Wireless Communications and Mobile Computing

Security and Privacy Challenges for Internet-of-Things and Fog Computing


Publishing date
01 Jul 2018
Status
Published
Submission deadline
09 Mar 2018

Lead Editor

1Singapore Management University, Singapore

2Fuzhou University, Fuzhou, China

3The University of Texas at San Antonio, San Antonio, USA

4Nanjing University of Posts and Telecommunications, Nanjing, China


Security and Privacy Challenges for Internet-of-Things and Fog Computing

Description

Internet-of-Things (IoT) has profound impacts on our daily life by offering advanced connectivity of devices, systems, and services that go beyond machine-to-machine (M2M) communications and covers a variety of protocols, domains, and applications. Billions of IoT devices (embedded with electronics, software, sensors, actuators, and network connectivity) collect data through wireless technology and are able to interoperate within the existing Internet infrastructure. Traditional cloud computing framework stores and processes these massive amounts of data, which requires vast amounts of bandwidth, storage, and computation resources. Unfortunately, it leaves near-user fog devices (such as smart meters, smart traffic lights) as dumb portals and negatively impacts the performance of the cloud-centric system. The new fog/edge computing paradigm allows data storing and processing being implemented at the network edge or anywhere along the cloud-to-endpoint continuum, rather than completely in a relatively small number of clouds, which can meet users’ requirements to a maximum. It also overcomes IoT devices’ limited processing and storage capabilities and battery life and network bandwidth constraints and allows us to design a far more capable architecture. However, this new IoT-Fog paradigm brings many security and privacy issues such as information confidentiality, authentication and authorization, and secure communication. With nearly unlimited computation and storage resources, the traditional cloud-based platform can even use heavyweight lattice-based cryptosystem to enhance the system security, which cannot be performed by the resource constrained edge devices. Moreover, different from the tradition IoT-cloud architectures, millions of smart fog devices are wildly distributed and located in different areas, which can be easily compromised by some malicious parties. These compromised fog devices may temper the data collected by smart health IoT devices, and these fake data may mislead the data user or even threat people’s lives. To address these arising challenges and opportunities different from traditional cloud based architecture, this special issue is interested in inviting and gathering recent advanced security and privacy techniques relevant to the convergence of Internet-of-Things with fog computing.

Potential topics include but are not limited to the following:

  • Authentication in crowdsourcing of IoT and fog computing
  • Lightweight data protection scheme for smart IoT devices
  • Secure machine learning technique on edge devices for IoT data analysis
  • Hardware security and privacy issues for IoT and edge devices
  • Secure data integrity and validation techniques for smart IoT devices
  • Privacy computation and processing protocols on edge-cloud platform
  • Secure M2M communication for smart IoT and edge devices
  • Formal security model for cryptographic protocols for fog computing
  • Future and smart fog-based vulnerability assessment interfaces
  • Design and tune intrusion detection systems for distributed IoT and fog devices
  • Secure programming models and toolkits for fog computing in IoT
  • Virtualization security and management for mobile and fog computing
  • Experiment prototype for secure and trusted IoT-Fog framework
  • Blockchains and smart contracts for IoT and fog computing
  • New privacy challenges in IoT and fog-cloud computing

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 9373961
  • - Editorial

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu | Yang Yang | ... | Huaqun Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 8959635
  • - Research Article

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services

Jinbo Xiong | Rong Ma | ... | Biao Jin
  • Special Issue
  • - Volume 2018
  • - Article ID 5702068
  • - Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Qihua Wang | Fagen Li | Huaqun Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 6925019
  • - Research Article

Strong Identity-Based Proxy Signature Schemes, Revisited

Weiwei Liu | Yi Mu | ... | Yangguang Tian
  • Special Issue
  • - Volume 2018
  • - Article ID 2769417
  • - Research Article

Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device

Ziru Peng | Xiangyang Luo | ... | Fenlin Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 5938152
  • - Research Article

Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT

Jian Dong | Hui Zhu | ... | Rui Xiao
  • Special Issue
  • - Volume 2018
  • - Article ID 7849065
  • - Research Article

Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device

Dong Wang | Xiaosong Zhang | ... | Weina Niu
  • Special Issue
  • - Volume 2018
  • - Article ID 5945312
  • - Research Article

A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher

Shuaiwei Zhang | Weidong Zhong
  • Special Issue
  • - Volume 2018
  • - Article ID 9576978
  • - Research Article

Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks

Qinbao Xu | Rizwan Akhtar | ... | Changda Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 5787930
  • - Research Article

Privacy Protection of IoT Based on Fully Homomorphic Encryption

Wei-Tao Song | Bin Hu | Xiu-Feng Zhao
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.