Security and Communication Networks

Privacy-Enhancing Authentication and Computation for Human CPS and IoT


Publishing date
01 Dec 2022
Status
Published
Submission deadline
22 Jul 2022

Lead Editor

1Southwest University, Chongqing, China

2University of New Brunswick, Fredericton, Canada

3Fujian Normal University, Fuzhou, China

4Shandong University, Qingdao, China

5University of Bristol, Bristol, UK


Privacy-Enhancing Authentication and Computation for Human CPS and IoT

Description

As the core technology of next-generation network communication, human CPS and IoT are gradually becoming the industry's focus. Human CPS and IoT make the seamless interaction of human actors and services a reality. Unlike the Internet, human CPS and IoT are primarily used in critical areas of the national economy. The bearer network must have the carrier-level quality of service (QoS), which puts forward high requirements for the security, credibility, controllability, and manageability of the network. At present, the industry has carried out a lot of research on the security protocols, algorithms, and computing of human CPS and IoT.

However, affected by network scale and connectivity, the types and number of attacks that have been exposed are still minimal, and the potential security problems have not been fully unveiled. Notably, the current seemingly secure network architecture will face significant threats in a large-scale environment. In today's research and technology era, cutting-edge technologies such as artificial intelligence, 5G, fog/edge technology, machine learning, and blockchain can greatly support the design and development of human CPS and IoT. And these technologies provide unexpected solutions for human CPS and IoT applications, including industrial Internet of things, vehicle network, intelligent transportation system, smart city, smart medical, and monitoring systems. In the future, human CPS and IoT will far surpass today's strategies in terms of performance, adaptability, computing, security, and availability. As a result, the traditional authentication and computing of the system are difficult to keep up with today's escalating network security threats. Therefore, it is urgent to discuss and solve the challenging problems of privacy disclosure, data breaches, and flexible accessibility in human CPS and IOT, and design and develop new privacy-enhanced authentication and computing methods to ensure the security of human CPS and IoT.

This Special Issue aims to provide original research and review from different disciplines concerning the threats, security models, methods, and computing technologies in human CPS and IoT. We also encourage articles that can provide either theoretical or empirical investigations into any joint topic on safety, security, and fault tolerance of human CPS and IoT systems. Moreover, high-quality articles presenting the state-of-the-art techniques in this field are also welcome.

Potential topics include but are not limited to the following:

  • Formal methods for safety, security, and reliability of human CPS and IoT
  • Secure computing technology of human CPS and IoT
  • Privacy protection technology of human CPS and IoT
  • Security architecture and threat model of human CPS and IoT
  • Security Models of human CPS and IoT
  • Security and privacy of human CPS and IoT in the industrial Internet of things
  • Human CPS and IoT secure communication in 5G
  • Blockchain-based human CPS and IoT security protocols
  • Human CPS and IoT security authentication and computing based on artificial intelligence
  • Formal methods for safety, security, and fault tolerance of human CPS and IoT systems
  • Machine learning algorithm and anomaly detection supporting human CPS and IoT
  • Edge computing architecture supporting human CPS and IoT

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9621839
  • - Research Article

Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid

Jinhu Yu | Yue Han | ... | Jinguo Li
  • Special Issue
  • - Volume 2023
  • - Article ID 7010155
  • - Research Article

Privacy-Preserving Industrial Control System Anomaly Detection Platform

Shan Gao | Junjie Chen | ... | Kui Ren
  • Special Issue
  • - Volume 2022
  • - Article ID 3624587
  • - Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Lisset Suárez-Plasencia | Carlos Miguel Legón-Pérez | ... | Guillermo Sosa-Gómez
  • Special Issue
  • - Volume 2022
  • - Article ID 5682891
  • - Research Article

A Three-Stage Alternative Optimization Promoting Multi-UAV-Assisted Mobile Offloading

Xiao Han | Huiqiang Wang | ... | Chengbo Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 4436824
  • - Research Article

A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy

Houpeng Hu | Jiaxiang Ou | ... | Zerui Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 7001278
  • - Research Article

Noise-Resistant Video Channel Identification

Mingkai Wang | Zengkun Xie | ... | Fei Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 1059997
  • - Research Article

A CFL-Based Key Management Scheme for Routing-Driven Internet of Things

Jiuru Wang | Chongran Sun | ... | Ping Gong
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.