Wireless Communications and Mobile Computing

Recent Advances in Next Generation Cybersecurity Technologies


Publishing date
01 Aug 2021
Status
Closed
Submission deadline
26 Mar 2021

Lead Editor
Guest Editors

1Zhengzhou University, Zhengzhou, China

2University of Missouri - St. Louis, St. Louis, USA

3Chongqing University of Posts and Telecommunications, Chongqing, China

4Waseda University, Tokyo, Japan

This issue is now closed for submissions.

Recent Advances in Next Generation Cybersecurity Technologies

This issue is now closed for submissions.

Description

The rapid development of AIoT technologies brings great convenience to daily life. However, it also raises new security issues in specific scenarios such as the internet of vehicles (IoV), internet of health (IoH), etc. Against the background of the severe global cybersecurity situation, this research needs more attention.

From the perspective of attackers, threats of cybersecurity can be divided into sniffing attacks, Man-in-the-Middle (MITM) attacks, and DoS/DDoS attacks. In terms of cyberspace itself, security threats could come from the abuse of API, identity management and access control of mass equipment, rogue cloud service providers, etc. In the next generation networks, there are possibilities to solve these cybersecurity issues with advanced technologies such as Artificial Intelligence, machine learning and deep learning, cloud computing and big data analysis, blockchain, and physical layer authentication.

The aim of this Special Issue is to highlight next generation cybersecurity and explore proper and practical methods to guarantee the confidentiality, availability, and integrity of cyberspace. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Endogenous security approach for the next generation cybersecurity
  • Zero Trust Network Architecture (ZTNA) approach for the next generation cybersecurity
  • Blockchain-based key storage and management for the next generation cybersecurity
  • Digital Identity and trust model for the next generation cybersecurity
  • Access control security technologies for the next generation cybersecurity
  • AI-based authority management for the next generation cybersecurity
  • AI-based threats and intrusion detection technologies for the next generation cybersecurity
  • Cryptography-based encryption and secure transmission for the next generation cybersecurity
  • SDN/NFV based security technologies for the next generation cybersecurity
  • Situation awareness and assessment for the next generation cybersecurity
  • Data anti-tampering technologies for the next generation cybersecurity
  • Security defence/protection mechanism for the next generation cybersecurity
  • API management / Data leakage protection technologies for the next generation cybersecurity
  • Malicious information detection and identification for the next generation cybersecurity
  • Resilient security architecture for the next generation cybersecurity
  • Innovative architecture, protocols, algorithms, and models for the next generation cybersecurity

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6692568
  • - Research Article

A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment

Junsong Zhang | Qikun Zhang | ... | Yong Gan
  • Special Issue
  • - Volume 2021
  • - Article ID 5563104
  • - Research Article

Bullet Subtitle Sentiment Classification Based on Affective Computing and Ensemble Learning

Lei Yu | Yu Wu | ... | Yunkai Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 9982351
  • - Research Article

Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network

Zhangguo Tang | Junfeng Wang | ... | Junhao Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 6698311
  • - Research Article

Framework for State-Aware Virtual Hardware Fuzzing

Hang Xu | Ganyu Qin | ... | Zhiqiang Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5539790
  • - Research Article

SMSEI-SDN: A Suppression Method of Security Incident Impact for the Inter-Domain Routing System Based on Software-Defined Networking

Huihu Zhu | Han Qiu | ... | Di Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 6662175
  • - Research Article

Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks

Chien-Fu Cheng | Jerry Chun-Wei Lin | ... | Chu-Chiao Hsu
  • Special Issue
  • - Volume 2021
  • - Article ID 5566430
  • - Research Article

Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain

Fei Tang | Junjie Pang | ... | Qianhong Gong
  • Special Issue
  • - Volume 2021
  • - Article ID 5533963
  • - Research Article

Webshell Detection Based on Executable Data Characteristics of PHP Code

Zulie Pan | Yuanchao Chen | ... | Xuanzhen Guo
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.