Recently, mobile wireless devices such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and have attracted significant interest from academia, industry and standard organisations. With the latest cloud computing technology, these mobile wireless devices will play an increasingly important role in computing and communication.
When these devices become pervasive, security, privacy and trust become critical components for the acceptance of applications built for and based on them. Moreover, several favourable characteristics of mobile and wireless devices, including portability, mobility and sensitivity, further increase the challenges of security and privacy in these systems.
Despite recent advances, many research issues still require addressing in the design of secure, privacy-preserving, trusted architectures, protocols, algorithms, services and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth and super sensing capability, more sensitive information will be stored in the devices. Additionally, operating systems running on these devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of these devices.
With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modelling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems.
This special issue aims to bring together works of technologists and researchers who share an interest in the area of security, privacy and trust in mobile and wireless systems, and to explore new venues of collaboration. Its main purpose is to promote discussions about research and relevant activities in the models and designs of secure, privacy-preserving, trusted architectures, protocols, algorithms, services and applications, as well as to analyse cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We seek papers that address theoretical, experimental research, and works-in-progress for security-, privacy- and trust-related issues in the context of mobile and wireless systems.
The issue will carry revised and substantially extended versions of selected papers presented at the MobiPST 2014 workshop held in conjunction with IEEE ICCCN 2014, but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following in relation to security, privacy and trust:
- Wireless local area networks
- Wireless sensor networks
- Wireless mesh networks
- Wireless ad-hoc networks
- Vehicular networks
- Body-area networks
- Cellular networks (3G, 4G, etc.)
- WiMAX Networks
- Machine-to-machine (M2M) networks
- Software-defined networks (SDN)
- Social networks
- Smart grid
- RFID-based systems
- Mobile cloud
- Cyber-physical systems (CPS)
- Internet of things
- Location-based service systems
- Mobile healthcare systems
- Smart building systems
- Big data
Manuscript due: 10 November, 2014
Acceptance/rejection notification: 30 January, 2015
Final manuscript due: 28 March, 2015