Security and Communication Networks

Security and Privacy for Edge-Assisted Internet of Things


Publishing date
01 Feb 2022
Status
Published
Submission deadline
17 Sep 2021

Lead Editor

1Nankai University, Tianjin, China

2Xidian University, Xi'an, China

3Monash University, Melbourne, Australia

4University of Aizu, Aizuwakamatsu, Japan


Security and Privacy for Edge-Assisted Internet of Things

Description

With the booming of embedded computing, various smart and embedded devices (e.g., smart cameras, smart electronic devices and smartwatches) have been integrated into our lives and form the Internet of Things (IoT). It is estimated that there are about 25 billion connected devices worldwide. IoT is revolutionizing the way we live, which enables us to collect information from the physical environment. Whilst operating, it can affect the physical environment. We have witnessed a dramatic increase in the application of IoT (e.g., smart homes, smart buildings, smart health and smart transportation). Cloud infrastructure has been deployed to process the fast-growing data volume in IoT.

However, cloud computing cannot support ultra-fast computing. It cannot provide the required real-time and reliable services, which are essential for mission-critical systems. Fortunately, edge computing can provide flexible and on-demand processing power, as well as provisioning of a variety of services using fifth-generation technology (5G). The large-scale nature of IoT can be effectively and efficiently supported and assisted by edge systems. This is referred to as edge-assisted IoT. Even if the coupling of edge computing and IoT bring a new level of convenience to our lives, they are much more vulnerable to many new and unknown attacks from traditional computing domains. For example, IoT often collects sensitive and private information about the physical environment. Therefore, edge-assisted IoT has become an ideal target for various security and privacy threats in the IoT ecosystems.

The aim of this Special Issue is to bring together researchers to exchange the state-of-art research results addressing the privacy and security protection issues in edge-assisted IoT. Both original research articles and review articles are solicited to explore the challenges in the field.

Potential topics include but are not limited to the following:

  • New attacks on edge-assisted IoT
  • Threat models and defensive mechanisms for edge-assisted IoT
  • Authentication techniques for edge-assisted IoT
  • Physical security for edge-assisted IoT
  • Data privacy for edge-assisted IoT
  • Data outsourcing for edge-assisted IoT
  • Secure access to outsourced data
  • Computation outsourcing for edge-assisted IoT
  • Privacy-aware location-based services
  • System and software security for edge-assisted IoT
  • Cryptographic techniques for securing edge-assisted IoT

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 1615117
  • - Research Article

Publicly Verifiable M + 1st-Price Auction Fit for IoT with Minimum Storage

Po-Chu Hsu | Atsuko Miyaji
  • Special Issue
  • - Volume 2021
  • - Article ID 2949513
  • - Research Article

A Commitment Scheme with Output Locality-3 Fit for the IoT Device

Hideaki Miyaji | Yuntao Wang | ... | Atsuko Miyaji
  • Special Issue
  • - Volume 2021
  • - Article ID 2914192
  • - Research Article

NSGA-II-Based Granularity-Adaptive Control-Flow Attestation

Jing Zhan | Yongzhen Li | ... | Li Lin
  • Special Issue
  • - Volume 2021
  • - Article ID 4132597
  • - Research Article

A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures

Yang Ba | Xuexian Hu | ... | Xincheng Yan
  • Special Issue
  • - Volume 2021
  • - Article ID 5448370
  • - Research Article

An Improved Coercion-Resistant E-Voting Scheme

Yuanjing Hao | Zhixin Zeng | Liang Chang
  • Special Issue
  • - Volume 2021
  • - Article ID 9361348
  • - Research Article

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things

Dapeng Man | Fanyi Zeng | ... | Yijing Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 8937448
  • - Research Article

IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet

Shinya Haga | Kazumasa Omote
  • Special Issue
  • - Volume 2021
  • - Article ID 9174630
  • - Research Article

Multi-Authority Criteria-Based Encryption Scheme for IoT

Jianguo Sun | Yang Yang | ... | Yuqing Qiao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.