Journal Information
Security and Communication Networks (SCN)
https://www.hindawi.com/journals/scn/
Impact Factor:
0.806
Publisher:
Hindawi
ISSN:
1939-0122
Viewed:
245
Tracked:
1

Advertisment
Call For Papers
Security and Communication Networks is an international journal publishing original research and review papers on all security areas including network security, cryptography, cyber security, etc. The emphasis is on security protocols, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms.

The journal provides a prestigious forum for the R&D community in academia and industry working at the inter-disciplinary nexus of next generation communications technologies for security implementations in all network layers.

Answering the highly practical and commercial importance of network security R&D, submissions of applications-oriented papers describing case studies and simulations are encouraged as well as research analysis-type papers.

The most recent Impact Factor for Security and Communication Networks is 0.806 according to the 2015 Journal Citation Reports released by Thomson Reuters in 2016.

Content published prior to 2017 is hosted on the Wiley Online Library.

Security and Communication Networks currently has an acceptance rate of 17%. The average time between submission and final decision is 56 days and the average time between acceptance and publication is 44 days. 
Last updated by Dou Sun in 2017-04-24
Special Issues
Special Issue on Emerging Security and Privacy Influencing Enterprise BYOD and Future Mobile Network
Submission Date: 2017-05-26

Recent security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. Security and privacy are the biggest inhibitors of BYOD (Bring Your Own Device) adoption. In contrast, management opposition and user experience concerns rank far lower. As mobility and BYOD grow in the workplace, so do challenges from managing bandwidth and device access to handling the most pressing concerns of security. The aim of Enterprise BYOD and Mobile Network (EBMN) is to provide fresh and innovative ideas that allow us to see our daily research work from diverse perspectives. In EBMN, our research work can be pleasurable and adventurous, and this change of thinking can make us more enthusiastic about and focused on our research work with greater excitement. This special issue welcomes papers focused on all topics ranging within the wide spectrum of emerging security, privacy, permitted mobile application security, and mobile creative computing with emphasis on theoretical aspects as well as practical frameworks and implementations. For this special issue, we cordially invite original research papers focused on security and privacy and exploring a variety of emerging enterprise BYOD and future mobile network issues for the cultivation of the traditional mobile platform and its technological approaches. The aim of this special issue is to bring together innovative developments in areas related to emerging security and privacy influencing enterprise BYOD and future mobile network. Potential topics include but are not limited to the following: Enterprise BYOD and mobile network and related security issues Emerging trends influencing enterprise BYOD and future mobile network Emerging convergence in service security and privacy architectures in EBMN Security and risk control measures in future mobile network Emerging service intrusion and malware detection in EBMN Secure multimedia contents, tools, and application for EBMN Recent advanced security in security and privacy issues for mobile networks Cryptography, security protocols for smart devices, and so on Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/ebmn/. Manuscript Due Friday, 26 May 2017 First Round of Reviews Friday, 18 August 2017 Publication Date Friday, 13 October 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Knowledge Discovery and Intelligent Systems in Information Security and Digital Forensics
Submission Date: 2017-05-26

While computing and communication technologies have greatly improved our daily lives, unprecedented increase of cyberattacks, cybercrimes, and cyberterrorism has posed tremendous challenges for national security, international peace, public safety, and privacy. Accordingly, the theory and practice of information security and digital forensics have received extensive attention from government officials and business analysts, decision makers, crime investigators, and security staff, as well as researchers. In spite of the efforts in cybersecurity, cybercrimes continue to grow worldwide and existing approaches for addressing the problems are mostly reactive and often easily outsmarted. In order to proactively tackle the ever-evolving cybercrime activities and to secure communications, more sophisticated and intelligent methodologies need to be developed. Widely applied to various areas, intelligent computational techniques and systems have impacted the modern society in many ways. Advances in computational intelligence have contributed to practical solutions to complex real-world problems, for which traditional methods are ineffective or infeasible. In particular, data mining and pattern recognition techniques have been utilized to combat cybercrimes. Aiming to demonstrate the effectiveness of computational intelligence techniques in digital forensics and information security applications, this special issue will provide a timely venue for sharing knowledge of leading experts around the world and for presenting novel advancements in information security and digital forensics. The objectives of this special issue are as follows: (1) to increase awareness of the applicability of advanced computational techniques in digital forensics and information assurance; (2) to provide opportunity for sharing research ideas and results in the field; and (3) to further promote collaborative research among participants from various disciplines. Bridging the gap among knowledge discovery, computational intelligence, cyber forensics, and information assurance, it intends to enhance the communication and collaboration among researchers and practitioners from academia, industry, and government. The special issue emphasizes computational intelligence, broadly construed, and its applications in information security and digital forensics. Recognizing the broad range of topics and recent advances in the field (including intelligent systems, genetic algorithms and modelling, fuzzy systems, artificial neural networks, expert and decision support systems, learning and evolutionary computing, evolutionary computing, big data and analytics, data mining, and deep learning), the special issue also aims to promote the application of the techniques of intelligent systems, pattern recognition, and data science to cybersecurity and digital forensics, with particular interest in relation to current technologies and platforms in broad use. Original manuscripts are solicited presenting new research results on the theory, algorithms, methods, and practice on relevant topics. Potential topics include but are not limited to the following: Privacy and data protection Biometrics IoT security, VoIP security, and Web application security Acquisition, integration, visualization, and analytics of big data for cybersecurity Techniques and methods of pattern recognition in cybersecurity applications Cybersecurity and digital forensics applications of deep learning and zero-shot learning Fuzzy systems and evolutionary computation methods for information assurance and digital forensics applications Cybercrime analysis Fraud and forgery detection Intrusion detection, prevention, and management Malware analysis and detection Video surveillance, video search matching, and anomaly detection Multimedia security and forensics Networking security and forensics Social media and instant messaging privacy, security, and forensics Cloud computing security and forensics Countermeasures to steganography, forgery, covert channels, and other threats to security Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/kdis/. Manuscript Due Friday, 26 May 2017 First Round of Reviews Friday, 18 August 2017 Publication Date Friday, 13 October 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Big Data Analytics for Information Security
Submission Date: 2017-06-16

