Mobile Information Systems

Distributed Secure Computing for Smart Mobile IoT Networks


Publishing date
01 Feb 2021
Status
Published
Submission deadline
25 Sep 2020

Lead Editor

1Singapore University of Technology and Design (SUTD), Singapore

2University of Seville, Seville, Spain

3Vellore Institue of Technology, Vellore, India

4Tallinn University of Technology, Tallinn, Estonia

5Central Scientific Instruments Organisation, Chandigarh, India


Distributed Secure Computing for Smart Mobile IoT Networks

Description

Decentralized distributed systems eliminate the biggest problem - a single point of failure in centralized networks - with the facilitation of multiple owners. Very recently, the increased interest in privacy-driven distributed computations has necessitated greater scrutiny of the security and optimality of these distributions. The need to solve computationally intensive problems has resulted in significant research and investment in the field of distributed computing, especially targeting smart mobile Internet of Things (IoT). Furthermore, the increased presence of portable smart devices, coupled with the explosive growth in computing power, offers an untapped resource for these computations. Importantly, Blockchain technology is an elegant example of distributed computation which decentralizes information. There is no doubt that the implications of blockchain for distributed systems are of profound influence.

This Special Issue aims to benefit the research community with a collection of articles emphasizing the challenges and solutions to “Distributed secure computing for smart mobile IoT networks”. This Special Issue will also focus on state-of-the-art fast and efficient privacy-enhancing techniques for achieving secure distributed computations in IoT networks. Issues such as how to compute on encrypted data for IoT networks, how to verify computation in outsourced environments, how to keep the data privacy for IoT networks under machine learning techniques, how to achieve password-based authentication in distributed environments, and how to guarantee the data privacy in blockchain and smart contract will be covered. We welcome both original research articles as well as review articles discussing the current state of the art.

Potential topics include but are not limited to the following:

  • Secure computation and query on encrypted data in smart mobile IoT
  • Verifiable computation in outsourced environments in IoT
  • User authentication and authorization for IoT devices
  • Privacy-enhancing technologies for distributed environments
  • Encrypted machine learning and secure multiparty computation in IoT
  • Privacy-preserving Machine Learning in smart mobile IoT networks
  • Searchable encryption in IoT databases
  • IoT security and privacy
  • Security for mobile-IoT services and applications
  • Secure multiparty computation in smart mobile IoT networks
  • Security for 4G and 5G-enabled IoT networks
  • Secure computation outsourcing in IoT
  • Private and verifiable smart contracts for Blockchains
  • Distributed key generation with smart contracts
  • Privacy-preserving smart contracts
  • Secure storing of secret keys for Blockchain wallet
  • Secure authentication for Blockchain wallet
  • Threshold-optimal signatures and applications to Blockchain wallet
  • Various applications atop Blockchain, such as e-voting and e-action

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9864846
  • - Editorial

Distributed Secure Computing for Smart Mobile IoT Networks

Vishal Sharma | Daniel G. Reina | ... | Vinod Karar
  • Special Issue
  • - Volume 2021
  • - Article ID 8847099
  • - Review Article

Current Research Trends in IoT Security: A Systematic Mapping Study

Jee Young Lee | Jungwoo Lee
  • Special Issue
  • - Volume 2020
  • - Article ID 8889192
  • - Research Article

A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT

Xudong Jia | Ning Hu | ... | Xinda Cheng
  • Special Issue
  • - Volume 2020
  • - Article ID 8863385
  • - Research Article

HAL-Based Resource Manipulation Monitoring on AOSP

Thien-Phuc Doan | Jungsoo Park | Souhwan Jung
  • Special Issue
  • - Volume 2020
  • - Article ID 8878088
  • - Research Article

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Jiho Shin | Ilsun You | Jung Taek Seo
  • Special Issue
  • - Volume 2020
  • - Article ID 8885269
  • - Research Article

Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence

Vinay Arora | Rohan Singh Leekha | ... | Aman Kataria
  • Special Issue
  • - Volume 2020
  • - Article ID 8831976
  • - Research Article

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Uzair Javaid | Furqan Jameel | ... | Riku Jäntti
  • Special Issue
  • - Volume 2020
  • - Article ID 8862920
  • - Research Article

Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection

Weiping Ouyang | Chunguang Ma | ... | Keming Diao
  • Special Issue
  • - Volume 2020
  • - Article ID 8813243
  • - Research Article

Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting

Sungtae Kim | Taeyong Park | ... | Jeong Hyun Yi
  • Special Issue
  • - Volume 2020
  • - Article ID 8844116
  • - Research Article

An Intrusion Detection Scheme Based on Repeated Game in Smart Home

Rui Zhang | Hui Xia | ... | Xiang-guo Cheng
Mobile Information Systems
 Journal metrics
See full report
Acceptance rate5%
Submission to final decision187 days
Acceptance to publication137 days
CiteScore1.400
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.