Security and Communication Networks

Secure Deployment of Commercial Services in Mobile Edge Computing


Publishing date
01 Jan 2021
Status
Open
Submission deadline
14 Aug 2020

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Macquarie University, Sydney, Australia

3Brandon University, Brandon, Canada

4Norwegian University of Science & Technology, Aalesund, Norway

5Nanjing University, Nanjing, China


Secure Deployment of Commercial Services in Mobile Edge Computing


Call for papers

This Issue is now open for submissions.

Papers are published upon acceptance, regardless of the Special Issue publication date.

 Submit to this Special Issue

Description

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).

Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary in the industrial application of MEC.

This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Secure service deployment framework for commercial MEC
  • Privacy-aware service offloading in commercial MEC
  • Pricing model design for MEC
  • Secure service migration across ESs in commercial MEC
  • Secure service selection for commercial MEC
  • Secure service composition for commercial MEC
  • Secure service recommendation for commercial MEC
  • Attack analysis for commercial MEC
  • Protocols and architecture design for commercial MEC
  • Applications for securing commercial services in MEC
Security and Communication Networks
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.