Security and Privacy in Emerging Wireless Networks
1Montana State University, Bozeman, USA
2Nanyang Technological University, Singapore
3University of Technology of Compiègne, Compiègne, France
4Telecom SudParis, Évry, France
Security and Privacy in Emerging Wireless Networks
Description
With the increased demand for ubiquitous connectivity, wireless technology has significantly impacted our personal and professional lives and will continue to do so. We predict that a myriad of new wireless technologies will be deployed in the future, including, but not limited to, cyber physical systems, IoT communications, LTE-Unlicensed networks, C-RAN (Cloud Radio Access Network), HetNets, millimeter-wave cellular networks in 5G, and mobile social network. With all these technologies being applied to our daily lives, we will become increasingly interwoven and dependent on wireless networks as we progress into the future.
Although these emerging wireless networks have attracted much research effort, the security issues of these networks have not been adequately studied. As multiple wireless technologies proliferate, so too will complications in securely accessing these networks with guaranteed privacy and protection. In summary, the subjects of security and privacy in emerging wireless networks are compelling yet largely unexploited and unexplored topics that are in need of more intense interest and research from both academia and the industry.
This special issue aims to provide a forum for researchers to publish and exchange their recent research ideas and results about the security and privacy in emerging wireless networks.
Potential topics include but are not limited to the following:
- Jamming and antijamming techniques in cyber physical system
- Lightweight authentication in IoT communications
- Jamming mitigation in LTE-Unlicensed networks
- Privacy protection in mobile social networks
- NFC secure payment and verification
- Privacy preserved communications in IoT systems
- Antijamming in millimeter-wave 5G cellular networks
- Authentications in C-RAN and HetNets