Today’s networks are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels in the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage increasing usage demand, provide support for a significant number of services, guarantee their QoS and optimise the utilisation of network resources. Therefore, architectures and algorithms in these networks have become very complex and it seems imperative to focus on new models and methods as well as mechanisms which can enable the networks to perform adaptive behaviours.
The research area of mobile computing has become more important following the recent growth of mobile ad-hoc networks, wireless sensor networks, wireless mesh networks, cellular networks and vehicular networks and their applications. The availability of high bandwidth 3G and 4G infrastructures and the pervasive deployment of low-cost WiFi infrastructures and WiMAX to create hotspots around the world serve to accelerate the development of mobile computing toward ubiquitous computing. Efficiency and security in these networks are considered very important and pose challenging problems.
For this special issue, we would like to invite contributions from academia and industry which show the latest research results in the field of efficient and secure algorithms, architectures, schemes and mechanisms in ubiquitous computing.
The issue will focus on the research challenges and issues in efficient algorithms and security in ubiquitous computing. Manuscripts regarding novel algorithms, architectures, implementations and experiences are welcome.
Suitable topics include, but are not limited to, the following:
- Efficient and secure algorithms
- Complex and intelligent algorithms
- Meta-heuristic approaches and methods
- Optimisation algorithms
- Multi-hop authentication and authorisation
- Context-aware security models
- Security for ubiquitous multimedia communication
- Secure user interactions and ubiquitous services
- Efficient and secure location-based services
- Trust management in ubiquitous services
- Trusted cloud computing
- Secure group communication/multicast
- Secure machine-to-machine communication
- Security in portable devices and wearable computers
- Security in distributed data mining
- Energy-efficient intrusion detection schemes in mobile computing
Important Dates
Manuscript due: 31 January, 2015
First round notification: 30 April, 2015
First revision due: 31 July, 2015
Acceptance notification: 30 October, 2015
Final manuscript due: 31 January, 2016
No comments:
Post a Comment