Big Data Analytics (BDA) is one of the mainstream technologies that change our perspectives on processing of information. Together with information security, BDA could be an extremely effective tool to learn more about communication and social networks. There will be infinite possibilities to find new methods of tracking cybercrimes using big data from different sources. BDA in information security also changes our thinking about security algorithms; they must change from a small data paradigm to big ones. This special issue is to analyze how the latest trends in this area help learn more about cyberspace and new threats using big data approaches. Potential topics include but are not limited to the following: New security algorithms for big data Big data in cloud and its security Cryptography and big data New theories and methods of multimedia information hiding in big media data New theories and methods of multimedia steganalysis in big data Advances in privacy preserving machine learning methods in big data Advances in privacy preserving multimedia search and retrieval methods in big data Advances in privacy preserving data mining methods in big data Challenges and new methods of potential unsafe content recognition in big data Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/bigd/. Manuscript Due Friday, 16 June 2017 First Round of Reviews Friday, 8 September 2017 Publication Date Friday, 3 November 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Computational Enablers for Security and Privacy for IoT
Submission Date: 2017-07-14

While the evolution of Internet to IoT holds great promises for new set of applications for the citizens, increased efficiency, and a wider set of available services, security aspects must also be taken into consideration. IoT devices and technologies will be used in various domains (e.g., healthcare), where the interaction with the human being can generate safety hazards if the IoT devices are tampered or attacked from a security point of view. IoT devices must be protected from security attacks, but this can be a challenging task, considering the limited capabilities of IoT devices in terms of processing power, storage, and energy. As a consequence, the implementation and deployment of conventional cryptographic solutions can be challenging. At the same time, the data collected by the sensors must be accurate to support the IoT applications, especially the ones based on autonomic algorithms because they may not be able to take the right decisions in time on the basis of inaccurate sensor data. There is the need to investigate efficient computational enablers to support security of IoT in various functions. The term computational enablers include algorithms, software modules, or analytic programs. For example, signal processing algorithms could be used not only to check the plausibility of IoT sensor data but also to detect potential security attacks either by correlating the data from one sensor with other sensors or by analyzing the presence of anomalies or outliers in the sensor output. Machine learning and data analytics algorithms could be used to identify specific contexts and improve the identification and authentication of IoT devices on the basis of their physical features. Innovative cryptographic algorithms could also be investigated to address the specific limitations of IoT devices. Finally, there is the need to design and implement new security solutions, which are able to support IoT distributed environments (e.g., blockchain and lightweight cryptographic protocols). We seek high-quality papers examining innovative and multidisciplinary methods and techniques to identify and/or mitigate security threats in relation to IoT networks and devices using machine learning and signal processing techniques. Papers will be peer-reviewed by independent reviewers and selected based on their quality and relevance to the topics of this special issue. Potential topics include but are not limited to the following: Signal processing techniques to identify security threats to IoT devices and applications Physical layer authentication of IoT devices Application of machine learning algorithms to IoT security Automatic evaluation of security and privacy threats and benchmarking Analysis of data from IoT sensors to mitigate security threats Multiparty computation Secure consensus protocols and applications of the blockchain to secure computation Homomorphic cryptography and applications New applications for secure IoT Design of lightweight cryptographic protocols for IoT Detection of anomalies in IoT applications and their behavior Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/cesp/. Manuscript Due Friday, 14 July 2017 First Round of Reviews Friday, 6 October 2017 Publication Date Friday, 1 December 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Emerging and Unconventional: New Attacks and Innovative Detection Techniques
Submission Date: 2017-07-28

