Security and Communication Networks

Security and Privacy for Edge-Assisted Internet of Things


Publishing date
01 Feb 2022
Status
Published
Submission deadline
17 Sep 2021

Lead Editor

1Nankai University, Tianjin, China

2Xidian University, Xi'an, China

3Monash University, Melbourne, Australia

4University of Aizu, Aizuwakamatsu, Japan


Security and Privacy for Edge-Assisted Internet of Things

Description

With the booming of embedded computing, various smart and embedded devices (e.g., smart cameras, smart electronic devices and smartwatches) have been integrated into our lives and form the Internet of Things (IoT). It is estimated that there are about 25 billion connected devices worldwide. IoT is revolutionizing the way we live, which enables us to collect information from the physical environment. Whilst operating, it can affect the physical environment. We have witnessed a dramatic increase in the application of IoT (e.g., smart homes, smart buildings, smart health and smart transportation). Cloud infrastructure has been deployed to process the fast-growing data volume in IoT.

However, cloud computing cannot support ultra-fast computing. It cannot provide the required real-time and reliable services, which are essential for mission-critical systems. Fortunately, edge computing can provide flexible and on-demand processing power, as well as provisioning of a variety of services using fifth-generation technology (5G). The large-scale nature of IoT can be effectively and efficiently supported and assisted by edge systems. This is referred to as edge-assisted IoT. Even if the coupling of edge computing and IoT bring a new level of convenience to our lives, they are much more vulnerable to many new and unknown attacks from traditional computing domains. For example, IoT often collects sensitive and private information about the physical environment. Therefore, edge-assisted IoT has become an ideal target for various security and privacy threats in the IoT ecosystems.

The aim of this Special Issue is to bring together researchers to exchange the state-of-art research results addressing the privacy and security protection issues in edge-assisted IoT. Both original research articles and review articles are solicited to explore the challenges in the field.

Potential topics include but are not limited to the following:

  • New attacks on edge-assisted IoT
  • Threat models and defensive mechanisms for edge-assisted IoT
  • Authentication techniques for edge-assisted IoT
  • Physical security for edge-assisted IoT
  • Data privacy for edge-assisted IoT
  • Data outsourcing for edge-assisted IoT
  • Secure access to outsourced data
  • Computation outsourcing for edge-assisted IoT
  • Privacy-aware location-based services
  • System and software security for edge-assisted IoT
  • Cryptographic techniques for securing edge-assisted IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 6401316
  • - Research Article

Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM

Xiaoyao Liao | Changzhi Wang | Wen Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 6410478
  • - Research Article

Black-Box Adversarial Attacks against Audio Forensics Models

Yi Jiang | Dengpan Ye
  • Special Issue
  • - Volume 2022
  • - Article ID 4354086
  • - Research Article

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms

Jinbo Chao | Chunhui Zhao | Fuzhi Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 6351144
  • - Research Article

High-Capacity Robust Behavioral Steganography Method Based on Timestamp Modulation across Social Internet of Things

Mingliang Zhang | Xiangyang Luo | ... | Lingling Li
  • Special Issue
  • - Volume 2021
  • - Article ID 2314520
  • - Research Article

A Scalable Security Protocol for Intravehicular Controller Area Network

Zi-An Zhao | Yu Sun | ... | Jianwei Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 9703969
  • - Research Article

Database Padding for Dynamic Symmetric Searchable Encryption

Ruizhong Du | Yuqing Zhang | Mingyue Li
  • Special Issue
  • - Volume 2021
  • - Article ID 3159269
  • - Research Article

Outsourced Mutual Private Set Intersection Protocol for Edge-Assisted IoT

Jing Zhang | Rongxia Qin | ... | Yongli Tang
  • Special Issue
  • - Volume 2021
  • - Article ID 8296417
  • - Research Article

Gene Sequence Clustering Based on the Profile Hidden Markov Model with Differential Identifiability

Xujie Ren | Tao Shang | ... | Jianwei Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 7941233
  • - Research Article

Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud

Fan Yin | Rongxing Lu | ... | Xiaohu Tang
  • Special Issue
  • - Volume 2021
  • - Article ID 9029664
  • - Research Article

Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

Xiangyang Wang | Chunxiang Gu | ... | Siqi Lu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.