Wireless Communications and Mobile Computing

Security and Intelligence of the Internet of Things for 5G and B5G Networks


Publishing date
01 May 2022
Status
Closed
Submission deadline
31 Dec 2021

1Hamdard University, Islamabad, Pakistan

2Sejong University, Seoul, Republic of Korea

3Universiti Kebangsaan, Bangi, Malaysia

This issue is now closed for submissions.

Security and Intelligence of the Internet of Things for 5G and B5G Networks

This issue is now closed for submissions.

Description

The fifth generation (5G) and beyond the fifth generation (B5G) networks have shown significant promise in enhancing the efficiency and coverage of the Internet of Things (IoT) over the last couple of years. The Internet of Things (IoT) will certainly play a significant part in 5G and B5G networks, where massive machine-type communications (mMTC) are crucial and demanding use cases. Meanwhile, 5G and B5G can be seen as the basis for realizing the full potential of IoT. More smart devices will be incorporated into 5G and B5G networks as IoT grows, creating massive amounts of real-time data.

However, security and privacy concerns may arise as the volume of data generation and data sharing increases. Likewise, integrating IoT devices and platforms into the 5G and B5G paradigms raises several issues that must be solved prior to deployment. The expected high traffic needs, low-latency, and deterministic delivery requirements of IoT and machine-to-machine (M2M) communications can only be addressed by revolutionary innovations in architecture, communication, and networking technologies.

The aim of this Special Issue is to bring together original research and review articles discussing solutions to solve challenging issues such as privacy leakage, data confidentiality, and flexible accessibility in 5G and B5G wireless networks. Submissions can include cutting-edge technologies such as artificial intelligence (AI), machine learning (ML), quantum machine learning (QML), blockchain, terahertz (THz) communication, fog/edge computing, visible light communication (VLC), etc.

Potential topics include but are not limited to the following:

  • Security and privacy issues for 5G and B5G enabled IoT networks
  • Integrating IoT into 5G and B5G networks
  • Device-to-device (D2D) and cognitive communications
  • Blockchain-based security protocols for 5G and B5G enabled IoT networks
  • Novel frameworks and algorithms based on existing and upcoming technologies to enhance the scalability and security for 5G and B5G enabled IoT networks
  • Cloud, fog, and edge computing architecture for 5G and B5G enabled IoT networks
  • Machine learning algorithms for 5G and B5G enabled IoT networks
  • Reinforcement learning based intelligent applications in 5G and B5G enabled IoT networks
  • Federated learning for 5G and B5G enabled IoT networks

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 4851364
  • - Research Article

Evolutionary Heuristic Computing Paradigm for 2D-DOA Estimation along Circular Array

Fiaz Hussain Shah | Muhammad Asif Zahoor Raja | ... | Xiaodong Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 2257338
  • - Research Article

Application Layer-Forward Error Correction Raptor Q Codes in 5G Mobile Networks for Factory of the Future

Athirah Mohd Ramly | Rosdiadee Nordin | Nor Fadzilah Abdullah
  • Special Issue
  • - Volume 2022
  • - Article ID 7356733
  • - Research Article

Intelligent on Demand Clustering Routing Protocol for Wireless Sensor Networks

Muhammad Amir Khan | Adnan Anwar Awan
  • Special Issue
  • - Volume 2022
  • - Article ID 8006751
  • - Research Article

Energy-Efficient Routing Protocol for Next-Generation Application in the Internet of Things and Wireless Sensor Networks

Roopali Dogra | Shalli Rani | ... | Daniel Krah
  • Special Issue
  • - Volume 2022
  • - Article ID 1738530
  • - Research Article

Overlapping Coalition Game for Resource Allocation in Many-to-Many D2D Communication

Jihua Sheng | Sihan Liu | ... | Yucheng Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 8669941
  • - Research Article

SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes

Bander A. Alzahrani | Ahmed Barnawi | ... | Shehzad Ashraf Chaudhry
  • Special Issue
  • - Volume 2022
  • - Article ID 7665931
  • - Research Article

Energy-Aware Routing Protocol with Fuzzy Logic in Industrial Internet of Things with Blockchain Technology

Abolfazl Mehbodniya | Julian L. Webber | ... | Stephen Jeswinde Nuagah
  • Special Issue
  • - Volume 2022
  • - Article ID 3426811
  • - Research Article

Secure Data Transmission Using Quantum Cryptography in Fog Computing

Cherry Mangla | Shalli Rani | Henry Kwame Atiglah
  • Special Issue
  • - Volume 2022
  • - Article ID 6953125
  • - Research Article

A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community

Adamu Sani Yahaya | Nadeem Javaid | ... | Muhammad Asghar Khan
  • Special Issue
  • - Volume 2021
  • - Article ID 7817249
  • - Research Article

A Novel Routing Protocol for Realistic Traffic Network Scenarios in VANET

Gagan Deep Singh | Sunil Kumar | ... | Samih M. Mostafa
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.