Special lssues

Security Privacy in Mobile Computing: Challenges and Solutions

Submission Deadline: 28 February 2022 (closed)

Guest Editors

Dr. Chien-Ming Chen, Shandong University of Science and Technology, China.
Dr. Muhammad Naveed Aman, University of Nebraska-Lincoln, USA.
Dr. Muhammad Asghar khan, Hamdard University, Pakistan.
Dr. Yu-Chi Chen, Yuan Ze University, Taoyuan, Taiwan.

Summary

With the rapid development of wireless communication technology, mobile computing combined with the current hot Internet of Things, fog computing, blockchain, and other technologies, in intelligent transportation, medical health, energy management, and other fields to extend a wealth of application scenarios. Although mobile computing has great application prospects in the above emerging scenarios, due to the wide openness of mobile computing networks, the limited resources of mobile terminals and dynamic changes in network topology, the emerging mobile computing networks not only face greater security threats and privacy leakage risks but also add many obstacles to the design of security and privacy protection schemes for mobile computing networks.


Security and privacy issues have gradually become a huge challenge and even become one of the bottlenecks of mobile computing development. However, traditional security and privacy mechanisms do not apply to these emerging mobile computing scenarios. Therefore, the design of security and privacy methods for emerging mobile computing applications has received extensive attention and focused research from academia and industry.


The objective of this special issue is to compile recent research efforts dedicated to study the security and privacy of rapidly increasing mobile computing applications.


Keywords

Topics of interest include but are not limited to the ones listed below.
1. Security and protection architectures for mobile computing
2. Authentication methods in mobile computing
3. Machine and deep learning for solving security in mobile computing
4. Blockchain technologies in mobile computing
5. Novel architectures, concepts, and models in mobile computing security
6. Federated models for privacy and security of mobile computing services
7. Cryptography protocols and algorithms for mobile computing
8 Threat models and attack strategies for mobile computing
9 Threat detection/prevention methods in mobile computing
10. Big data analytics for heterogeneous mobile computing systems
11. State-of-the-art reviews on security and privacy for mobile computing

Share Link