Wireless Communications and Mobile Computing

Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices


Publishing date
01 Dec 2020
Status
Published
Submission deadline
31 Jul 2020

Lead Editor

1Nankai University, Tianjin, China

2University of Texas at San Antonio, Texas, USA

3Technical University of Denmark, Kongens Lyngby, Denmark

4International Institute of Information Technology, Hyderabad, India


Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices

Description

Mobile devices are going to take a central role in the emerging Internet of Everything era. With the proliferation of wireless technologies (e.g., LTE, LTE-A,WiMAX, 5G, Bluetooth, ZigBee, ZWave, NB-IoT and LoRaWAN), various kinds of mobile devices (e.g., smart phones, wearable watches, smart vehicle) have come into our daily lives and are able to provide continuous and reliable connectivity, facilitating a wide variety of online services such as e-commerce, ehealthcare, and e-home. However, the large-scale deployment of smart mobile devices is confronted with many new challenges, especially in terms of security and privacy due to the fact that these devices have different characteristics from traditional personal computers, servers, and laptops.

On the one hand, smart mobile devices are generally of limited computation capability and restricted storage and energy, and thus adopting security and privacy solutions that employ expensive cryptographic primitives will not be practical. On the other hand, smart mobile devices are typical small devices with a restricted screen, key board and interfaces, and consequently existing security and privacy solutions may not be sufficiently user-friendly or completely unviable. In addition, smart mobile devices are often capable of transparently monitoring many sensitive activities and data of users’ lives (e.g., location, health, preference and correspondence), and hence more stringent security and privacy demands are required than that of traditional computing devices. This explains why the security risks on smart mobile devices have been greatly increased both in the number of reported security incidents and in degree of their severity.

This Special Issue aims to bring together contributions from researchers and practitioners working in the broad area of security and privacy. We seek high-quality articles presenting state-of-the-art security and privacy research including attacks, mechanisms, frameworks, protocols, algorithms, policies, user studies as well as threat models for mobile devices.

Potential topics include but are not limited to the following:

  • Access control and authentication for smart mobile devices
  • Measurement of privacy leakage for smart mobile devices
  • Data privacy for smart mobile devices  Information leakage detection and prediction for smart mobile devices
  • Privacy enhancing technologies for smart mobile devices
  • New security and privacy paradigms for smart mobile devices
  • Attacks on security and privacy mechanisms for smart mobile devices
  • Human aspects in security and privacy for smart mobile devices
  • Foundational principles for lightweight security and privacy
  • Evaluation metrics for security and privacy on smart mobile devices
  • Key management for security and privacy on smart mobile devices
  • Identity and access management in Internet of Things
  • Measurement of privacy leakage in Internet of Things
  • Multi-factor authentication for smart mobile devices
  • Continuous/implicit authentication for smart mobile devices

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8825623
  • - Research Article

A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model

Cheng Li | Li Yang | Jianfeng Ma
  • Special Issue
  • - Volume 2020
  • - Article ID 8827185
  • - Research Article

Valid Probabilistic Anomaly Detection Models for System Logs

Chunbo Liu | Lanlan Pan | ... | Zhi Wang
  • Special Issue
  • - Volume 2020
  • - Article ID 8847559
  • - Research Article

Reversible Information Hiding Algorithm Based on Multikey Encryption

Zhaohui Li | Yiqing Wang | ... | Min Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8851429
  • - Review Article

Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps

Tania Martin | Georgios Karopoulos | ... | Igor Nai Fovino
  • Special Issue
  • - Volume 2020
  • - Article ID 8866996
  • - Research Article

SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization

Yan Ding | Pan Dong | ... | Yudan Zuo
  • Special Issue
  • - Volume 2020
  • - Article ID 8888284
  • - Research Article

PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism

Mingwu Zhang | Bingruolan Zhou
  • Special Issue
  • - Volume 2020
  • - Article ID 8886516
  • - Research Article

A Security Situation Assessment Model of Information System for Smart Mobile Devices

Lixia Xie | Liping Yan | ... | Hongyu Yang
  • Special Issue
  • - Volume 2020
  • - Article ID 8825120
  • - Research Article

Hierarchical Q-Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers

Jue Liu | Nan Sha | ... | Lianxin Yang
  • Special Issue
  • - Volume 2020
  • - Article ID 8841711
  • - Research Article

A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors

Song Li | Jian Liu | ... | Jinguang Han
  • Special Issue
  • - Volume 2020
  • - Article ID 8810393
  • - Research Article

Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid

Huadong Liu | Tianlong Gu | ... | Zhixin Zeng
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.