Cyberspace Security for Future Internet
1Hunan University, Changsha, China
2Guangzhou University, Guangzhou, China
3Stony Brook University, Stony Brook, USA
4Chinese Academy of Sciences, Beijing, China
5New York Institute of Technology, New York, USA
Cyberspace Security for Future Internet
Description
Cyberspace has become the most popular environment for information exchange for almost all aspects (i.e., private communication and financial activities) of our daily lives. Its security suffers from ever-increasing challenges with the rapid development of the Internet, especially in emerging application scenarios and novel Internet architectures, which are the most two important factors in driving the Internet to its next stages in near future.
Due to the fast advance of mobile technologies (e.g., mobile devices and mobile and wireless communication), mobile Internet has become the most popular application scenario, which is threated greatly by attacks (i.e., privacy data leaking and financial charges) and thus poses strong demands on security protection. On the other hand, to address architectural issues in legacy TCP/IP, some emerging Internet architectures have been proposed, such as Software Defined Networking (SDN)/Network Function Virtualization (NFV) and Named Data Networking (NDN), where security issues are still crucial but very different from that in legacy TCP/IP. For example, in SDN, the logically centralized controller may become the bottleneck of security protection, while in NDN, the consumer-driven and data-centralized communication model calls for carefully designed trust schemes to protect data integrity, to deal with access control, and to perform user authentication, to name only a few.
The purpose of this special issue is to collect and publish original, high-quality research papers as well as comprehensive reviews on hot topics in cyberspace security, especially toward mobile Internet and future Internet architectures. Original, high-quality contributions that are not published yet or that are not under review by other journals and peer-reviewed conferences are highly sought.
Potential topics include but are not limited to the following:
- Trust models, security mechanisms for NDN
- Security issues and solutions in SDN
- Security function chaining and transition in NFV
- High performance packet filtering in SDN/NDN
- Security and privacy issues in mobile Internet
- Wireless communication security in mobile Internet
- Network traffic analysis in mobile Internet