors
  10. IoT security frameworks and defense mechanisms
  11. IoT threat models and attack tactics
  12. Applications for managing IoT security
  13. Technologies for IoT intrusion and malware detection and prevention
  14. IoT-related security in wireless sensor networks
  15. Challenges with IoT security and forensics



→  Manuscript Submission Due: June 25, 2024

→  First-Round Acceptance Notification: September 1, 2024

→  Submission of Revised Version: October 1, 2024

→  Notification of Final Decision: November 1, 2024

→  Tentative publication date: To be defined later in accordance with CIT's publication schedule



Joseph Bamidele Awotunde, Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin 240003, Kwara State, Nigeria

Emails: awotunde.jb@unilorin.edu.org, awotunde.joba@gmail.com    


Akash Kumar BhoiDirectorate of Research, Sikkim Manipal University, Gangtok, Sikkim, 737102, India

Email: akash.b@smit.smu.edu.in  


Paolo Barsocchi, Institute of Information Science and Technologies, National Research Council, 56124, Pisa, Italy

Email: paolo.barsocchi@isti.cnr.it  



Prospective authors are directed to submit their manuscripts only through the Guest Editors, contacting them by the above e-mail(s). When submitting the manuscripts, it is imperative to follow the respective requirements listed on the following link:


The submitted manuscripts will be reviewed by at least two independent experts and the review process will be conducted through CIT's journal management system OJS.