Wireless Communications and Mobile Computing

Attacks, Challenges and New Designs in Security and Privacy for Smart Mobile Devices 2021


Publishing date
01 Nov 2021
Status
Published
Submission deadline
09 Jul 2021

Lead Editor

1Nankai University, Tianjin, China

2University of Texas at San Antonio, Texas, USA

3Technical University of Denmark, Kongens Lyngby, Denmark

4University of Maribor, Maribor, Slovenia


Attacks, Challenges and New Designs in Security and Privacy for Smart Mobile Devices 2021

Description

Mobile devices are going to take a central role in the emerging Internet of Everything era. With the proliferation of wireless technologies (e.g. LTE, LTE-A, WiMAX, 5G, Bluetooth, ZigBee, ZWave, NB-IoT and LoRaWAN), various kinds of mobile devices (e.g. smartphones, wearable watches, smart vehicle) have come into our daily lives and are able to provide continuous and reliable connectivity, facilitating a wide variety of online services such as e-commerce, e-healthcare, and e-home. However, the large-scale deployment of smart mobile devices is confronted with many new challenges. Especially in terms of security and privacy, due to the fact that these devices have different characteristics from traditional personal computers, servers, and laptops.

Smart mobile devices are generally of limited computation capability and restricted storage and energy, and thus adopting security and privacy solutions that employ expensive cryptographic primitives will not be practical. Meanwhile, smart mobile devices are typically small devices with a restricted screen, keyboard and interfaces. Consequently, existing security and privacy solutions may not be sufficiently user-friendly or completely unviable. In addition, smart mobile devices are often capable of transparently monitoring many sensitive activities and data of users’ lives (e.g., location, health, preference and correspondence), and hence more stringent security and privacy demands are required than that of traditional computing devices. This explains why the security risks on smart mobile devices have been greatly increased both in the number of reported security incidents and in a certain degree of severity.

The aim of this Special Issue is to bring together original research articles and review articles from researchers and practitioners working in the broad area of security and privacy. We seek high-quality articles presenting state-of-the-art security and privacy research including attacks, mechanisms, frameworks, protocols, algorithms, policies, user studies as well as threat models for mobile devices.

Potential topics include but are not limited to the following:

  • Access control and authentication for smart mobile devices
  • Measurement of privacy leakage for smart mobile devices
  • Data privacy for smart mobile devices Information leakage detection and prediction for smart mobile devices
  • Privacy-enhancing technologies for smart mobile devices
  • New security and privacy paradigms for smart mobile devices
  • Attacks on security and privacy mechanisms for smart mobile devices
  • Human aspects in security and privacy for smart mobile devices
  • Foundational principles for lightweight security and privacy
  • Evaluation metrics for security and privacy on smart mobile devices
  • Key management for security and privacy on smart mobile devices
  • Identity and access management in the Internet of Things
  • Measurement of privacy leakage in the Internet of Things
  • Multi-factor authentication for smart mobile devices
  • Continuous/implicit authentication for smart mobile devices

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 8458314
  • - Research Article

Lightweight and High-Performance Data Protection for Edge Network Security

Xiaojie Chen | Bin Li | Qinglei Zhou
  • Special Issue
  • - Volume 2022
  • - Article ID 6710661
  • - Research Article

Adaptive Weight Adjustment and Searching Perception Strategy for Multivariate Complex Environments

Wenshan Wang | Jianguo Sun | ... | Qingan Da
  • Special Issue
  • - Volume 2021
  • - Article ID 7609543
  • - Research Article

A Hierarchical Provable Massive Data Migration Method under Multicloud Storage

Ma Haifeng | Yu HaiTao | ... | Yang Jiahai
  • Special Issue
  • - Volume 2021
  • - Article ID 2368201
  • - Research Article

Simultaneous Jamming-and-Transmitting Scheme for Spectrum-Sharing Relaying Networks with Nonlinear Energy Scavenging

Triet Pham-Minh | Khuong Ho-Van | Khanh Nghi-Vinh
  • Special Issue
  • - Volume 2021
  • - Article ID 9942950
  • - Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Shichang Xuan | Haibo Xiao | ... | Wu Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 4079092
  • - Research Article

A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks

Junfeng Miao | Zhaoshun Wang | ... | Longyue Xing
  • Special Issue
  • - Volume 2021
  • - Article ID 9963129
  • - Research Article

Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language

Suliman A. Alsuhibany | Afnan S. Almuqbil
  • Special Issue
  • - Volume 2021
  • - Article ID 8513869
  • - Research Article

Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing

Jiawei Zhang | Ning Lu | ... | Jianfeng Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 9968743
  • - Research Article

Fast Policy Interpretation and Dynamic Conflict Resolution for Blockchain-Based IoT System

Yaozheng Fang | Zhaolong Jian | ... | Tao Li
  • Special Issue
  • - Volume 2021
  • - Article ID 9974279
  • - Research Article

Multiagent Minimum Risk Path Intrusion Strategy with Computational Geometry

Jianguo Sun | Zining Yan | Sizhao Li
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.