Wireless and Mobile Networks: Security and Privacy Issues
1VIT University, Vellore, India
2Hunan University of Science and Technology, Xiangtan, China
Wireless and Mobile Networks: Security and Privacy Issues
Description
With the advent of 5G networks in the era of Internet of Things (IoT), wireless and mobile networking have become prevalent everywhere. In this scenario, security and privacy have become the decisive factors. Mobile and wireless ecosystem is an ideal playground for countless perpetrators. (i) Handheld devices are often utilized for critical tasks, such as e-commerce, bank transactions, and application purchases as well as social interactions. (ii) These devices uniquely identify their users and store sensitive and meticulous information about them. (iii) Despite their sophistication, naive security mechanisms have culminated in the bypassing of the mobile operating systems. Moreover, several wireless interfaces and protocols have been found to be vulnerable. As the attacker has a multitude of alternate entry points to perform penetration, the inception of assaults against the user and underlying systems have augmented both in amount and in matters of complexity. It is, therefore, imperative that novel and advanced security and privacy preserving measures be deployed.
This special issue focuses on security and privacy issuesof wireless and mobile networks. Original papers are solicited for this special issue.
Potential topics include but are not limited to the following:
- Privacy and security issues for wearable devices
- Security and privacy considerations for the emerging field of IoT
- Intrusion and malware detection in mobile ecosystems
- Methods for locating the source of attacks
- Usable mobile security and privacy
- Wireless and mobile privacy and anonymity
- Cellular network security and fraud
- Secure mobile-routing protocols
- Security under resource constraints
- Secure roaming across administrative domains
- Trust establishment, negotiation, and management
- Threat and vulnerability analysis for mobile communication
- Authentication and access control in mobile networks
- Denial of service in wireless networks