Wireless Communications and Mobile Computing

Security and Privacy Challenges for Internet-of-Things and Fog Computing 2021


Publishing date
01 Jan 2022
Status
Published
Submission deadline
27 Aug 2021

Lead Editor
Guest Editors

1Fuzhou University, Fuzhou, China

2Georgia Southern University, Statesboro, USA

3Xidian University, Xi'an, China


Security and Privacy Challenges for Internet-of-Things and Fog Computing 2021

Description

Internet-of-Things (IoT) have produced profound impacts to our daily life by offering advanced connectivity of devices, systems, and services that go beyond machine-to-machine (M2M) communications and covers a variety of protocols, domains, and applications. Billions of IoT devices (embedded with electronics, software, sensors, actuators, and network connectivity) collect data through wireless technology and are able to interoperate within the existing Internet infrastructure. Traditional cloud computing framework stores and processes these massive amounts of data, which requires vast amounts of bandwidth, storage, and computation resources. Unfortunately, it leaves near-user fog devices (such as smart meters, smart traffic lights) as dumb portals, and negatively impacts the performance of the cloud-centric system.

The new fog/edge computing paradigm allows data storing and processing being implemented at the network edge or anywhere along the cloud-to-endpoint continuum, rather than completely in a relatively small number of clouds, which can meet users’ requirements to a maximum. It also overcomes IoT devices’ limited processing and storage capabilities and battery life, network bandwidth constraints, and allows us to design a far more capable architecture. However, this new IoT-Fog paradigm brings many security and privacy issues such as information confidentiality, authentication and authorization, and secure communication. With nearly unlimited computation and storage resources, the traditional cloud-based platform can even use a heavyweight lattice-based cryptosystem to enhance the system security, which cannot be performed by resource constrained edge devices. Moreover, different from the traditional IoT-cloud architectures, millions of smart fog devices are widely distributed and located in different areas, which can be easily compromised by some malicious parties. These compromised fog devices may temper the data collected by smart health IoT devices, and these fake data may mislead the data user or even threat people’s lives.

To address these arising challenges and opportunities different from traditional cloud-based architectures, this Special Issue is interested in inviting and gathering recent advanced security and privacy techniques relevant to the convergence of Internet-of-Things with fog computing.

Potential topics include but are not limited to the following:

  • Authentication in crowdsourcing of IoT and fog computing
  • Lightweight data protection scheme for smart IoT devices
  • Secure machine learning techniques on edge devices for IoT data analysis
  • Hardware security and privacy issues for IoT and edge devices
  • Secure data integrity and validation techniques for smart IoT devices
  • Privacy computation and processing protocols on edge-cloud platform
  • Secure M2M communication for smart IoT and edge devices
  • Formal security model for cryptographic protocols for fog computing
  • Future and smart fog-based vulnerability assessment interfaces
  • Design and tune intrusion detection systems for distributed IoT and fog devices
  • Secure programming models and toolkits for fog computing in IoT
  • Virtualization, security, and management for mobile and fog computing
  • Experiment prototype for secure and trusted IoT-Fog framework
  • Blockchain and smart contracts for IoT and fog computing
  • New privacy challenges in IoT and fog-cloud computing

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5127499
  • - Research Article

Improved Cloud Auditing Protocol and Its Application for Pandemic Data Management

Xu An Wang | Zhengge Yi | ... | Guixin Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 4462134
  • - Research Article

Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model

Meng Zhao | Yong Ding | ... | Huiyong Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 8302527
  • - Research Article

Security Guarantee for Vehicular Message Transmission Based on Dynamic Social Attributes

Lishui Chen | Jing Wang | ... | Yifu Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 6985492
  • - Research Article

Decentralized Certificate Management for Network Function Virtualisation (NFV) Implementation in Telecommunication Networks

Junzhi Yan | Na Li | ... | Shen He
  • Special Issue
  • - Volume 2021
  • - Article ID 8028073
  • - Research Article

Securing Open Banking with Model-View-Controller Architecture and OWASP

Deina Kellezi | Christian Boegelund | Weizhi Meng
  • Special Issue
  • - Volume 2021
  • - Article ID 9921036
  • - Research Article

Efficient Authentication for Internet of Things Devices in Information Management Systems

Xiaofeng Wu | Fangyuan Ren | ... | Xiaoling Tao
  • Special Issue
  • - Volume 2021
  • - Article ID 4696455
  • - Research Article

Differential Privacy Location Protection Method Based on the Markov Model

Hongtao Li | Yue Wang | ... | Chuankun Wu
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.