Guest Editors
Dr. Chien-Ming Chen, Shandong University of Science and Technology, China.
Dr. Muhammad Naveed Aman, University of Nebraska-Lincoln, USA.
Dr. Muhammad Asghar khan, Hamdard University, Pakistan.
Dr. Yu-Chi Chen, Yuan Ze University, Taoyuan, Taiwan.
Summary
With the rapid development of wireless
communication technology, mobile computing combined with the current hot
Internet of Things, fog computing, blockchain, and other technologies, in
intelligent transportation, medical health, energy management, and other fields
to extend a wealth of application scenarios. Although mobile computing has
great application prospects in the above emerging scenarios, due to the wide
openness of mobile computing networks, the limited resources of mobile
terminals and dynamic changes in network topology, the emerging mobile
computing networks not only face greater security threats and privacy leakage
risks but also add many obstacles to the design of security and privacy
protection schemes for mobile computing networks.
Security and privacy issues have gradually
become a huge challenge and even become one of the bottlenecks of mobile
computing development. However, traditional security and privacy mechanisms do
not apply to these emerging mobile computing scenarios. Therefore, the design
of security and privacy methods for emerging mobile computing applications has
received extensive attention and focused research from academia and industry.
The objective of this special issue is to
compile recent research efforts dedicated to study the security and privacy of
rapidly increasing mobile computing applications.
Keywords
Topics of interest include but are not limited to the ones listed below.
1. Security and protection architectures for mobile computing
2. Authentication methods in mobile computing
3. Machine and deep learning for solving security in mobile computing
4. Blockchain technologies in mobile computing
5. Novel architectures, concepts, and models in mobile computing security
6. Federated models for privacy and security of mobile computing services
7. Cryptography protocols and algorithms for mobile computing
8 Threat models and attack strategies for mobile computing
9 Threat detection/prevention methods in mobile computing
10. Big data analytics for heterogeneous mobile computing systems
11. State-of-the-art reviews on security and privacy for mobile computing