Special Issue "Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication"

Submission Deadline: 30 November 2020 (closed)
Guest Editors
Dr. Gregorio Martinez Perez, University of Murcia (UMU), Spain
Dr. B. B. Gupta, National Institute of Technology, Kurukshetra, India
Byung-Gyu Kim, Sookmyung Women's University, Seoul, Rep. of Korea
Yining Liu, Guilin University of Electronic Technology, China

Summary

Mobile communication is being developed with an exponential growth of mobile users, how to protect mobile networks against various attacks has become a big challenge. Taking mobile devices as an example, these devices are tiny, and users may lose them easily. Moreover, these devices have become one of the most demanding goods which attract thieves because of their resale value. Moreover, multimedia data during the mobile communication including network, media and devices is an important issue to handle. Moreover, explosion of multimedia data has created unprecedented opportunities and fundamental security challenges as they are not just big in volume, but also unstructured and multi-modal. In the past years, as per the reports of cyber crime, the rise of malware and attacks on mobile communication can be easily said. As a result, there is an increasing need for secure solutions to protect users' private and sensitive multimedia data in the mobile environment. This special issue will focus on mobile context and aims to request original research papers that discuss the management of security, privacy and trust of multimedia data in mobile communication including design, configuration and implementation of networks, media and devices.


Keywords
• Definition, evaluation, and deployment requirements of 5G/6G systems
• Security, Privacy and Trust of multimedia data in mobile communication
• Trust evaluation on mobile networks/devices
• Detection of malicious information propagation in mobile networks
• Models, methods, and tools for testing the security of mobile networks
• Security, privacy and trust of multimedia big data in mobile networks
• Security of multimedia data in Semantic web based social network
• Security of multimedia data in communication systems
• Security of multimedia data in Information Systems
• Security of multimedia data in MCC
• Management of security and privacy of multimedia data in wireless network
• Massive MIMO technologies
• Millimeter wave wireless communication technologies
• Full-duplex radios for 5G/6G mobile communications
• Massive connectivity and synchronous transmission and random access
• Heterogeneous wireless network architecture design and implementation
• Privacy and Security of Building Data
• Cryptography, authentication, authorisation and usage control for multimedia data in mobile networks
• Security and privacy of multimedia Data in Web service
• Evolutionary algorithms for mining social networks for decision support
• Interference coordination in 5G/6G mobile communications
• Low latency transmission technologies
• Energy harvesting wireless communication technologies
• Energy-efficient technologies in 5G/6G mobile communications
• Distributed caching in 5G/6G mobile communications
• Device-to-device/machine-to-machine communications
• Tactile internet applications
• Cloud-assist wireless transmission
• Big data analytical modeling and solutions for wireless networks
• Mobile Cloud architecture and platform
• Software-defined wireless networks
• Evolution solutions from conventional cellular mobile to content-aware wireless communications
• Joint multimedia processing and wireless transmission design for wireless multimedia communications
• Adversarial modeling Vulnerability
• Assessment and testing Intrusion detection and prevention schemes
• Tracing back mobile attackers
• Impact of human social behavior on mobile usage
• Secure routing and access control
• Mobile authentication mechanisms
• Security testing of new or existing usability features
• Agent based intrusion surveillance
• Wireless Access Technologies
• Multimedia security issues for tackling intruders

Published Papers
  • Management of Schemes and Threat Prevention in ICS Partner Companies Security
  • Abstract An analysis of the recent major security incidents related to industrial control systems, revealed that most had been caused by company employees. Therefore, enterprise security management systems have been developed to focus on companies’ personnel. Nonetheless, several hacking incidents, involving major companies and public/financial institutions, were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work. Specifically, institutions that operate industrial control systems (ICSs) associated with critical national infrastructures, such as traffic or energy, have contracted several cooperative firms. Nonetheless, ICT's importance is gradually increasing, due to outsourcing, and is the most vulnerable factor in security. This… More
  •   Views:345       Downloads:288        Download PDF

  • Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis
  • Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a modified Gabor Wavelet Transform for… More
  •   Views:1792       Downloads:1398        Download PDF

  • Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles
  • Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More
  •   Views:695       Downloads:650        Download PDF

  • Mathematical Model Validation of Search Protocols in MP2P Networks
  • Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More
  •   Views:858       Downloads:593        Download PDF


  • Network Log-Based SSH Brute-Force Attack Detection Model
  • Abstract The rapid advancement of IT technology has enabled the quick discovery, sharing and collection of quality information, but has also increased cyberattacks at a fast pace at the same time. There exists no means to block these cyberattacks completely, and all security policies need to consider the possibility of external attacks. Therefore, it is crucial to reduce external attacks through preventative measures. In general, since routers located in the upper part of a firewall can hardly be protected by security systems, they are exposed to numerous unblocked cyberattacks. Routers block unnecessary services and accept necessary ones while taking appropriate measures… More
  •   Views:1104       Downloads:836        Download PDF



  • Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm
  • Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that the high feasibility and results… More
  •   Views:896       Downloads:810        Download PDF

  • Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)
  • Abstract An IDS (intrusion detection system) provides a foremost front line mechanism to guard networks, systems, data, and information. That’s why intrusion detection has grown as an active study area and provides significant contribution to cyber-security techniques. Multiple techniques have been in use but major concern in their implementation is variation in their detection performance. The performance of IDS lies in the accurate detection of attacks, and this accuracy can be raised by improving the recognition rate and significant reduction in the false alarms rate. To overcome this problem many researchers have used different machine learning techniques. These techniques have limitations… More
  •   Views:1774       Downloads:1135        Download PDF