Security and Communication Networks

Theory and Engineering Practice for Security and Privacy of Edge Computing 2021


Publishing date
01 May 2022
Status
Closed
Submission deadline
24 Dec 2021

Lead Editor

1Shanghai University, Shanghai, China

2Edinburgh Napier University, Edinburgh, UK

3Cleveland State University, Ohio, USA

4Hangzhou Dianzi University, Hangzhou, China

This issue is now closed for submissions.
More articles will be published in the near future.

Theory and Engineering Practice for Security and Privacy of Edge Computing 2021

This issue is now closed for submissions.
More articles will be published in the near future.

Description

With the development of the Internet of Things, increasing numbers of powerful devices are mediating our daily life. This will result in massive data generated by billions of sensors and devices. Meanwhile, the increasing demand for advanced services and applications, such as virtual reality, augmented reality, and infrastructure for smart cities has created considerable challenges in cloud computing. Edge computing has been proposed as a new computing paradigm where resources like computation and storage are placed closer to the data source. It enables a new class of latency and bandwidth-sensitive applications as data can be processed at the nearest edge. Without sending data to the cloud, edge computing, therefore, enhances security and privacy.

However, edge computing also brings new possibilities and challenges for research in the field of security and privacy, especially from the perspective of engineering, management, and practice. Edge nodes are close to the users. As a result, it can potentially receive substantial amounts of privacy-sensitive data. If the data from an edge node is leaked, the consequences can be serious. Furthermore, compared with cloud centers, edge nodes have limited resources, so they cannot support complex security mechanisms. Finally, due to the high mobility of the devices and users, the edge computing environment is always changing. Attackers can quickly join the group, and it is challenging to design security rules with multi-domain overlapping, such as device provider, data generator/user, etc.

The aim of this Special Issue is to collate original research and review articles addressing these key issues in security and privacy of edge computing.

Potential topics include but are not limited to the following:

  • New threat models and attacks in edge computing
  • Defenses and countermeasures
  • Anonymity and privacy in edge computing
  • Scalability issues and solutions
  • Task scheduling of edge computing
  • System and software security of edge nodes
  • Lightweight cryptography, protocols, and standards in edge computing
  • Trust management of edge system
  • Formal method of specification, verification and testing to edge system
  • Security and privacy management of edge system
  • Security issues due to services and application deployment
  • Security issues due to the overall architecture and cooperation
  • Novel privacy, liability, and legal issues raised by edge computing
  • Malware detection in edge application and system
  • Secure service and application design

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 4193365
  • - Research Article

Multiagent Reinforcement Learning for Task Offloading of Space/Aerial-Assisted Edge Computing

Yanlong Li | Lei Liang | ... | Junyi Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 7359134
  • - Research Article

EPPSA: Efficient Privacy-Preserving Statistical Aggregation Scheme for Edge Computing-Enhanced Wireless Sensor Networks

Yunting Tao | Fanyu Kong | ... | Qiuliang Xu
  • Special Issue
  • - Volume 2022
  • - Article ID 4943218
  • - Research Article

Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring

Tauqeer Safdar Malik | Muhammad Nasir Siddiqui | ... | Junhao Wen
  • Special Issue
  • - Volume 2022
  • - Article ID 2965081
  • - Research Article

Multinode Data Offloading for Urban Wireless Sensor Networks Based on Fog Computing: A Multiarmed Bandit Approach

Yuchen Shan | Hui Wang | Chenxiang Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 2440313
  • - Research Article

Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity

Qiong Zhang | Kewang Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 5357412
  • - Research Article

A Power Transformer Fault Prediction Method through Temporal Convolutional Network on Dissolved Gas Chromatography Data

Mengda Xing | Weilong Ding | ... | Tianpu Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 9889263
  • - Research Article

A Blockchain-Based Privacy Preservation Scheme in Mobile Medical

Haiying Wen | Meiyan Wei | ... | Xiangdong Yin
  • Special Issue
  • - Volume 2022
  • - Article ID 3086516
  • - Research Article

Healthcare Big Data Privacy Protection Model Based on Risk-Adaptive Access Control

Rong Jiang | Shanshan Han | ... | Xusheng Zhao
  • Special Issue
  • - Volume 2022
  • - Article ID 2578744
  • - Research Article

A Method of the Active and Passive Event Service Based on the Sensor Web

Lan Liu | Jingjing Fan | ... | Xuefeng Liu
  • Special Issue
  • - Volume 2022
  • - Article ID 6430612
  • - Research Article

PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing

Feng Hong | Tianming Zhang | ... | Jing Fan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate53%
Submission to final decision52 days
Acceptance to publication25 days
CiteScore3.300
Journal Citation Indicator0.430
Impact Factor1.968
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.