The Internet of Things must concentrate on the consistent and appropriate liberation of information, not considering of cyber-threats, by means of protected mechanical processes over disseminated and diverse computing systems. WJIOT provides an entrenched protected, information assertion and cyber-security research viewpoint, illustrating how cyber-assurance must put together with internet of things strategy and networks to be aware of how these entity components interact in ways to resist and avoid intentional attempts to compromise normal operations. WJIOT speak about the protection of Internet of things networks from mobile devices to multifaceted processing systems.

Submission Request


The objective of WJIOT is to boost the visualization of exixting research in cyber-assurance and evolving trends in information assurance speculation, cyber-security application, architecture and information security in the Internet of things is based on theoretical aspects and studies of sensible applications. The journal will include elementary to advanced concepts essential to grab Internet of thing pertaining to exiting cyber-assurance issues, challenges and solutions as well as potential future prospects in secure Internet of thing infrastructures, architectures and applications.


The key addressees of WJIOT extends to researchers, professionals and students functioning the field of cyber-assurance, secure wireless technologies, information security architecture and cyber-security. The articles published will be written for those who want to gain and/or improve their understanding of the latest developments of cyber-assurance related issues for the IoT.


WJIOT publishes original research papers, technical reports, case studies, laboratory experiments and book reviews. Special issues devoted to the important topics of information security for the Internet of Things will be published. The Internet of Things is the system of physical objects surrounded with electronics, software, and connectivity, which supports it to realize better value and service by exchanging data with the manufacturers, operators, and other linked devices. Yet, the supports from clouds are often ineffective for the exhaustive computations and mass storage, such as the restrictions of energy, storage, processing, and communication capabilities. This complexity ignites and motivates the research of using Mobile Cloud Computing (MCC) technologies in Internet of thing. As an rising technology, MCC integrates multiple technologies for maximizing capacity and performance of the existing infrastructure. Modern networking and virtualization technologies have made a broad range of software and computing resources that are available through the Internet by the devices in Internet of things. Many issues pertaining to these evolving trends must be further investigated, addressed, and explored in research, such as corporate level applications, service discovery availability, security, and expansions of interfaces to the existing systems.

WJIOT calls for manuscript in the latent topics, authors are requested to prepare manuscript according to Guidelines for Authors

  • Secure algorithms used to spawn and control intelligent agents for embedded processing of IoT devices and networks
  • Key distribution and management in IoT networks
  • Secure IoT radio frequency (RF) signal processing
  • Distributed IoT networks using embedded sensors and actuators
  • Design tools for integrating RF devices and components, e.g. inductors and optics, on IoT processing chips
  • Techniques to improve the quality of attack indications or threat warnings for IoT networks
  • IoT technology for implementing monolithic transceivers on single integrated circuits
  • IoT processors capable of multiple gigahertz operations
  • IoT sensor intrusion networking systems, including distributed detection/estimations
  • Synchronised cyber-attacks against the smart grid and/or SCADA systems
  • Modelling frameworks for cyber-physical systems under cyber-attacks
  • Optimal IoT network clustering for distributed procedures in cyber-physical systems
  • Tools and techniques for automating the creation and distribution of interoperable vulnerabilities in IoT devices and networks
  • Trends and challenges of MCC and IoT
  • Novel architecture designs and evaluations of MCC and IoT
  • Novel mobile cloud applications and services for IoT
  • Modeling, analysis, and optimization of MCC and IoT
  • Security, privacy, and reliability issues of MCC and IoT
  • Energy efficient designs of architecture and device in IoT
  • Quality of Service (QoS) of MCC and IoT
  • Computation, storage, and network virtualization in MCC
  • Hot topics as wearable computing, Internet of vehicles, and environmental monitoring
  • IoT access network technologies and capillary networks;
  • Channel and traffic models;
  • Spectrum management for M2M/IoT radio communications;
  • RFID, sensors, actuator technologies;
  • IoT network infrastructure;
  • IoT protocols;
  • IPv6 and wireless sensor networks;
  • Applications of the IoT;
  • IoT architectures and system;
  • IoT networking and communication;
  • Circuit and system design for smart objects in the IoT;
  • Security, trust, and privacy issues for devices and services;
  • Naming, address management and end-to-end addressability;
  • Cloud computing interworking;
  • Semantic technologies;
  • Smart grids and smart spaces
  • - IoT secure access network technologies and capillary networks;
  • - secure channel and traffic models;
  • - secure spectrum management for M2M/IoT radio communications;
  • - security of RFID, sensors, actuator technologies;
  • - IoT secure network infrastructure;
  • - IoT security protocols;
  • - privacy in applications of the IoT;
  • - IoT networking and communication security