Security and Communication Networks

Security and Privacy Challenges in Internet of Things and Mobile Edge Computing 2021


Publishing date
01 Sep 2022
Status
Published
Submission deadline
29 Apr 2022

Lead Editor

1Fujian Normal University, Fuzhou, China

2Nanjing University of Posts and Telecommunications, Najing, China

3Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Coll Comp Sci & Technol, Guiyang, Guizhou, Peoples R China, Guiyang, China

4University of North Texas, Denton, USA


Security and Privacy Challenges in Internet of Things and Mobile Edge Computing 2021

Description

In the era of Internet of Things (IoT), a large number of physical objects embedded with sensors and electronic devices exchange information through heterogeneous networks in various applications such as smart cities, electronic medical treatment and autonomous driving. The perception paradigm of Internet of everything has greatly changed our life bringing opportunities and challenges. Hundreds of millions of sensory devices continuously generate contextual data and exchange real-time analysis and decisions. Traditional cloud computing based on centralized storage is incapable of meeting the requirements of data-intensive services. Mobile edge computing (MEC) has been accepted as an effective solution to support data-driven services and local IoT applications, offloading computing, storage, and network resources from the cloud to the edge of the network.

Despite the advantages of MEC, such as high bandwidth, low latency, high efficiency, and scalability, it faces severe challenges in data security and privacy protection. IoT devices upload data to edge nodes in exchange for services, such as training models. Direct data uploads may jeopardize users' privacy, and malicious data tampering can mislead service decisions and even endanger the security of public services. Therefore, before upload, data needs to be protected using reliable security measures, such as homomorphic encryption, secure multiparty computing, differential privacy, and other encryption tools. Neural network is a widely used intelligent analysis tool. How to accurately and efficiently realize neural network reasoning and training over ciphertext is a critical challenge.

The aim of this Special Issue is to solicit original research articles highlighting the recent developments on security and privacy solutions for IoT and MEC. Review articles discussing the state of the art are also welcome.

Potential topics include but are not limited to the following:

Potential topics include but are not limited to the following:

  • Efficient data encryption scheme for IoT and MEC
  • Secure heterogeneous data aggregation and fusion scheme for IoT and MEC
  • Secure data deduplication scheme for IoT and MEC
  • Practical application of generating counter samples for IoT and MEC
  • Secure data sharing and forwarding framework for IoT devices
  • Secure and efficient client-to-edge collaborative computing for IoT and MEC
  • Lightweight secure computing protocol design and formalize security analysis
  • Privacy-preserving neural network reasoning of IoT and MEC
  • Privacy-preserving deep learning training of IoT and MEC
  • Secure, verifiable, personalized service scheme for IoT and MEC
  • New comprehensive evaluation system for IoT and MEC
  • Programmable security framework for privacy-preserving computing
  • Reasonable communication and computing resource allocation strategies
  • Attack and defense in neural network for IoT and MEC
  • Future privacy challenges and solutions in IoT and MEC
  • Federated learning and applications in IoT and MEC
  • Block chain and applications in IoT and MEC

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 6754744
  • - Research Article

Privacy-Preserving Task Distribution Mechanism with Cloud-Edge IoT for the Mobile Crowdsensing

Liquan Jiang | Zhiguang Qin
  • Special Issue
  • - Volume 2022
  • - Article ID 9638683
  • - Research Article

Cross-Modal Discrimination Hashing Retrieval Using Variable Length

Chao He | Dalin Wang | ... | Nina Dai
  • Special Issue
  • - Volume 2022
  • - Article ID 8951961
  • - Review Article

Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions

Subrato Bharati | Prajoy Podder
  • Special Issue
  • - Volume 2022
  • - Article ID 3810670
  • - Research Article

Edge Computing Server Placement Strategy Based on SPEA2 in Power Internet of Things

Yongling Lu | Zhen Wang | ... | Xueqiong Zhu
  • Special Issue
  • - Volume 2022
  • - Article ID 3572404
  • - Research Article

Matching Cybersecurity Ontologies on Internet of Everything through Coevolutionary Multiobjective Evolutionary Algorithm

Xingsi Xue | Wenbin Tan
  • Special Issue
  • - Volume 2022
  • - Article ID 4126494
  • - Research Article

QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers

Dapeng Wu | Ruixin Xu | ... | Vladimir Badenko
  • Special Issue
  • - Volume 2022
  • - Article ID 2427155
  • - Research Article

Entity Relationship Modeling for IoT Data Fusion Driven by Dynamic Detecting Probe

Ye Tao | Shuaitong Guo | ... | Dianhui Chu
  • Special Issue
  • - Volume 2022
  • - Article ID 2206917
  • - Research Article

MSAAM: A Multiscale Adaptive Attention Module for IoT Malware Detection and Family Classification

Changguang Wang | Ziqiu Zhao | ... | Qingru Li
  • Special Issue
  • - Volume 2022
  • - Article ID 7125491
  • - Research Article

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems

Yuqian Ma | Yongliu Ma | Qingfeng Cheng
  • Special Issue
  • - Volume 2022
  • - Article ID 6800216
  • - Research Article

Improved Public Auditing System of Cloud Storage Based on BLS Signature

Ruifeng Li | Haibin Yang | ... | Ke Niu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.