Privacy and Security of Networking

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708).

Deadline for manuscript submissions: closed (31 July 2019)

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science, College of Arts and Sciences, University of Missouri-Saint Louis, St. Louis, MO 63121, USA
Interests: future network architecture; edge computing; wireless communications and mobile computing; Internet of Things; security; data centric networking; network functions virtualization

Special Issue Information

Dear Colleagues,

The proliferation the Internet-of-Things (IoT), mobile, and sensory devices, coupled with their pervasiveness worldwide, raises major conceptual and security concerns about the architectures that organize tomorrow’s compute infrastructure, its scalability, and privacy and security requirements. Future novel architectures need to support the shift from edge devices consuming data to edge devices being a voluminous producer of data. This raises multiple questions concerning data placement, securing data, privacy, processing, and sharing. Edge computing is at the heart of such novel architectures, in which compute and storage resources are placed at the network edge, in proximity to mobile and IoT devices. This approach offers advantages, such as improved scalability, reduced network latency, faster compute response times, and improved security and privacy.

In this Special Issue, we are seeking submissions that focus on secure data-centric edge architectures and privacy preserving data sharing frameworks that will enable compelling new applications and fully realize the opportunity of big data in tomorrow’s mobile and IoT device environments. Information-centric networking (ICN) is a new network architecture that provides access to named data as a first order network service, providing better trust in data authenticity. Security is a particularly important topic, since ICN enables new approaches with respect to confidentiality, access control, and trust management that we want to address through this Feature Topic.

Prof. Dr. Abderrahmen Mtibaa
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Edge computing security
  • Security architectures for future internet architectures
  • Authentication and authorization for distributed caching environment
  • Security in mobile data centric networking
  • Cryptographic protocols against internal attacks in IoT
  • Mechanisms to enforce privacy and trust
  • Trusted computing platform
  • Copyright management and business models for IoT and future internet architectures

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 267 KiB  
Article
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems
by Ghaith Khalil, Robin Doss and Morshed Chowdhury
J. Sens. Actuator Netw. 2019, 8(3), 37; https://doi.org/10.3390/jsan8030037 - 4 Jul 2019
Cited by 34 | Viewed by 8678
Abstract
Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present [...] Read more.
Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem; each technique uses a different concept and mechanism in resolving the issue. Each technique also has different pros and cons which we will address at the end of this paper with our findings. As we explore RFID technology and its implementation, we will discuss previous research before proceeding to the core of the topic of RFID Anti-counterfeiting based on the methods used. We compare the different techniques used at the end of the paper. Full article
(This article belongs to the Special Issue Privacy and Security of Networking)
Show Figures

Figure 1

Back to TopTop