Security and Communication Networks

Covert Communication Networks in Hostile Environments


Status
Published

Lead Editor

1Gwangju Institute of Science and Technology, Gwangju, Republic of Korea

2University of Paris 13, Villetaneuse, France

3California State University, Fresno, USA


Covert Communication Networks in Hostile Environments

Description

Wireless sensors and multimedia communication devices are increasingly becoming a part of our everyday lives and societies, as a part of the growing Internet of Things. Subsequently, issues surrounding their safety and security are becoming ever more important. This is true, not only for overtly hostile environments such as for defence and national security, but also for covert commercial platforms handling private and sensitive information.

With the advent of new solid-state devices and spin-off investigations from the development of military systems, a host of new technologies have come to the fore, including sophisticated RF sensing, activating, signal processing, and communications. The ability to protect against hostile actions to sense, access, process, command, and control covert information is of utmost importance and is vital for the success of this next generation of communication systems and networks.

The aim of this special issue is to document the state of the art in the security of covert communication networks, especially in hostile environments. This includes the identification of current challenges for the field, the development of novel technologies and strategies, and discussion and exploration of future solutions. Both research and focused review articles will be considered.

Potential topics include but are not limited to the following:

  • Advanced devices and systems for covert communication systems
  • Maintaining secure communications in hostile environments
  • Intrusion detection in covert communication networks
  • Countermeasures against communication network intrusion
  • System performance modelling and simulation in hostile environments
  • Maintaining reliability and survivability for susceptible networks
  • Emerging surveillance techniques using active and passive sensing
  • Advanced networked and agile systems for hostile environments
  • Wireless sensors and multimedia, cooperation-based systems, and cognitive radio networks operating in hostile environments
  • Distributed and coherent signal processing for physical security communications
  • Emerging manned and unmanned covert applications for air, sea, land, and space

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 2731859
  • - Editorial

Covert Communication Networks in Hostile Environments

Kiseon Kim | Jalel Ben-Othman | Prem Mahalik
  • Special Issue
  • - Volume 2018
  • - Article ID 9185760
  • - Research Article

Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence

Jong-Hwan Lee | Jeung-Min Joo | ... | Young-Ju Park
  • Special Issue
  • - Volume 2018
  • - Article ID 5634181
  • - Research Article

A Framework for Vulnerability Detection in European Train Control Railway Communications

Irene Arsuaga | Nerea Toledo | ... | Marina Aguado
  • Special Issue
  • - Volume 2018
  • - Article ID 3580536
  • - Research Article

Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

So Ryoung Park | Ilku Nam | Sanguk Noh
  • Special Issue
  • - Volume 2018
  • - Article ID 7543212
  • - Research Article

Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks

Pham-Duy Thanh | Hiep Vu-Van | Insoo Koo
  • Special Issue
  • - Volume 2018
  • - Article ID 5150730
  • - Research Article

An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

HyunSeo Kang | YoonJe Sung | ... | SangYeong Choi
  • Special Issue
  • - Volume 2018
  • - Article ID 7963641
  • - Research Article

On the Antijamming Performance of the NR-DCSK System

Binh Van Nguyen | Hyoyoung Jung | Kiseon Kim
  • Special Issue
  • - Volume 2018
  • - Article ID 7318043
  • - Research Article

Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information

Jinsoo Park | Gangsan Kim | ... | Suil Kim
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.