Wireless Communications and Mobile Computing

Rethinking Authentication on Smart Mobile Devices


Status
Published

Lead Editor

1Peking University, Beijing, China

2Nanjing University of Information Science & Technology, Nanjing, China

3Monash University, Melbourne, Australia

4The University of Texas at San Antonio, Texas, USA


Rethinking Authentication on Smart Mobile Devices

Description

Rapid advances in wireless technologies (e.g., LTE, LTE-A, WiMAX, 3G, Bluetooth, ZigBee, Z-Wave, and LoRaWAN) have partly contributed to the proliferation of smart mobile devices (e.g., sensors, vehicles, smart phones, and wearable devices). The amount and nature of communications and transactions on such devices require a secure and effective authentication mechanism to prevent unauthorized access from illegitimate entities (including both devices and users).

Authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense. A large number of authentication mechanisms and schemes exist for conventional systems and may not be suitable for smart mobile computing paradigm. Firstly, smart mobile devices generally have limited computation and storage and energy capabilities (in comparison to personal computers and laptops), and thus authentication schemes that employ expensive cryptographic primitives will not be viable. Secondly, smart mobile devices are typically small devices with a small screen, keyboard, and so forth, and thus existing authentication schemes may not be sufficiently user-friendly. Thirdly, smart mobile devices often deal with very sensitive applications, activities, and data (e.g., location, preferences, and physical condition), and thus privacy demands are much more stringent than traditional authentication schemes. Consequently, it is necessary to perform a critical rethinking on authentication for smart mobile devices and promote new methods that are both robust and easy to use and minimize impact on the user's primary task.

This special issue aspires to bring together contributions from researchers and practitioners working in the broad area of entity authentication. We seek high-quality articles presenting state-of-the-art authentication mechanisms, frameworks, protocols, algorithms, policies, user studies, and threat models for mobile computing environments.

Potential topics include but are not limited to the following:

  • Mutual authentication on smart mobile devices
  • Group authentication on smart mobile devices
  • Anonymous authentication on smart mobile devices
  • Implicit authentication on smart mobile devices
  • Evaluation metrics for authentication schemes on smart mobile devices
  • Foundational principles for authentication on smart mobile devices
  • Impact of authentication on a mobile user’s primary task
  • Surveys and comparisons of known authentication techniques for smart mobile devices
  • Existing authentication techniques applied in specific mobile applications
  • New paradigms for authentication on smart mobile devices
  • New lightweight cryptographic primitives for mobile authentication
  • New device to device authentication techniques for mobile environments
  • New user authentication techniques for mobile environments
  • Authentication for mobile cloud computing
  • Authentication for data aggregation on smart mobile devices
  • Attacks and challenges on authentication for smart mobile devices
  • Privacy enhancing technologies for authentication on smart mobile devices

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 7079037
  • - Editorial

Rethinking Authentication on Smart Mobile Devices

Ding Wang | Jian Shen | ... | Kim-Kwang Raymond Choo
  • Special Issue
  • - Volume 2018
  • - Article ID 1847890
  • - Research Article

The Research of Mobile Location Privacy Protection Access Control Method Based on Game Theory

Lijuan Zheng | Linhao Zhang | ... | Shepard Musasike
  • Special Issue
  • - Volume 2018
  • - Article ID 5823439
  • - Research Article

A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices

Xiang Yu | Zhihong Tian | ... | Feng Jiang
  • Special Issue
  • - Volume 2018
  • - Article ID 3048697
  • - Research Article

An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment

Chenyu Wang | Ke Ding | ... | Ping Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 1875489
  • - Research Article

Efficient Message Authentication Scheme with Conditional Privacy-Preserving and Signature Aggregation for Vehicular Cloud Network

Yong Xie | Fang Xu | ... | Yu Nie
  • Special Issue
  • - Volume 2018
  • - Article ID 3284324
  • - Research Article

A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers

Hua Guo | Chen Chen | ... | Jiongchao Jin
  • Special Issue
  • - Volume 2018
  • - Article ID 9149730
  • - Research Article

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing

Ziyi Han | Li Yang | ... | Qiang Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 5973285
  • - Research Article

Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography

Zengpeng Li | Can Xiang | Chengyu Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 8131367
  • - Research Article

An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems

Wenmin Li | Shuo Zhang | ... | Yang Chen
  • Special Issue
  • - Volume 2018
  • - Article ID 3403456
  • - Research Article

Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism to Secure WBSN Wearable Device Communications

Yuanlong Cao | Guanghe Zhang | ... | Shixiong Chen
Wireless Communications and Mobile Computing
 Journal metrics
Acceptance rate34%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore1.470
Impact Factor1.396
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi