Journal of Electrical and Computer Engineering

Wireless and Mobile Networks: Security and Privacy Issues


Status
Published

1VIT University, Vellore, India

2Hunan University of Science and Technology, Xiangtan, China


Wireless and Mobile Networks: Security and Privacy Issues

Description

With the advent of 5G networks in the era of Internet of Things (IoT), wireless and mobile networking have become prevalent everywhere. In this scenario, security and privacy have become the decisive factors. Mobile and wireless ecosystem is an ideal playground for countless perpetrators. (i) Handheld devices are often utilized for critical tasks, such as e-commerce, bank transactions, and application purchases as well as social interactions. (ii) These devices uniquely identify their users and store sensitive and meticulous information about them. (iii) Despite their sophistication, naive security mechanisms have culminated in the bypassing of the mobile operating systems. Moreover, several wireless interfaces and protocols have been found to be vulnerable. As the attacker has a multitude of alternate entry points to perform penetration, the inception of assaults against the user and underlying systems have augmented both in amount and in matters of complexity. It is, therefore, imperative that novel and advanced security and privacy preserving measures be deployed.

This special issue focuses on security and privacy issuesof wireless and mobile networks. Original papers are solicited for this special issue.

Potential topics include but are not limited to the following:

  • Privacy and security issues for wearable devices
  • Security and privacy considerations for the emerging field of IoT
  • Intrusion and malware detection in mobile ecosystems
  • Methods for locating the source of attacks
  • Usable mobile security and privacy
  • Wireless and mobile privacy and anonymity
  • Cellular network security and fraud
  • Secure mobile-routing protocols
  • Security under resource constraints
  • Secure roaming across administrative domains
  • Trust establishment, negotiation, and management
  • Threat and vulnerability analysis for mobile communication
  • Authentication and access control in mobile networks
  • Denial of service in wireless networks

Articles

  • Special Issue
  • - Volume 2017
  • - Article ID 5174073
  • - Editorial

Wireless and Mobile Networks: Security and Privacy Issues

Arun Kumar Sangaiah | Marimuthu Karuppiah | Xiong Li
  • Special Issue
  • - Volume 2017
  • - Article ID 3956027
  • - Research Article

Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks

Mingshan Xie | Yong Bai | ... | Zhuhua Hu
  • Special Issue
  • - Volume 2017
  • - Article ID 4782972
  • - Research Article

The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking

Xingwang Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 4758471
  • - Research Article

Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

Lei Wang | Qing Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 4657831
  • - Research Article

Energy Efficient Partial Permutation Encryption on Network Coded MANETs

Ali Khan | Qifu Tyler Sun | ... | Ata Ullah Ghafoor
  • Special Issue
  • - Volume 2017
  • - Article ID 9358706
  • - Research Article

Enhancing the Cloud Computing Performance by Labeling the Free Node Services as Ready-To-Execute Tasks

Radwan S. Abujassar | Moneef Jazzar
  • Special Issue
  • - Volume 2017
  • - Article ID 1794849
  • - Research Article

Security Enrichment in Intrusion Detection System Using Classifier Ensemble

Uma R. Salunkhe | Suresh N. Mali
Journal of Electrical and Computer Engineering
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision93 days
Acceptance to publication17 days
CiteScore3.400
Journal Citation Indicator0.480
Impact Factor2.4
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.