Security and Communication Networks

Security, Privacy, and Trust for Cyberphysical-Social Systems

Publishing date
01 Sep 2018
Submission deadline
27 Apr 2018

1St. Francis Xavier University, Antigonish, Canada

2Huazhong University of Science and Technology, Wuhan, China

3University of Murcia, Murcia, Spain

4University of Wollongong, Wollongong, Australia

Security, Privacy, and Trust for Cyberphysical-Social Systems


With the increasing development of informational, communication, and computer technologies, integrating the cyber world and physical world together, cyberphysical systems (CPS), also referred to as the Internet of Things (IoT), have attracted increasing attention from academia and industry. As the extension of the CPS/IoT, cyberphysical-social systems (CPSS) include the cyber world, physical world, and social world and their integrations such as the CPS/IoT (the integration of the cyber world and physical world), the social computing (the integration of the cyber world and the social world), and even the integration of all three worlds. The cyber space mainly contains discrete and logical data such as the computation, communication, and control information, which are in the form of “0” and “1.” The physical space is the natural and human-made space, governed by physical laws, and operates in continuous time. The social space consists of human and social relationships, the aim of which is to describe the thoughts, action, mind, sense, interaction, and communication of human beings.

The ultimate goal of CPSS is to provide proactive and personal services for humans. Accordingly, one of the most important concerns of CPSS is to protect sensitive or private data, guarantee user privacy, and ensure the system’s trustworthiness. CPSS security, privacy, and trust, as a new research and development field, require further development and advances in the corresponding models and methodologies for effective connections among physical, cyber, and social worlds.

This special issue will specifically focus on the most recent progress of researches on security, privacy, and trust problems of CPSS. Readers can learn and understand a broad range of topics and specialties in security, privacy, and trust over cyberphysical-social systems (CPSS), from fundamentals and theories to practical aspects. For example, CPSS data security cares about three security elements (confidentiality, integrity, and authenticity) of data while CPSS system security further cares about the secure and trustworthy connections among three spaces involving one or two components of cyberphysical-social systems. This means we focus not only on data security and user privacy, but also on secure computations and communications, as well as on system and hardware trust.

Potential topics include but are not limited to the following:

  • Preserving privacy
  • Efficient cryptography for smart devices
  • Authentication for IoT users
  • Secure CPSS communications
  • Securing CPSS data
  • Intelligent security
  • Key management in heterogeneous systems
  • Accountability
  • Anonymity
  • Resilient CPSS architecture
  • Physical security
  • Trust management
  • Audit and provenance management
  • Security protection in edge computing
  • Privacy and privacy-preserving technical solutions for smart cities
  • Security protection in big data processing
  • Security protection in CPSS service
  • Security protection in data mining


  • Special Issue
  • - Volume 2019
  • - Article ID 2964673
  • - Editorial

Security, Privacy, and Trust for Cyberphysical-Social Systems

Laurence T. Yang | Wei Wang | ... | Willy Susilo
  • Special Issue
  • - Volume 2018
  • - Article ID 6909703
  • - Research Article

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things

Youwen Zhu | Yue Zhang | ... | Xianmin Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 3130652
  • - Research Article

Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS

Weizhong Qiang | Shizhen Wang | ... | Jiangying Zhong
  • Special Issue
  • - Volume 2018
  • - Article ID 8932325
  • - Research Article

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption

Qinlong Huang | Yue He | ... | Yixian Yang
  • Special Issue
  • - Volume 2018
  • - Article ID 5087065
  • - Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Carlos Andres Lara-Nino | Arturo Diaz-Perez | Miguel Morales-Sandoval
  • Special Issue
  • - Volume 2018
  • - Article ID 5625860
  • - Research Article

HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection

Javier Hingant | Marcelo Zambrano | ... | Manuel Esteve
  • Special Issue
  • - Volume 2018
  • - Article ID 7817614
  • - Research Article

Blockchain Based Credibility Verification Method for IoT Entities

Chao Qu | Ming Tao | ... | Ruifen Yuan
  • Special Issue
  • - Volume 2018
  • - Article ID 9148768
  • - Research Article

GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services

Zhuo Ma | Jiuxin Cao | ... | Yuntao Yang
  • Special Issue
  • - Volume 2018
  • - Article ID 3680851
  • - Research Article

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things

Chen Wang | Jian Shen | ... | Tong Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate53%
Submission to final decision52 days
Acceptance to publication25 days
Journal Citation Indicator0.430
Impact Factor1.968

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.