Mobile Information Systems

Security Threats of Fog and Edge Computing Based Social Internet of Vehicles


Publishing date
01 Jan 2022
Status
Published
Submission deadline
03 Sep 2021

Lead Editor

1Changsha University of Science and Technology, Hunan, China

2University of Electronic Science and Technology of China, Sichuan, China

3National Dong Hwa University, Taiwan, Taiwan

4Swinburne University of Technology, Melbourne, Australia


Security Threats of Fog and Edge Computing Based Social Internet of Vehicles

Description

Social internet of vehicles (SIoV) combines vehicular ad hoc networks (VANET) and mobile social networks (MSN). Since the social relationships between vehicles are more stable than the locations of vehicles in the SIoV system, SIoV can provide more stable services to achieve traffic safety, real-time traffic control, traffic information, entertainment, and so on. In many SIoV application scenarios, some researchers have established multiple structured relationships based on person-to-person interaction data. Therefore, social relationships become essential in the SIoV system. Furthermore, the novel fog/edge computing moves computing, storage, and other functions of cloud computing from the center to the edge of the network, which can provide users with better services of data storage, computing, and analysis. Therefore, fog/edge computing based SIoV can provide a stronger support for social data acquisition and analysis in the SIoV system.

However, vehicular terminal devices are located at the network edge. There is a lack of protection measures to fight various cyberattacks in the fog/edge computing based SIoV system. Therefore, there is a need to focus more research on the security threats of fog/edge computing based SIoV. Once a fog/edge computing based SIoV system is attacked, there are serious consequences in terms of the security of social relationships. Thus, it is essential to protect the security of fog/edge computing based SIoVs.

The aim of this Special Issue is to gather research discussing the latest developments in security and usage of fog/edge computing based SIoV. Submissions should focus on data storage, computing, and analysis. We especially encourage submissions discussing new technologies and frameworks. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Security analysis and countermeasures of fog and edge computing based SIoV
  • Application risk analysis, policies and law of fog and edge computing based SIoV
  • Application security framework of fog and edge computing based SIoV
  • System secure integration of fog and edge computing based SIoV
  • Secure data transmission, storage, and computing in fog and edge computing based SIoV
  • Social relationship and secure analysis in fog and edge computing based SIoV
  • Social data reliable decision making in fog and edge computing based SIoV
  • Big data technologies in fog and edge computing based SIoV
  • Data privacy, trust and security solutions for fog and edge computing based SIoV
  • Data privacy protection for terminal devices in fog and edge computing based SIoV
Mobile Information Systems
 Journal metrics
See full report
Acceptance rate5%
Submission to final decision187 days
Acceptance to publication137 days
CiteScore1.400
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.