Protocols, Technologies, and Infrastructures for Secure Mobile Video Communications
1Jiangxi Normal University, Nanchang, China
2University of Exeter, Exeter, UK
3Advanced Digital Sciences Center, Singapore
4Harbin Institute of Technology, Weihai, China
Protocols, Technologies, and Infrastructures for Secure Mobile Video Communications
Description
Promoted by the advance in wireless communication techniques and fast-growing demand in mobile video applications, global mobile video traffic has been rapidly increasing therefore this trend is likely to continue in the future. The latest market research predicted that with the large-scale deployment of emerging types of mobile video applications (e.g., mobile videoconferencing applications, augmented reality (AR) applications, virtual reality (VR) applications, and online video games applications), developing content in video streaming is becoming the Internet’s global trend.
However, the weakness of fundamental security in the current mobile Internet poses several critical challenges for securing mobile video applications. The current mobile Internet cannot provide general security architecture due to the security heterogeneity of wireless and mobile networks. The various protocols and technologies used for mobile video applications each have their own potential security problems. Meanwhile, the emerging network technologies, such as mobile cloud computing (MCC), mobile edge computing (MEC), and the Internet of Things (IoT), face a much broader range of security vulnerabilities. They are likely to incur new risks of mobile video communications being much more susceptible to security threats.
The aim of this Special Issue is to solicit original research articles providing a forum for researchers working on emerging protocols and technologies for securing video communications. Review articles discussing the state of the art are also welcome.
Potential topics include but are not limited to the following:
- Secure mobile VR/AR applications
- Data security for mobile video applications
- Privacy protection in 5G mobile video applications
- Security protocol and formal analysis for mobile video communications
- IoT, MEC, or Blockchain technologies for securing mobile video computing
- Security architectures for heterogeneous mobile video communications
- Trusted computing and trustworthy computing for mobile video communications
- Software vulnerability and backdoors for mobile video applications
- Orchestration of software-defined networking (SDN) or network virtualisation (NV) for securing mobile video applications