Security and Communication Networks

Cyberspace Security for Future Internet


Status
Published

Lead Editor

1Hunan University, Changsha, China

2Guangzhou University, Guangzhou, China

3Stony Brook University, Stony Brook, USA

4Chinese Academy of Sciences, Beijing, China

5New York Institute of Technology, New York, USA


Cyberspace Security for Future Internet

Description

Cyberspace has become the most popular environment for information exchange for almost all aspects (i.e., private communication and financial activities) of our daily lives. Its security suffers from ever-increasing challenges with the rapid development of the Internet, especially in emerging application scenarios and novel Internet architectures, which are the most two important factors in driving the Internet to its next stages in near future.

Due to the fast advance of mobile technologies (e.g., mobile devices and mobile and wireless communication), mobile Internet has become the most popular application scenario, which is threated greatly by attacks (i.e., privacy data leaking and financial charges) and thus poses strong demands on security protection. On the other hand, to address architectural issues in legacy TCP/IP, some emerging Internet architectures have been proposed, such as Software Defined Networking (SDN)/Network Function Virtualization (NFV) and Named Data Networking (NDN), where security issues are still crucial but very different from that in legacy TCP/IP. For example, in SDN, the logically centralized controller may become the bottleneck of security protection, while in NDN, the consumer-driven and data-centralized communication model calls for carefully designed trust schemes to protect data integrity, to deal with access control, and to perform user authentication, to name only a few.

The purpose of this special issue is to collect and publish original, high-quality research papers as well as comprehensive reviews on hot topics in cyberspace security, especially toward mobile Internet and future Internet architectures. Original, high-quality contributions that are not published yet or that are not under review by other journals and peer-reviewed conferences are highly sought.

Potential topics include but are not limited to the following:

  • Trust models, security mechanisms for NDN
  • Security issues and solutions in SDN
  • Security function chaining and transition in NFV
  • High performance packet filtering in SDN/NDN
  • Security and privacy issues in mobile Internet
  • Wireless communication security in mobile Internet
  • Network traffic analysis in mobile Internet

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 5313980
  • - Editorial

Cyberspace Security for Future Internet

Dafang Zhang | Guojun Wang | ... | Wenjia Li
  • Special Issue
  • - Volume 2018
  • - Article ID 7352030
  • - Research Article

Session Fingerprinting in Android via Web-to-App Intercommunication

Efthimios Alepis | Constantinos Patsakis
  • Special Issue
  • - Volume 2018
  • - Article ID 1816462
  • - Research Article

Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks

Ali El Ksimi | Cherkaoui Leghris
  • Special Issue
  • - Volume 2018
  • - Article ID 6476315
  • - Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Yang Xu | Wuqiang Gao | ... | Yaoxue Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 7064131
  • - Research Article

Demadroid: Object Reference Graph-Based Malware Detection in Android

Huanran Wang | Hui He | Weizhe Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 7202806
  • - Research Article

BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

Songjie Wei | Shuai Li | ... | Meilin Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 4724815
  • - Research Article

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme

Lu Ou | Hui Yin | ... | Yupeng Hu
  • Special Issue
  • - Volume 2018
  • - Article ID 8214619
  • - Research Article

Quantum Cryptography for the Future Internet and the Security Analysis

Tianqi Zhou | Jian Shen | ... | Jun Shen
Security and Communication Networks
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore1.810
Impact Factor1.376
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.