Security and Communication Networks

Protocols, Technologies, and Infrastructures for Secure Mobile Video Communications

Publishing date
01 Jan 2022
Submission deadline
20 Aug 2021

Lead Editor
Guest Editors

1Jiangxi Normal University, Nanchang, China

2University of Exeter, Exeter, UK

3Advanced Digital Sciences Center, Singapore

4Harbin Institute of Technology, Weihai, China

Protocols, Technologies, and Infrastructures for Secure Mobile Video Communications


Promoted by the advance in wireless communication techniques and fast-growing demand in mobile video applications, global mobile video traffic has been rapidly increasing therefore this trend is likely to continue in the future. The latest market research predicted that with the large-scale deployment of emerging types of mobile video applications (e.g., mobile videoconferencing applications, augmented reality (AR) applications, virtual reality (VR) applications, and online video games applications), developing content in video streaming is becoming the Internet’s global trend.

However, the weakness of fundamental security in the current mobile Internet poses several critical challenges for securing mobile video applications. The current mobile Internet cannot provide general security architecture due to the security heterogeneity of wireless and mobile networks. The various protocols and technologies used for mobile video applications each have their own potential security problems. Meanwhile, the emerging network technologies, such as mobile cloud computing (MCC), mobile edge computing (MEC), and the Internet of Things (IoT), face a much broader range of security vulnerabilities. They are likely to incur new risks of mobile video communications being much more susceptible to security threats.

The aim of this Special Issue is to solicit original research articles providing a forum for researchers working on emerging protocols and technologies for securing video communications. Review articles discussing the state of the art are also welcome.

Potential topics include but are not limited to the following:

  • Secure mobile VR/AR applications
  • Data security for mobile video applications
  • Privacy protection in 5G mobile video applications
  • Security protocol and formal analysis for mobile video communications
  • IoT, MEC, or Blockchain technologies for securing mobile video computing
  • Security architectures for heterogeneous mobile video communications
  • Trusted computing and trustworthy computing for mobile video communications
  • Software vulnerability and backdoors for mobile video applications
  • Orchestration of software-defined networking (SDN) or network virtualisation (NV) for securing mobile video applications


  • Special Issue
  • - Volume 2022
  • - Article ID 4349097
  • - Research Article

Blockchain-Enabled Joint Resource Allocation for Virtualized Video Service Functions

Ping Yu | Hongwei Zhao | ... | Hui Yan
  • Special Issue
  • - Volume 2021
  • - Article ID 1444182
  • - Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Zibo Wang | Yaofang Zhang | ... | Bailing Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9082570
  • - Research Article

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks

Zhiming Zhang | Yu Yang | ... | Xiaoyong Xiong
  • Special Issue
  • - Volume 2021
  • - Article ID 4539540
  • - Research Article

On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication

Jianming Zhao | Peng Zeng | ... | Tianyu Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9942632
  • - Research Article

V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks

Xiaodong Zhang | Ru Li | ... | Hui Zhao
  • Special Issue
  • - Volume 2021
  • - Article ID 6630717
  • - Research Article

Stochastic Adaptive Forwarding Strategy Based on Deep Reinforcement Learning for Secure Mobile Video Communications in NDN

Bowei Hao | Guoyong Wang | ... | Qingtao Wu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.