Mobile Information Systems

Distributed Secure Computing for Smart Mobile IoT Networks 2021


Publishing date
01 Mar 2022
Status
Closed
Submission deadline
15 Oct 2021

Lead Editor

1Queen's University Belfast, Belfast, UK

2University of Seville, Seville, Spain

3Qingdao University, Qingdao, China

This issue is now closed for submissions.

Distributed Secure Computing for Smart Mobile IoT Networks 2021

This issue is now closed for submissions.

Description

Decentralized distributed systems eliminate the biggest problem - a single point of failure in centralized networks - with the facilitation of multiple owners. Very recently, the increased interest in privacy-driven distributed computations has necessitated greater scrutiny of the security and optimality of these distributions. The need to solve computationally intensive problems has resulted in significant research and investment in the field of distributed computing, especially targeting smart mobile Internet of Things (IoT). Furthermore, the increased presence of portable smart devices, coupled with the explosive growth in computing power, offers an untapped resource for these computations. Importantly, blockchain technology is an elegant example of distributed computation which decentralizes information. There is no doubt that the implications of blockchain for distributed systems are of profound influence.

This Special Issue aims to benefit the research community with a collection of articles emphasizing the challenges and solutions to distributed secure computing for smart mobile IoT networks. This Special Issue will also focus on state-of-the-art fast and efficient privacy-enhancing techniques for achieving secure distributed computations in IoT networks. Issues such as how to compute on encrypted data for IoT networks, how to verify computation in outsourced environments, how to keep the data privacy for IoT networks under machine learning techniques, how to achieve password-based authentication in distributed environments, and how to guarantee the data privacy in blockchain and smart contract will be covered. We welcome both original research articles as well as review articles discussing the current state of the art.

Potential topics include but are not limited to the following:

  • Secure computation and queries on encrypted data in smart mobile IoT
  • Verifiable computation in outsourced environments in IoT
  • User authentication and authorization for IoT devices
  • Secure behaviour modelling of IoT devices
  • Privacy-enhancing technologies for distributed environments
  • Encrypted machine learning and secure multiparty computation in IoT
  • Privacy-preserving machine learning in smart mobile IoT networks
  • Searchable encryption in IoT databases
  • IoT security and privacy
  • Security for mobile-IoT services and applications
  • Secure multiparty computation in smart mobile IoT networks
  • Security for 4G and 5G-enabled IoT networks
  • Secure computation outsourcing in IoT
  • Private and verifiable smart contracts for Blockchains
  • Distributed key generation with smart contracts
  • Privacy-preserving smart contracts
  • Secure storing of secret keys for blockchain wallet
  • Secure authentication for blockchain wallet
  • Threshold-optimal signatures and applications to blockchain wallet
  • Various applications atop blockchain, such as e-voting and e-action

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 8091363
  • - Research Article

Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning

Tarun Dhar Diwan | Siddartha Choubey | ... | Basant Tiwari
  • Special Issue
  • - Volume 2021
  • - Article ID 2427434
  • - Research Article

Cost-Effective Proxy Signcryption Scheme for Internet of Things

Insaf Ullah | Ali Alkhalifah | ... | Samih M. Mostafa
  • Special Issue
  • - Volume 2021
  • - Article ID 5972486
  • - Research Article

Towards Region Queries with Strong Location Privacy in Mobile Network

Songtao Yang | Qingfeng Jiang
  • Special Issue
  • - Volume 2021
  • - Article ID 1440259
  • - Research Article

Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks

Dongxian Shi | Ming Xu | ... | Liang Kou
  • Special Issue
  • - Volume 2021
  • - Article ID 7314508
  • - Research Article

Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches

Jiyoon Kim | Daniel Gerbi Duguma | ... | Ilsun You
  • Special Issue
  • - Volume 2021
  • - Article ID 2807395
  • - Research Article

Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

Xudong Deng | Chengliang Tian | ... | Hequn Xian
  • Special Issue
  • - Volume 2021
  • - Article ID 9926106
  • - Research Article

Research on Accounting Information Security Management Based on Blockchain

Huaqing Shao | Zongli Zhang | Bin Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 7611619
  • - Research Article

Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs

Ming Mao | Peng Yi | ... | Jingwei Lei
  • Special Issue
  • - Volume 2021
  • - Article ID 9160516
  • - Research Article

An Efficient Routing Approach to Maximize the Lifetime of IoT-Based Wireless Sensor Networks in 5G and Beyond

C. Jothikumar | Kadiyala Ramana | ... | In-Ho Ra
Mobile Information Systems
 Journal metrics
See full report
Acceptance rate5%
Submission to final decision187 days
Acceptance to publication137 days
CiteScore1.400
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.