Wireless Communications and Mobile Computing

Mobile Computing and Secure Communication Technologies in 6G Networks


Publishing date
01 Oct 2021
Status
Closed
Submission deadline
11 Jun 2021

Lead Editor

1Harbin Engineering University, Harbin, China

2Lviv Polytechnic National University, Lviv, Ukraine

3Nanchang Institute of Technology, Nanchang, China

This issue is now closed for submissions.

Mobile Computing and Secure Communication Technologies in 6G Networks

This issue is now closed for submissions.

Description

The next generation of wireless communications networks, i.e., 6G, is designed to support a massive number of users’ connectivity and a multi-gigabit transmission rate, which can realise the integration of space, aerial, terrestrial, and undersea networks. The overall goal is to provide ubiquitous Internet-of-Things (IoT) communication services for machines, mobile devices, and users with different quality of service (QoS) requirements, to support diversified and heterogeneous emergent information interaction needs, and to protect user privacy communication protocols, transceivers, and computing technologies under the premise of normal communication.

Out of the multiple innovation goals for 6G networks, mobile computing and secure communication technologies are critical to improving quality-of-experience (QoE) and information security from both a multi-communication environment and a personal or business perspective. To this end, in recent years, advanced and ubiquitous applications and increasing design demand have begun to improve data processing speed and user privacy from physical layer and upper layer perspectives. One of the goals of mobile computing and secure communication is to deal with the need for separate data processing on heterogeneous devices and effectively reduce latency by moving data-intensive processing from cloud servers to edge computing devices. However, dealing with the large amount of unstructured/semi-structured data generated by resource-constrained IoT users in an efficient and secure manner is an important issue that needs to be addressed. In addition, it is difficult to define the rationality and universality of the performance evaluation function designed for actual mobile computing/secure systems, especially for the design of edge computing IoT physical layers on the composite ultra-dense scale. In addition, multiple composite performance evaluations such as cost, delay, and security capacity need to be considered comprehensively. Until now, limited research efforts have been made and few papers have been published on mobile computing and secure communication for 6G networks.

This Special Issue aims to provide a platform for researchers from academia and industry to discuss innovative solutions to key issues in these technologies for future 6G networks. We have an interest in submissions on mobile computing and secure communication working to dramatically improve the performance of 6G networks. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Trustworthy blockchain-based secure network structure design in 6G networks
  • Self-organisation and self-healing techniques for sustainable mobile computing/secure 6G networks
  • Energy harvesting enabled secure Internet-of-Everything in 6G networks
  • Co-time co-frequency full duplex applications for secure/mobile computing massive MIMO in 6G networks
  • Intelligent secure network slicing management and challenges in 6G networks
  • Energy-aware massive MIMO systems with physical layer security in 6G networks
  • Blockchain and artificial intelligence (AI) for dynamic secure spectrum sharing in 6G networks
  • Architectures/topologies for secure hierarchical IoT-cloud/fog/mist networks
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.