Security and Communication Networks

Security and Privacy in Ubiquitous Mobile Computing


Publishing date
01 Sep 2022
Status
Closed
Submission deadline
13 May 2022

Lead Editor
Guest Editors

1Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

2Nanyang Technological University, Singapore

3School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China

This issue is now closed for submissions.

Security and Privacy in Ubiquitous Mobile Computing

This issue is now closed for submissions.

Description

Ubiquitous mobile computing, allowing the transmission of data, voice, and video via mobile devices (such as smartphones, tablets, and laptops) without having to be connected to a fixed physical link, has profoundly changed every-day life. Statistics show that the number of mobile devices worldwide will reach 17.72 billion by 2024. The data collected from mobile terminals provides significant support for analysis in social computing, healthcare, and finance. Although the connected mobile devices have brought great convenience, they have also caused many security and privacy issues.

In ubiquitous mobile computing, the existing techniques suffer from many practical security limitations due to massive devices and data. For example, they cannot accurately collect critical data and effectively analyze security risks. As a result, many techniques are ineffective or inefficient enough, making them less user-centric. Thus, it is crucial to design innovative techniques (e.g., artificial intelligence and deep learning) to guarantee the data security. On the other hand, in ubiquitous mobile computing, a large amount of users' privacy has been exposed and suffered from more threats, such as gradient inversion attacks and attribute inference attacks. The attacker can analyze and restore the user's privacy through fragments of personal information from mobile devices, such as the user’s location, personal photos, and sensors’ data. Traditionally, one-dimensional protection mechanisms have been difficult to satisfy the complex privacy protection requirements. Therefore, it is urgent to combine various privacy protection schemes and accurately protect privacy in ubiquitous mobile computing.

This Special Issue will focus on state-of-the-art research paradigms on security and privacy aspects in ubiquitous mobile computing, particularly with advances in Internet of Things (IoTs), mobile social networking and smart cities. Moreover, in this issue, the security and privacy challenges in mobile cloud computing will be spotlighted. Original research papers and state of the art reviews will be accepted.

Potential topics include but are not limited to the following:

  • Artificial intelligence and deep learning for mobile computing
  • Social computing, financial analysis, and medical assistance in mobile computing
  • Cross-domain authentication for mobile computing devices
  • Cross-cloud access control and delegation in mobile cloud computing
  • Access control mechanism for large-scale IoT scenarios
  • Biometrics/bio-cryptography access control
  • Secure data sharing and storage for mobile computing
  • Abnormal behavior audit
  • Intrusion detection and response
  • Crowd sensing model, mechanism and systems
  • Theory and language of Privacy computing for mobile computation
  • Cryptography-based privacy-preserving methods for mobile computing
  • Game theory for privacy and accuracy, utility, and reliability for mobile computing
  • Blockchain-based privacy-preserving methods for mobile computing

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 3693748
  • - Research Article

A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

Xiangyang Wang | Chunxiang Gu | ... | Zhaoxuan Li
  • Special Issue
  • - Volume 2022
  • - Article ID 2886795
  • - Review Article

Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges

Junpeng Zhang | Hui Zhu | ... | Hui Li
  • Special Issue
  • - Volume 2022
  • - Article ID 7564678
  • - Research Article

Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning

Huijiao Wang | Jiapeng Tian | ... | Hua Jiang
  • Special Issue
  • - Volume 2022
  • - Article ID 3191761
  • - Research Article

Delay-Sensitive Task Assignment for Spatial Crowdsourcing

Yunhui Li | Liang Chang | ... | Tianlong Gu
  • Special Issue
  • - Volume 2022
  • - Article ID 7551107
  • - Research Article

All-Packets-Based Multi-Rate DDoS Attack Detection Method in ISP Layer

Xinqian Liu | Jiadong Ren | ... | Zhangqi Zheng
  • Special Issue
  • - Volume 2022
  • - Article ID 6339407
  • - Research Article

Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

Huanran Wang | Hui He | ... | Weizhe Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 2200546
  • - Research Article

An Efficient Authentication and Key Distribution Protocol for Multicast Service in Space-Ground Integration Network

Wenlong Kou | Wei You | ... | Chao Guo
  • Special Issue
  • - Volume 2022
  • - Article ID 9473246
  • - Research Article

HB+-MHT: Lightweight and Efficient Data Integrity Verification Scheme for Cloud Virtual Machines

Zhi Yang | Xiaopeng Li | ... | Fan Chao
  • Special Issue
  • - Volume 2022
  • - Article ID 3234078
  • - Research Article

Multisource Mobile Transfer Learning Algorithm Based on Dynamic Model Compression

Peng Gao | Jingmei Li | Changhong Ding
  • Special Issue
  • - Volume 2022
  • - Article ID 2554280
  • - Research Article

Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix

Zixiang Bi | Guoai Xu | ... | Sutao Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.