Online Submission
📢 Open Calls for Book Chapters
Secure and Scalable IoT
Editors: Dr. Vijendra Pratap Singh; Dr. T.Subhashini; Mr. Syed Imran Patel; Mr. Gude Ramarao
Secure and Scalable IoT focuses on the critical challenges and emerging solutions in designing Internet of Things systems that are both robust and efficient at scale. The book explores advanced security mechanisms to protect data, devices, and communication channels, while also addressing architectural strategies that enable seamless expansion across large, distributed networks. By integrating concepts from cybersecurity, cloud computing, and edge intelligence, it provides a comprehensive perspective on building resilient IoT ecosystems capable of supporting real-world applications in smart cities, healthcare, agriculture, and industry.
Chapter-1: Foundations of IoT Security and the Evolving Threat Landscape
Chapter-2: Authentication and Authorization Mechanisms for IoT Devices and Networks
Chapter-3: Encryption Standards and Cryptographic Protocols for IoT Communication
Chapter-4: Securing Edge Devices and Embedded Systems in IoT Deployments
Chapter-5: Network Security Architecture for Large-Scale IoT Infrastructure
Chapter-6: Privacy-Preserving Data Collection and User Consent Management
Chapter-7: Secure Data Transmission and Protection Against Man-in-the-Middle Attacks
Chapter-8: Vulnerability Assessment and Penetration Testing in IoT Environments
Chapter-9: Secure Cloud Integration and Data Storage for IoT Applications
Chapter-10: Identity Management and Device Registration in Distributed IoT Systems
Chapter-11: Anomaly Detection and Intrusion Prevention for IoT Networks
Chapter-12: Scalable Database Solutions for Managing Massive IoT Data Volumes
Chapter-13: Data Governance and Compliance with GDPR and IoT Regulations
Chapter-14: Incident Response and Forensics in Compromised IoT Systems
Chapter-15: Building Trust and Implementing Security Best Practices Across IoT Ecosystems
Chapter-1: Foundations of IoT Security and the Evolving Threat Landscape
Chapter-2: Authentication and Authorization Mechanisms for IoT Devices and Networks
Chapter-3: Encryption Standards and Cryptographic Protocols for IoT Communication
Chapter-4: Securing Edge Devices and Embedded Systems in IoT Deployments
Chapter-5: Network Security Architecture for Large-Scale IoT Infrastructure
Chapter-6: Privacy-Preserving Data Collection and User Consent Management
Chapter-7: Secure Data Transmission and Protection Against Man-in-the-Middle Attacks
Chapter-8: Vulnerability Assessment and Penetration Testing in IoT Environments
Chapter-9: Secure Cloud Integration and Data Storage for IoT Applications
Chapter-10: Identity Management and Device Registration in Distributed IoT Systems
Chapter-11: Anomaly Detection and Intrusion Prevention for IoT Networks
Chapter-12: Scalable Database Solutions for Managing Massive IoT Data Volumes
Chapter-13: Data Governance and Compliance with GDPR and IoT Regulations
Chapter-14: Incident Response and Forensics in Compromised IoT Systems
Chapter-15: Building Trust and Implementing Security Best Practices Across IoT Ecosystems
Subject Areas: Internet of Things
Submission Deadline: 30-04-2026