Wireless Communications and Mobile Computing

Secure Computation on 4G/5G Enabled Internet-of-Things


Publishing date
01 Jun 2019
Status
Published
Submission deadline
18 Jan 2019

Lead Editor

1Luleå University of Technology, Luleå, Sweden

2Soonchunhyang University, Asan, Republic of Korea

3Stockholm University, Stockholm, Sweden


Secure Computation on 4G/5G Enabled Internet-of-Things

Description

The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.

This featured topic will benefit the research community by identifying challenges and disseminating the latest methodologies and solutions to secure computation on 4G and 5G enabled IoT data. Its objective is to publish high-quality articles presenting open issues, algorithms, protocols, policies, frameworks, standards, and solutions for secure computation techniques related to IoT. All received submissions will be sent out for peer review by at least two experts in the field and evaluated with respect to relevance to the special issue, level of innovation, depth of contributions, and quality of presentation. Reviews and case studies, which address state-of-art research and state-of-practice industry experiences, are also welcomed. Guest  Editors will make an initial determination of the suitability and scope of all submissions. Papers that either lack originality and clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases. Submitted papers must not be under consideration by any other journal or publication.

Potential topics include but are not limited to the following:

  • Secure multiparty computation in cellular IoT
  • Security and privacy for cellular IoT networks
  • Secure computation outsourcing in cellular IoT
  • Large-scale secure computation for IoT-sensor networks
  • Security for mobile-IoT services and applications in 4G/5G environemnts
  • Efficient secret sharing techinques for smart cellular IoT networks
  • Mobile user authentication and authorization
  • Privacy-preserving data mining in cellular IoT
  • Searchable encryption in cellular IoT databases
  • Digital forensics for vulnerability identification of cellular IoT devices
  • Privacy and trust for smart Mobile IoT
  • Privacy-preserving machine learning in IoT
  • Cellular IoT protocols security
  • Cybercrime detections in IoT devices

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 3978193
  • - Editorial

Secure Computation on 4G/5G Enabled Internet-of-Things

Karl Andersson | Ilsun You | ... | Vishal Sharma
  • Special Issue
  • - Volume 2019
  • - Article ID 8913910
  • - Research Article

UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization

Sieun Kim | Taek-Young Youn | ... | Ki-Woong Park
  • Special Issue
  • - Volume 2019
  • - Article ID 6219868
  • - Research Article

Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks

Sandi Rahmadika | Kyung-Hyune Rhee
  • Special Issue
  • - Volume 2019
  • - Article ID 7840917
  • - Research Article

Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage

Taek-Young Youn | Nam-Su Jho | ... | Sang Uk Shin
  • Special Issue
  • - Volume 2019
  • - Article ID 6974809
  • - Research Article

A Multiuser Identification Algorithm Based on Internet of Things

Kaikai Deng | Ling Xing | ... | Ping Xie
  • Special Issue
  • - Volume 2019
  • - Article ID 5121054
  • - Research Article

Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

Mookyu Park | Jaehyeok Han | ... | Kyungho Lee
  • Special Issue
  • - Volume 2019
  • - Article ID 5650245
  • - Research Article

Enhanced Android App-Repackaging Attack on In-Vehicle Network

Yousik Lee | Samuel Woo | ... | Dong Hoon Lee
  • Special Issue
  • - Volume 2019
  • - Article ID 4064201
  • - Research Article

Radio Environment Map Construction by Kriging Algorithm Based on Mobile Crowd Sensing

Zhifeng Han | Jianxin Liao | ... | Jingyu Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 7943586
  • - Research Article

Automatically Traceback RDP-Based Targeted Ransomware Attacks

ZiHan Wang | ChaoGe Liu | ... | Shen Su
  • Special Issue
  • - Volume 2018
  • - Article ID 3473910
  • - Research Article

Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks

Jian Li | Tongtong Li | ... | Han-Chieh Chao
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.