Security and Communication Networks

Secure Deployment of Commercial Services in Mobile Edge Computing 2021


Publishing date
01 Mar 2022
Status
Published
Submission deadline
05 Nov 2021

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Macquarie University, Sydney, Australia

3Brandon University, Brandon, Canada

4Norwegian University of Science & Technology, Aalesund, Norway

5Nanjing University, Nanjing, China


Secure Deployment of Commercial Services in Mobile Edge Computing 2021

Description

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).

Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary for the industrial application of MEC.

This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Secure service deployment framework for commercial MEC
  • Privacy-aware service offloading in commercial MEC
  • Pricing model design for MEC
  • Secure service migration across ESs in commercial MEC
  • Secure service selection for commercial MEC
  • Secure service composition for commercial MEC
  • Secure service recommendation for commercial MEC
  • Attack analysis for commercial MEC
  • Protocols and architecture design for commercial MEC
  • Applications for securing commercial services in MEC
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.