Wireless Communications and Mobile Computing

Rethinking Authentication on Smart Mobile Devices 2020


Publishing date
01 Dec 2020
Status
Published
Submission deadline
07 Aug 2020

Lead Editor
Guest Editors

1Nankai University, Tianjin, China

2George Mason University, Virginia, USA

3Xidian University, Xian, China


Rethinking Authentication on Smart Mobile Devices 2020

Description

Rapid advances in wireless technologies (e.g., LTE, LTE-A, WiMAX, 3G, Bluetooth, ZigBee, Z-Wave, Sigfox, LoRa, and NB-IoT) has partly contributed to the proliferation of smart mobile devices (e.g., sensors, vehicles, smart phones, and wearable devices). The amount and nature of communications and transactions on such devices require a secure and effective authentication mechanism to prevent unauthorized access from illegitimate entities (including both devices and users).

Authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense. A large number of authentication mechanisms and schemes exist for conventional systems, and may not be suitable for the smart mobile computing paradigm. Firstly, smart mobile devices generally have limited computation and storage and energy capabilities (in comparison to personal computers and laptops), and thus authentication schemes that employ expensive cryptographic primitives will not be viable. Secondly, smart mobile devices are typically small devices with a small screen, keyboard, etc., and thus existing authentication schemes may not be sufficiently user-friendly. Thirdly, smart mobile devices often deal with very sensitive applications, activities, and data (e.g., location, preferences, and physical conditions), and thus privacy demands are much more stringent than traditional authentication schemes. Consequently, it is necessary to perform a critical rethinking on authentication for smart mobile devices, and promote new methods that are both robust, easy to use, and minimize the impact on users’ primary tasks.

This Special Issue aspires to bring together contributions from researchers and practitioners working in the broad area of entity authentication. We seek high-quality articles presenting state-of-the-art authentication mechanisms, frameworks, protocols, algorithms, policies, user studies, as well as threat models for mobile computing environments.

Potential topics include but are not limited to the following:

  • Mutual authentication on smart mobile devices
  • Group authentication on smart mobile devices
  • Anonymous authentication on smart mobile devices
  • Implicit authentication on smart mobile devices
  • Evaluation metrics for authentication schemes on smart mobile devices
  • Foundational principles for authentication on smart mobile devices
  • Impact of authentication on a mobile user’s primary task
  • Surveys and comparisons of known authentication techniques for smart mobile devices
  • Existing authentication techniques applied in specific mobile applications
  • New paradigms for authentication on smart mobile devices
  • New lightweight cryptographic primitives for mobile authentication
  • New device to device authentication techniques for mobile environments
  • New user authentication techniques for mobile environments
  • Authentication for mobile cloud computing
  • Authentication for data aggregation on smart mobile devices
  • Attacks and challenges on authentication for smart mobile devices
  • Privacy enhancing technologies for authentication on smart mobile devices

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 8865158
  • - Research Article

PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home

Yandong Xia | Rongxin Qi | ... | Huaqun Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 8848032
  • - Research Article

Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre

Hongwei Luo | Feifei Wang | Guoai Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 8887472
  • - Review Article

Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

Sameh Khalfaoui | Jean Leneutre | ... | Pascal Urien
  • Special Issue
  • - Volume 2020
  • - Article ID 8899193
  • - Research Article

Determining the Image Base of Smart Device Firmware for Security Analysis

Ruijin Zhu | Baofeng Zhang | ... | Yueliang Wan
  • Special Issue
  • - Volume 2020
  • - Article ID 8856683
  • - Research Article

Study on Security and Privacy in 5G-Enabled Applications

Qin Qiu | Shenglan Liu | ... | Shengquan Yu
  • Special Issue
  • - Volume 2020
  • - Article ID 8893628
  • - Research Article

Two-Round Password-Based Authenticated Key Exchange from Lattices

Anqi Yin | Yuanbo Guo | ... | Chen Fang
  • Special Issue
  • - Volume 2020
  • - Article ID 8859213
  • - Research Article

Privacy-Preserving Graph Operations for Mobile Authentication

Peng Li | Fucai Zhou | ... | Jian Xu
  • Special Issue
  • - Volume 2020
  • - Article ID 8838363
  • - Research Article

Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”

Meijia Xu | Qiying Dong | ... | Yangyang Liu
  • Special Issue
  • - Volume 2020
  • - Article ID 8816023
  • - Research Article

From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone

Xinhong Hei | Wen Gao | ... | Wenjiang Ji
  • Special Issue
  • - Volume 2020
  • - Article ID 8850083
  • - Research Article

An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems

Yuting Li | Qingfeng Cheng | Jinzheng Cao
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision194 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.