Mobile Information Systems

Security Threats of Fog and Edge Computing Based Social Internet of Vehicles


Publishing date
01 Jan 2022
Status
Closed
Submission deadline
03 Sep 2021

Lead Editor

1Changsha University of Science and Technology, Hunan, China

2University of Electronic Science and Technology of China, Sichuan, China

3National Dong Hwa University, Taiwan, Taiwan

4Swinburne University of Technology, Melbourne, Australia

This issue is now closed for submissions.
More articles will be published in the near future.

Security Threats of Fog and Edge Computing Based Social Internet of Vehicles

This issue is now closed for submissions.
More articles will be published in the near future.

Description

Social internet of vehicles (SIoV) combines vehicular ad hoc networks (VANET) and mobile social networks (MSN). Since the social relationships between vehicles are more stable than the locations of vehicles in the SIoV system, SIoV can provide more stable services to achieve traffic safety, real-time traffic control, traffic information, entertainment, and so on. In many SIoV application scenarios, some researchers have established multiple structured relationships based on person-to-person interaction data. Therefore, social relationships become essential in the SIoV system. Furthermore, the novel fog/edge computing moves computing, storage, and other functions of cloud computing from the center to the edge of the network, which can provide users with better services of data storage, computing, and analysis. Therefore, fog/edge computing based SIoV can provide a stronger support for social data acquisition and analysis in the SIoV system.

However, vehicular terminal devices are located at the network edge. There is a lack of protection measures to fight various cyberattacks in the fog/edge computing based SIoV system. Therefore, there is a need to focus more research on the security threats of fog/edge computing based SIoV. Once a fog/edge computing based SIoV system is attacked, there are serious consequences in terms of the security of social relationships. Thus, it is essential to protect the security of fog/edge computing based SIoVs.

The aim of this Special Issue is to gather research discussing the latest developments in security and usage of fog/edge computing based SIoV. Submissions should focus on data storage, computing, and analysis. We especially encourage submissions discussing new technologies and frameworks. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Security analysis and countermeasures of fog and edge computing based SIoV
  • Application risk analysis, policies and law of fog and edge computing based SIoV
  • Application security framework of fog and edge computing based SIoV
  • System secure integration of fog and edge computing based SIoV
  • Secure data transmission, storage, and computing in fog and edge computing based SIoV
  • Social relationship and secure analysis in fog and edge computing based SIoV
  • Social data reliable decision making in fog and edge computing based SIoV
  • Big data technologies in fog and edge computing based SIoV
  • Data privacy, trust and security solutions for fog and edge computing based SIoV
  • Data privacy protection for terminal devices in fog and edge computing based SIoV
Mobile Information Systems
 Journal metrics
See full report
Acceptance rate51%
Submission to final decision41 days
Acceptance to publication22 days
CiteScore2.300
Journal Citation Indicator0.420
Impact Factor1.863
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.