Security and Communication Networks

Security and Privacy in Emerging Wireless Networks


Status
Published

Lead Editor

1Montana State University, Bozeman, USA

2Nanyang Technological University, Singapore

3University of Technology of Compiègne, Compiègne, France

4Telecom SudParis, Évry, France


Security and Privacy in Emerging Wireless Networks

Description

With the increased demand for ubiquitous connectivity, wireless technology has significantly impacted our personal and professional lives and will continue to do so. We predict that a myriad of new wireless technologies will be deployed in the future, including, but not limited to, cyber physical systems, IoT communications, LTE-Unlicensed networks, C-RAN (Cloud Radio Access Network), HetNets, millimeter-wave cellular networks in 5G, and mobile social network. With all these technologies being applied to our daily lives, we will become increasingly interwoven and dependent on wireless networks as we progress into the future.

Although these emerging wireless networks have attracted much research effort, the security issues of these networks have not been adequately studied. As multiple wireless technologies proliferate, so too will complications in securely accessing these networks with guaranteed privacy and protection. In summary, the subjects of security and privacy in emerging wireless networks are compelling yet largely unexploited and unexplored topics that are in need of more intense interest and research from both academia and the industry.

This special issue aims to provide a forum for researchers to publish and exchange their recent research ideas and results about the security and privacy in emerging wireless networks.

Potential topics include but are not limited to the following:

  • Jamming and antijamming techniques in cyber physical system
  • Lightweight authentication in IoT communications
  • Jamming mitigation in LTE-Unlicensed networks
  • Privacy protection in mobile social networks
  • NFC secure payment and verification
  • Privacy preserved communications in IoT systems
  • Antijamming in millimeter-wave 5G cellular networks
  • Authentications in C-RAN and HetNets
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.