New Challenges in Security, Privacy and Trust for Mobile Systems and Networks
A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".
Deadline for manuscript submissions: 25 September 2024 | Viewed by 4104
Special Issue Editors
Interests: security and trust; mobile and wireless systems; IoT; cyber physical systems
Special Issues, Collections and Topics in MDPI journals
Interests: wireless networks; information security; digital forensics
Special Issues, Collections and Topics in MDPI journals
Interests: fault detection and recognition; machine learning and data analytics over wireless networks; signal processing and analysis; cognitive radio and software defined radio; artificial intelligence; pattern recognition
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
Security, trust, and privacy are critical concerns in mobile and wireless systems due to the widespread use of mobile devices and technology that utilizes the Internet of Things (IoT). The rapid development of these technologies has led to an increase in various security risks, making it essential to ensure that the data transmitted through these systems remains secure and private. Mobile and wireless systems face various security threats, such as unauthorized access, data breaches, and malware attacks. To address these concerns, measures such as encryption, authentication, and access control are used. Trust is also a crucial aspect of mobile and wireless systems, as users must have confidence in the system's security to use it. Privacy is another concern, as mobile devices often store and transmit sensitive data. Therefore, to protect privacy, techniques such as anonymization and data minimization are employed. This Special Issue welcomes original research and review articles that address aspects of security, trust and privacy in mobile systems and networks.
Dr. Wenjia Li
Dr. Lei Chen
Prof. Dr. Yun Lin
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- security
- trust
- privacy
- mobile
- wireless networks
- IoT, Android
Planned Papers
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Title: New Technological approach to data protection: a definitive solution?
Authors: Enrico Del Re
Affiliation: Department of Information Engineering, Universita degli Studi di Firenze, Florence, Italy
Abstract: This contribution aims to propose an innovative action to achieve in a reasonable time the definitive technological solution for confidential data protection, based on available scientific results. Confidential data protection is a fundamental and strategic issue in NGI systems to guarantee the respect of the human rights as stated in the foundation of the EU. Even if many EU regulations are decisive steps to guarantee data protection in a normative context, they are not adequate to face new technologies, like facial recognition, automatic profiling, position tracking, biometric data, AI applications and many others in the future, as they are implemented without any awareness by the interested subjects. Therefore, a new approach for data protection is mandatory based on an innovative and disruptive technological approach. A recent OECD report highlighted the need for the so-called Privacy-Enhancing Technologies (PET) for an effective protection of confidential data, even more urgent for the coexistence of privacy and data sharing in accordance with the Data Governance Act. A common feature of these technologies is the use of software methodologies that can run on currently available microprocessors. If this may seem, and in fact is, an efficient approach for a short-term solution, a more effective and definitive protection can be achieved with another methodological approach based on the concept of ‘Data Usage Control’ introduced in the context of the International Data Spaces (IDS).