Security and Communication Networks

Semantic Technologies for Security and Communication Networks


Publishing date
01 Jun 2022
Status
Published
Submission deadline
28 Jan 2022

Lead Editor

1Fujian University of Technology, Fuzhou, China

2Chaoyang University of Technology, Taichung, Taiwan

3Guilin University of Electronic Technology, Guilin, China

4Swinburne University of Technology, Swinburne, Australia


Semantic Technologies for Security and Communication Networks

Description

Currently, the Internet of Things (IoT) is in a premature phase. Although it is growing at a steady pace, there is still a need for further research in the field of security. Attacks on low-performance devices, the application of new technologies, and data analysis to infer private data, lack of development in some aspects of security offer a wide field for improvement. The advent of semantic technologies for IoT offers a new set of possibilities. However, this comes with challenges in data markets, aggregators, processors, and search engines, which raise the need for security. New regulations also call for novel approaches on data security, covering personal data, and a way of describing different data security traits involved in data access from an IoT system perspective.

Many security ontologies, such as defense against money laundering (DAML), STAC (Security Toolbox: Attack & Countermeasure), IoT security (IoTSec), IoT Context-Based Security Evaluation (IoTSecEv), and IoT Privacy (IoT-Priv), have already been developed in different contexts. They have been selected due to some interest in applying these security ontologies in certain domains directly or indirectly based on IoT. However, it is still a challenge to describe the data security aspects that affect IoT systems. The foundation of this problem might be a rich set of use cases from which very specific data security description needs stemmed. More precisely, there is a need for further research in the field to provide some techniques addressing the following issues: (1) how to construct security ontology for meeting the requirements of exchanging data security in different application scenarios; (2) how to represent the data security aspects of data in search engines; (3) how to express data-security requirements to information providers.

The aim of this Special Issue is to bring together original research and review articles on semantic technology and security within IoT. This Special Issue explores recent advancements in semantic techniques (e.g., ontology, ontology matching technique, semantic web reasoning language (SWRL), etc). We particularly welcome submissions discussing information security knowledge-sharing models. Moreover, submissions including an effective way of performing filtering and ranking based on security traits of the data source are welcome. In addition, research discussing how to retrieve information from the source is also welcome. Finally, this Special Issue welcomes research discussing how to integrate the heterogeneous security ontologies among different platforms and any third parties to ease the access and handling of data.

Potential topics include but are not limited to the following:

  • Construction of data-driven information security ontology in IoT
  • Semantic enquiry technique on data markets and search engines in IoT
  • Information security ontology matching technique in IoT and linked data cloud
  • Semantic security data annotation and integration in IoT
  • Artificial intelligence-enabled security in IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 6040463
  • - Research Article

[Retracted] Noise-Tolerant Zeroing Neural Dynamics for Solving Hybrid Multilayered Time-Varying Linear Equation System

Jian Li | Yang Shi | ... | Mohammed Aquil Mirza
  • Special Issue
  • - Volume 2022
  • - Article ID 5184453
  • - Research Article

[Retracted] Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks

Xiaoli Wang | Bharadwaj Veeravalli | ... | Zhihao Tong
  • Special Issue
  • - Volume 2022
  • - Article ID 1444676
  • - Research Article

[Retracted] Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System

Yanqi Zhou | Erfu Wang | ... | Mengna Shi
  • Special Issue
  • - Volume 2022
  • - Article ID 9339515
  • - Research Article

[Retracted] Fault-Tolerant Secure Routing Based on Trust Evaluation Model in Data Center Networks

Ningning Liu | Weibei Fan | ... | Hui Zheng
  • Special Issue
  • - Volume 2022
  • - Article ID 7942353
  • - Research Article

[Retracted] A New Key Exchange Protocol Based on Infinite Non-Abelian Groups

Jing Zhang | Ya-Juan Yang | Yi-Peng Li
  • Special Issue
  • - Volume 2022
  • - Article ID 8052594
  • - Research Article

[Retracted] AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy

Zhuo Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 1939796
  • - Research Article

[Retracted] AI-Based Secure Construction of University Information Services Platform

Zongjun Wang | Xingdong Du | Lei Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 4840997
  • - Research Article

[Retracted] Rumor Detection with Bidirectional Graph Attention Networks

Xiaohui Yang | Hailong Ma | Miao Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 6723914
  • - Research Article

[Retracted] Fault-Tolerant Secure Routing of BHn-Based Data Center Networks

Xinxin Zhang | Li Xu | Aihua Li
  • Special Issue
  • - Volume 2021
  • - Article ID 7915670
  • - Review Article

[Retracted] Enterprise Performance Management following Big Data Analysis Technology under Multisource Information Fusion

Zhengna Qin | Haojie Liao | ... | Lei Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.