Wireless Communications and Mobile Computing

Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices


Publishing date
01 Dec 2020
Status
Closed
Submission deadline
31 Jul 2020

Lead Editor

1Nankai University, Tianjin, China

2University of Texas at San Antonio, Texas, USA

3Technical University of Denmark, Kongens Lyngby, Denmark

4International Institute of Information Technology, Hyderabad, India

This issue is now closed for submissions.

Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices

This issue is now closed for submissions.

Description

Mobile devices are going to take a central role in the emerging Internet of Everything era. With the proliferation of wireless technologies (e.g., LTE, LTE-A,WiMAX, 5G, Bluetooth, ZigBee, ZWave, NB-IoT and LoRaWAN), various kinds of mobile devices (e.g., smart phones, wearable watches, smart vehicle) have come into our daily lives and are able to provide continuous and reliable connectivity, facilitating a wide variety of online services such as e-commerce, ehealthcare, and e-home. However, the large-scale deployment of smart mobile devices is confronted with many new challenges, especially in terms of security and privacy due to the fact that these devices have different characteristics from traditional personal computers, servers, and laptops.

On the one hand, smart mobile devices are generally of limited computation capability and restricted storage and energy, and thus adopting security and privacy solutions that employ expensive cryptographic primitives will not be practical. On the other hand, smart mobile devices are typical small devices with a restricted screen, key board and interfaces, and consequently existing security and privacy solutions may not be sufficiently user-friendly or completely unviable. In addition, smart mobile devices are often capable of transparently monitoring many sensitive activities and data of users’ lives (e.g., location, health, preference and correspondence), and hence more stringent security and privacy demands are required than that of traditional computing devices. This explains why the security risks on smart mobile devices have been greatly increased both in the number of reported security incidents and in degree of their severity.

This Special Issue aims to bring together contributions from researchers and practitioners working in the broad area of security and privacy. We seek high-quality articles presenting state-of-the-art security and privacy research including attacks, mechanisms, frameworks, protocols, algorithms, policies, user studies as well as threat models for mobile devices.

Potential topics include but are not limited to the following:

  • Access control and authentication for smart mobile devices
  • Measurement of privacy leakage for smart mobile devices
  • Data privacy for smart mobile devices  Information leakage detection and prediction for smart mobile devices
  • Privacy enhancing technologies for smart mobile devices
  • New security and privacy paradigms for smart mobile devices
  • Attacks on security and privacy mechanisms for smart mobile devices
  • Human aspects in security and privacy for smart mobile devices
  • Foundational principles for lightweight security and privacy
  • Evaluation metrics for security and privacy on smart mobile devices
  • Key management for security and privacy on smart mobile devices
  • Identity and access management in Internet of Things
  • Measurement of privacy leakage in Internet of Things
  • Multi-factor authentication for smart mobile devices
  • Continuous/implicit authentication for smart mobile devices
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.