Security and Communication Networks

Cyberspace Security for Future Internet


Status
Published

Lead Editor

1Hunan University, Changsha, China

2Guangzhou University, Guangzhou, China

3Stony Brook University, Stony Brook, USA

4Chinese Academy of Sciences, Beijing, China

5New York Institute of Technology, New York, USA


Cyberspace Security for Future Internet

Description

Cyberspace has become the most popular environment for information exchange for almost all aspects (i.e., private communication and financial activities) of our daily lives. Its security suffers from ever-increasing challenges with the rapid development of the Internet, especially in emerging application scenarios and novel Internet architectures, which are the most two important factors in driving the Internet to its next stages in near future.

Due to the fast advance of mobile technologies (e.g., mobile devices and mobile and wireless communication), mobile Internet has become the most popular application scenario, which is threated greatly by attacks (i.e., privacy data leaking and financial charges) and thus poses strong demands on security protection. On the other hand, to address architectural issues in legacy TCP/IP, some emerging Internet architectures have been proposed, such as Software Defined Networking (SDN)/Network Function Virtualization (NFV) and Named Data Networking (NDN), where security issues are still crucial but very different from that in legacy TCP/IP. For example, in SDN, the logically centralized controller may become the bottleneck of security protection, while in NDN, the consumer-driven and data-centralized communication model calls for carefully designed trust schemes to protect data integrity, to deal with access control, and to perform user authentication, to name only a few.

The purpose of this special issue is to collect and publish original, high-quality research papers as well as comprehensive reviews on hot topics in cyberspace security, especially toward mobile Internet and future Internet architectures. Original, high-quality contributions that are not published yet or that are not under review by other journals and peer-reviewed conferences are highly sought.

Potential topics include but are not limited to the following:

  • Trust models, security mechanisms for NDN
  • Security issues and solutions in SDN
  • Security function chaining and transition in NFV
  • High performance packet filtering in SDN/NDN
  • Security and privacy issues in mobile Internet
  • Wireless communication security in mobile Internet
  • Network traffic analysis in mobile Internet

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 5313980
  • - Editorial

Cyberspace Security for Future Internet

Dafang Zhang | Guojun Wang | ... | Wenjia Li
  • Special Issue
  • - Volume 2018
  • - Article ID 7352030
  • - Research Article

Session Fingerprinting in Android via Web-to-App Intercommunication

Efthimios Alepis | Constantinos Patsakis
  • Special Issue
  • - Volume 2018
  • - Article ID 1816462
  • - Research Article

Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks

Ali El Ksimi | Cherkaoui Leghris
  • Special Issue
  • - Volume 2018
  • - Article ID 6476315
  • - Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Yang Xu | Wuqiang Gao | ... | Yaoxue Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 7064131
  • - Research Article

Demadroid: Object Reference Graph-Based Malware Detection in Android

Huanran Wang | Hui He | Weizhe Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 7202806
  • - Research Article

BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

Songjie Wei | Shuai Li | ... | Meilin Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 4724815
  • - Research Article

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme

Lu Ou | Hui Yin | ... | Yupeng Hu
  • Special Issue
  • - Volume 2018
  • - Article ID 8214619
  • - Research Article

Quantum Cryptography for the Future Internet and the Security Analysis

Tianqi Zhou | Jian Shen | ... | Jun Shen
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.