Security and Communication Networks

Security and Privacy for Edge-Assisted Internet of Things


Publishing date
01 Feb 2022
Status
Published
Submission deadline
17 Sep 2021

Lead Editor

1Nankai University, Tianjin, China

2Xidian University, Xi'an, China

3Monash University, Melbourne, Australia

4University of Aizu, Aizuwakamatsu, Japan


Security and Privacy for Edge-Assisted Internet of Things

Description

With the booming of embedded computing, various smart and embedded devices (e.g., smart cameras, smart electronic devices and smartwatches) have been integrated into our lives and form the Internet of Things (IoT). It is estimated that there are about 25 billion connected devices worldwide. IoT is revolutionizing the way we live, which enables us to collect information from the physical environment. Whilst operating, it can affect the physical environment. We have witnessed a dramatic increase in the application of IoT (e.g., smart homes, smart buildings, smart health and smart transportation). Cloud infrastructure has been deployed to process the fast-growing data volume in IoT.

However, cloud computing cannot support ultra-fast computing. It cannot provide the required real-time and reliable services, which are essential for mission-critical systems. Fortunately, edge computing can provide flexible and on-demand processing power, as well as provisioning of a variety of services using fifth-generation technology (5G). The large-scale nature of IoT can be effectively and efficiently supported and assisted by edge systems. This is referred to as edge-assisted IoT. Even if the coupling of edge computing and IoT bring a new level of convenience to our lives, they are much more vulnerable to many new and unknown attacks from traditional computing domains. For example, IoT often collects sensitive and private information about the physical environment. Therefore, edge-assisted IoT has become an ideal target for various security and privacy threats in the IoT ecosystems.

The aim of this Special Issue is to bring together researchers to exchange the state-of-art research results addressing the privacy and security protection issues in edge-assisted IoT. Both original research articles and review articles are solicited to explore the challenges in the field.

Potential topics include but are not limited to the following:

  • New attacks on edge-assisted IoT
  • Threat models and defensive mechanisms for edge-assisted IoT
  • Authentication techniques for edge-assisted IoT
  • Physical security for edge-assisted IoT
  • Data privacy for edge-assisted IoT
  • Data outsourcing for edge-assisted IoT
  • Secure access to outsourced data
  • Computation outsourcing for edge-assisted IoT
  • Privacy-aware location-based services
  • System and software security for edge-assisted IoT
  • Cryptographic techniques for securing edge-assisted IoT

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9796912
  • - Research Article

Deep Graph Embedding for IoT Botnet Traffic Detection

Bonan Zhang | Jingjin Li | ... | Jun Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 1242576
  • - Research Article

VNGuarder: An Internal Threat Detection Approach for Virtual Network in Cloud Computing Environment

Li Lin | Huanzeng Yang | ... | Xuhui Lv
  • Special Issue
  • - Volume 2022
  • - Article ID 4472945
  • - Research Article

Cryptanalysis of an Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks

Xiaodong Yang | Aijia Chen | ... | Caifen Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 4208066
  • - Research Article

A New Malware Detection Method Based on VMCADR in Cloud Environments

Luxin Zheng | Jian Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 9453797
  • - Research Article

Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network

Rui Zheng | Qiuyun Wang | ... | Zhengwei Jiang
  • Special Issue
  • - Volume 2022
  • - Article ID 3062541
  • - Research Article

An Efficient Outlier Detection Approach for Streaming Sensor Data Based on Neighbor Difference and Clustering

Saihua Cai | Jinfu Chen | ... | Min Lin
  • Special Issue
  • - Volume 2022
  • - Article ID 8293716
  • - Research Article

Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT

Xueli Nie | Aiqing Zhang | ... | Shui Yu
  • Special Issue
  • - Volume 2022
  • - Article ID 6731277
  • - Research Article

A Novel Trusted Software Base for Commercial Android Devices Using Secure TF Card

Yuting Zhou | Bo Zhao | Yang An
  • Special Issue
  • - Volume 2022
  • - Article ID 8995704
  • - Research Article

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems

Jinhui Liu | Yong Yu | ... | Huanguo Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 6343764
  • - Research Article

A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value

Lin Yu | Gang Xu | ... | FengQi Wei
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.