Wireless Communications and Mobile Computing

Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices


Publishing date
01 Dec 2020
Status
Closed
Submission deadline
31 Jul 2020

Lead Editor

1Nankai University, Tianjin, China

2University of Texas at San Antonio, Texas, USA

3Technical University of Denmark, Kongens Lyngby, Denmark

4International Institute of Information Technology, Hyderabad, India

This issue is now closed for submissions.

Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices

This issue is now closed for submissions.

Description

Mobile devices are going to take a central role in the emerging Internet of Everything era. With the proliferation of wireless technologies (e.g., LTE, LTE-A,WiMAX, 5G, Bluetooth, ZigBee, ZWave, NB-IoT and LoRaWAN), various kinds of mobile devices (e.g., smart phones, wearable watches, smart vehicle) have come into our daily lives and are able to provide continuous and reliable connectivity, facilitating a wide variety of online services such as e-commerce, ehealthcare, and e-home. However, the large-scale deployment of smart mobile devices is confronted with many new challenges, especially in terms of security and privacy due to the fact that these devices have different characteristics from traditional personal computers, servers, and laptops.

On the one hand, smart mobile devices are generally of limited computation capability and restricted storage and energy, and thus adopting security and privacy solutions that employ expensive cryptographic primitives will not be practical. On the other hand, smart mobile devices are typical small devices with a restricted screen, key board and interfaces, and consequently existing security and privacy solutions may not be sufficiently user-friendly or completely unviable. In addition, smart mobile devices are often capable of transparently monitoring many sensitive activities and data of users’ lives (e.g., location, health, preference and correspondence), and hence more stringent security and privacy demands are required than that of traditional computing devices. This explains why the security risks on smart mobile devices have been greatly increased both in the number of reported security incidents and in degree of their severity.

This Special Issue aims to bring together contributions from researchers and practitioners working in the broad area of security and privacy. We seek high-quality articles presenting state-of-the-art security and privacy research including attacks, mechanisms, frameworks, protocols, algorithms, policies, user studies as well as threat models for mobile devices.

Potential topics include but are not limited to the following:

  • Access control and authentication for smart mobile devices
  • Measurement of privacy leakage for smart mobile devices
  • Data privacy for smart mobile devices  Information leakage detection and prediction for smart mobile devices
  • Privacy enhancing technologies for smart mobile devices
  • New security and privacy paradigms for smart mobile devices
  • Attacks on security and privacy mechanisms for smart mobile devices
  • Human aspects in security and privacy for smart mobile devices
  • Foundational principles for lightweight security and privacy
  • Evaluation metrics for security and privacy on smart mobile devices
  • Key management for security and privacy on smart mobile devices
  • Identity and access management in Internet of Things
  • Measurement of privacy leakage in Internet of Things
  • Multi-factor authentication for smart mobile devices
  • Continuous/implicit authentication for smart mobile devices

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8883696
  • - Research Article

Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security

Guowei Shen | Wanling Wang | ... | Miao Yu
  • Special Issue
  • - Volume 2020
  • - Article ID 8888679
  • - Research Article

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

Qinglong Huang | Haiping Huang | ... | Yuhan Wu
  • Special Issue
  • - Volume 2020
  • - Article ID 8882295
  • - Research Article

A Multiclass Detection System for Android Malicious Apps Based on Color Image Features

Hua Zhang | Jiawei Qin | ... | Yangye Hu
  • Special Issue
  • - Volume 2020
  • - Article ID 8853971
  • - Research Article

Detecting Overlapping Data in System Logs Based on Ensemble Learning Method

Chunbo Liu | Yitong Ren | ... | Zhi Wang
  • Special Issue
  • - Volume 2020
  • - Article ID 8820436
  • - Research Article

A Novel DIBR 3D Image Hashing Scheme Based on Pixel Grouping and NMF

Chen Cui | Xujun Wu | ... | Juyan Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8829845
  • - Research Article

An Algorithm Based on Influence to Predict Invisible Relationship

Junfeng Tian | Lizheng Xue | Hongyun Cai
  • Special Issue
  • - Volume 2020
  • - Article ID 8876632
  • - Research Article

BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features

Xiang Li | Yuanping Nie | ... | Gang Zhao
  • Special Issue
  • - Volume 2020
  • - Article ID 8859489
  • - Research Article

Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform

Liqiang Zhang | Guanjun Lin | ... | Jun Zhang
  • Special Issue
  • - Volume 2020
  • - Article ID 8877405
  • - Research Article

Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios

Zhiyan Xu | Min Luo | ... | Li Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8883557
  • - Research Article

Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP

Zhaohui Xing | Wenying Zhang | Guoyong Han
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.