Wireless Communications and Mobile Computing

Security and Privacy Challenges for Internet-of-Things and Fog Computing 2020


Publishing date
01 Nov 2020
Status
Closed
Submission deadline
26 Jun 2020

Lead Editor

1Fuzhou University, Fuzhou, China

2The University of Texas at San Antonio, San Antonio, USA

3Nanjing University of Posts and Telecommunications, Nanjing, China

This issue is now closed for submissions.

Security and Privacy Challenges for Internet-of-Things and Fog Computing 2020

This issue is now closed for submissions.

Description

Internet-of-Things (IoT) have produced profound impacts to our daily life by offering advanced connectivity of devices, systems, and services that go beyond machine-to-machine (M2M) communications and covers a variety of protocols, domains, and applications. Billions of IoT devices (embedded with electronics, software, sensors, actuators, and network connectivity) collect data through wireless technology and are able to interoperate within the existing Internet infrastructure. Traditional cloud computing framework stores and processes these massive amounts of data, which requires vast amounts of bandwidth, storage, and computation resources. Unfortunately, it leaves near-user fog devices (such as smart meters, smart traffic lights) as dumb portals, and negatively impacts the performance of the cloud-centric system.

The new fog/edge computing paradigm allows data storing and processing being implemented at the network edge or anywhere along the cloud-to-endpoint continuum, rather than completely in a relatively small number of clouds, which can meet users’ requirements to a maximum. It also overcomes IoT devices’ limited processing and storage capabilities and battery life, network bandwidth constraints, and allows us to design a far more capable architecture. However, this new IoT-Fog paradigm brings many security and privacy issues such as information confidentiality, authentication and authorization, and secure communication. With nearly unlimited computation and storage resources, the traditional cloud-based platform can even use a heavyweight lattice-based cryptosystem to enhance the system security, which cannot be performed by resource constrained edge devices. Moreover, different from the tradition IoT-cloud architectures, millions of smart fog devices are wildly distributed and located in different areas, which can be easily compromised by some malicious parties. These compromised fog devices may temper the data collected by smart health IoT devices, and these fake data may mislead the data user or even threat people’s lives.

To address these arising challenges and opportunities different from traditional cloud-based architectures, this Special Issue is interested in inviting and gathering recent advanced security and privacy techniques relevant to the convergence of Internet-of-Things with fog computing.

Potential topics include but are not limited to the following:

  • Authentication in crowdsourcing of IoT and fog computing
  • Lightweight data protection scheme for smart IoT devices
  • Secure machine learning techniques on edge devices for IoT data analysis
  • Hardware security and privacy issues for IoT and edge devices
  • Secure data integrity and validation techniques for smart IoT devices
  • Privacy computation and processing protocols on edge-cloud platform
  • Secure M2M communication for smart IoT and edge devices
  • Formal security model for cryptographic protocols for fog computing
  • Future and smart fog-based vulnerability assessment interfaces
  • Design and tune intrusion detection systems for distributed IoT and fog devices
  • Secure programming models and toolkits for fog computing in IoT
  • Virtualization, security, and management for mobile and fog computing
  • Experiment prototype for secure and trusted IoT-Fog framework
  • Blockchain and smart contracts for IoT and fog computing
  • New privacy challenges in IoT and fog-cloud computing

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8850520
  • - Research Article

An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT

Mimi Ma | Min Luo | ... | Dengguo Feng
  • Special Issue
  • - Volume 2020
  • - Article ID 8891889
  • - Research Article

A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT

Renwan Bi | Qianxin Chen | ... | Dapeng Wu
  • Special Issue
  • - Volume 2020
  • - Article ID 8862652
  • - Research Article

Privacy-Preserving Vehicle Assignment in the Parking Space Sharing System

Tingting Fu | Peng Liu | ... | Peng Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8822251
  • - Research Article

Social-Aware Task Allocation in Mobile Crowd Sensing

Weiping Zhu | Wenzhong Guo | Zhiyong Yu
  • Special Issue
  • - Volume 2020
  • - Article ID 8850356
  • - Research Article

A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice

Yongjin Hu | Han Zhang | ... | Jun Ma
  • Special Issue
  • - Volume 2020
  • - Article ID 8838571
  • - Research Article

A Host-Based Anomaly Detection Framework Using XGBoost and LSTM for IoT Devices

Xiali Wang | Xiang Lu
  • Special Issue
  • - Volume 2020
  • - Article ID 3627826
  • - Research Article

TLFW: A Three-Layer Framework in Wireless Rechargeable Sensor Network with a Mobile Base Station

Anwen Wang | Xianjia Meng | ... | Guangcheng Yin
  • Special Issue
  • - Volume 2020
  • - Article ID 8868656
  • - Research Article

BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon

Zuobin Ying | Longyang Yi | Maode Ma
  • Special Issue
  • - Volume 2020
  • - Article ID 8836351
  • - Research Article

Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission

Hanyi Wang | Kun He | ... | Fenghua Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8842885
  • - Research Article

Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices

Tianqi Zhou | Jian Shen | ... | Leiming Yan
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.