Security A New Approach to Device Identification Using ICMetric and Chaotic Maps/Open Call Articles MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities/Open Call Articles Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions/Open Call Articles Assuring M2M Secure Transactions via Blockchain and Smart Contracts/Open Call Articles Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks/Open Call Articles Secure Mobile IPv6 for Mobile Networks based on the 3GPP IP Multimedia Subsystem/Open Call Articles DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks/Open Call Articles An Efficient and Private Authentication Protocol for RFID Systems/Open Call Articles A Blockchain Application Prototype for the Internet of Things/Open Call Articles A Novel Unique Parameter for Increasing of Security in GPON Networks/Open Call Articles Security Threats in Software Defined Mobile Clouds (SDMC)/Open Call Articles