Secure Computation on 4G/5G Enabled Internet-of-ThingsView this Special Issue
Editorial | Open Access
Karl Andersson, Ilsun You, Rahim Rahmani, Vishal Sharma, "Secure Computation on 4G/5G Enabled Internet-of-Things", Wireless Communications and Mobile Computing, vol. 2019, Article ID 3978193, 1 page, 2019. https://doi.org/10.1155/2019/3978193
Secure Computation on 4G/5G Enabled Internet-of-Things
The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.
Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.
The scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making computing secure on 4G/5G enabled Internet-of-Things. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in 5G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data.
Conflicts of Interest
The editors declare that they have no conflicts of interest regarding the publication of this special issue.
As always, we appreciate the high quality submissions from authors and the support of the community of reviewers.
Copyright © 2019 Karl Andersson et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.