Wireless Communications and Mobile Computing

Access Control and Privacy-Enhanced Technology in Next Generation Communication Networks


Publishing date
01 Oct 2022
Status
Published
Submission deadline
03 Jun 2022

Lead Editor
Guest Editors

1Chinese Academy of Sciences, Beijing, China

2University of Science and Technology Beijing, Beijing, China

3University of Texas at Arlington, Arlington, USA


Access Control and Privacy-Enhanced Technology in Next Generation Communication Networks

Description

Next-generation communication networks (NGCMs) not only improve network speeds but also integrate perceptron and computing resources to create a new generation integrated service system. In the service system, the physical world can be sensed more delicately by high-quality sensors, computing resources can be allocated flexibly between edge nodes and servers, and data is exchanged across system boundaries. This new service model will not only make significant changes to data analysis, data process, and data service but also bring new applications and services. Through NCGMs, physical space and cyber-space are more tightly integrated than ever. As a consequence, data security and privacy in NGCNs are closely tied to users, businesses, and countries.

NGCNs encompass multiple heterogeneous networks and span terrestrial networks, space satellite networks, and marine networks. Through NGCNs, users can connect to the network and access precise data anywhere and anytime. As a result, it is very important to design highly flexible access control and privacy protection mechanisms to satisfy data exchange requirements in NGCNs.

This Special Issue aims to bring together recent advances on access control and privacy-enhanced technology in NGCNs. We encourage original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems from academia, industry, and government. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Access control model and mechanism in NGCM
  • Usage control model and mechanism in NGCM
  • Policy negotiation and verification in NGCM
  • Distributed/non-distributed policy evaluation in NGCM
  • Lightweight authentication mechanisms for NGCM
  • Blockchain-based usage control in NGCM
  • End-to-end communication privacy in NGCM
  • Privacy-enhanced data collection, classification, and analytics in NGCM
  • Incentive mechanisms of privacy management in NGCM
  • Privacy of digital twins in NGCM
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.