Security and Communication Networks

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs


Publishing date
19 Jan 2018
Status
Published
Submission deadline
01 Sep 2017

Lead Editor
Guest Editors

1Peking University, Beijing, China

2University of Surrey, Guildford, UK

3University of Waterloo, Ontario, Canada


User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs

Description

We are venturing into the new era of Internet of Everything (IoE) where smaller and smarter computing devices have begun to be integrated into the cyber-physical-social environments in which we are living our lives. Despite its great potential, IoE also exposes devices and their users to new security and privacy threats, such as attacks emanating from the Internet that can impact human users’ health and safety. User authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense.

However, conventional user authentication mechanisms are not capable of addressing these new challenges. Firstly, it is not possible to directly utilize many Internet-centric security solutions because of the inherent characteristics of IoE devices (e.g., their limited computational capabilities and power supply). Secondly, IoE devices may lack conventional user interfaces, such as keyboards, mice, and touch screens, so that many traditional solutions simply cannot be applied. In summary, the subjects of user authentication in IoE are compelling, yet largely underexplored, and new technologies are needed by both the industry and academia. This special issue aims to provide a venue for researchers to disseminate their recent research ideas and results about user authentication in IoE.

Potential topics include but are not limited to the following:

  • Lightweight authentication
  • Password-based authentication
  • Biometric-based authentication
  • Multifactor authentication
  • Continuous/implicit authentication
  • Authentication for fog/edge computing
  • Authentication for cloud computing
  • Anonymous authentication
  • Privacy enhancing technologies for authentication
  • New paradigms for user authentication
  • Attacks on authentication for IoE devices
  • Human aspects of authentication in IoE
  • Foundational principles for authentication
  • Evaluation metrics for authentication schemes

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 6150491
  • - Editorial

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs

Ding Wang | Shujun Li | Qi Jiang
  • Special Issue
  • - Volume 2018
  • - Article ID 1378583
  • - Research Article

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

Yanan Chen | Zhenyu Lu | ... | Weixiang Xu
  • Special Issue
  • - Volume 2018
  • - Article ID 9062675
  • - Research Article

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

Chenyu Wang | Guoai Xu | Wenting Li
  • Special Issue
  • - Volume 2018
  • - Article ID 7024842
  • - Research Article

Information Propagation Prediction Based on Key Users Authentication in Microblogging

Miao Yu | Yongzheng Zhang | ... | Yijing Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 6160125
  • - Research Article

An Alternative Method for Understanding User-Chosen Passwords

Zhixiong Zheng | Haibo Cheng | ... | Ping Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 6328504
  • - Research Article

An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks

Jiawei Tang | Anfeng Liu | ... | Tian Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 6430850
  • - Research Article

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

Qian Meng | Jianfeng Ma | ... | Tengfei Yang
  • Special Issue
  • - Volume 2017
  • - Article ID 7129505
  • - Review Article

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin | Aikaterini Mitrokotsa
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.