In the last years, advancements of the information and communication technologies have spawned a variety of innovative paradigms, such as cloud and fog computing, the Internet of Things (IoT), or complex vehicle-to-vehicle frameworks. As a consequence, the cybersecurity panorama is now getting populated with complex, emerging, and unconventional attacks, which require deep investigation and proper understanding. For example, the diffusion of online social networks brought social engineering to the next level, while IoT led to a completely new set of hazards also endangering the user at a physical level. Modern threats also exploit a variety of advanced methods to increase their stealthiness in order to remain unnoticed for long periods, as well as reduce the effectiveness of many digital forensics techniques and detection tools. Therefore, new and emerging technologies changed the modern cybersecurity landscape, which nowadays is populated by novel attacks and also requires innovative detection and prevention methods. In this perspective, the special issue aims at investigating the most advanced and innovative forms of attacks and scenarios, for instance, considering automotive or building automation settings. To complete the picture, a relevant attention will be given to works dealing with innovative forms of detection and forensics analysis, which are mandatory to counteract sophisticated malware able to hide or take advantage of unconventional and complex scenarios. This issue accepts high quality papers containing novel original research results and review articles of exceptional merit covering the most cutting-edge cybersecurity threats and countermeasures. Potential topics include but are not limited to the following: Novel advanced and persistent threats aiming at automotive and smart buildings/cities Security issues and profiling hazards in smart buildings/cities IoT and device specific attacks, for example, battery drain attacks or attacks on IoT routing protocols Hazards taking advantage from social media, for example, social bots and new social engineering attacks Information hiding threats to counteract forensics tools and analysis Network steganography for data exfiltration and new information-hiding-capable threats Energy-based detection of slow and hidden attacks, including low-attention rising threats for mobile and handheld devices Scalable countermeasures for preventing steganography in big-data-like sources Novel threats targeting vehicles and cloud and software defined networking technologies Bioinspired attacks and detection mechanisms Ransomware: novel trends, characteristics, and detection Moving Target Defense (MTD) solutions against infections Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/emun/. Manuscript Due Friday, 28 July 2017 First Round of Reviews Friday, 20 October 2017 Publication Date Friday, 15 December 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Software-Defined Networking: Establishing Security, Privacy, and Trust in the Network
Submission Date: 2017-07-28

In recent years, Software-Defined Networking (SDN) has attracted great interest from both academia and industry. The objective of this technology is to reduce costs by simplification, automation, and virtualization. SDN makes the customization of the networks easy, reduces the set-up time, and facilitates network deployment with a right quality of service. SDN promises to dramatically simplify network management and enable innovation through network programmability. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to the security and privacy aspects of SDN. SDN security needs to be built into the architecture and delivered as a service to protect the availability, integrity, and privacy of all connected resources and information. In SDN, network security can be enhanced by means of global visibility of the network state. For example, the logically centralized control plane can easily solve a conflict. However, the separation of the control and data planes opens security challenges, such as denial of service (DoS) attacks, man-in-the-middle attacks, and saturation attacks. In addition, the centralized controller is a high-profit target for an attacker; the northbound and southbound interfaces are vulnerable also to threats that could degrade the availability, performance, and integrity of the network. The aim of the special issue is to present leading edge work concerning privacy protection issues, trust models, and security challenges in the field of Software Defined Networking. Potential topics include but are not limited to the following: Security modelling and threat in SDN Software-defined security for SDN architecture Trust models between third party applications and the controller in SDN Traffic and resource isolation protocols for SDN Privacy protection in SDN Privacy policy framework for SDN Establishment of trust models and trust boundaries in SDN Interface Security protection on Application-Control Programming Interface A-CPI and I-CPI Identity management protocols for SDN users and components Access control mechanisms for all components and users of SDN Effective protocols for building authentication, authorization and accounting implementations in SDN Security architectures for SDN Security protocols for SDN Privacy-preserving data mining for SDN Information sharing and data protection in SDN Cryptographic protocols against internal attacks in SDN Risk management in SDN environments Mechanisms to enforce privacy and trust in SDN Energy/cost/efficiency of security in SDNs Trust, reputation and policy management in SDNs Privacy-preserving data access in SDNs Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/snspt/. Manuscript Due Friday, 28 July 2017 First Round of Reviews Friday, 20 October 2017 Publication Date Friday, 15 December 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Exploiting the Security Aspects of Compressive Sampling
Submission Date: 2017-08-11

Compressive sampling (CS) has received extensive research attention in the past decade. By exploiting the property of natural signals to be either sparse or compressible, the CS theory demonstrates that such signals can be faithfully recovered from a small set of linear, nonadaptive measurements, allowing sampling at a rate lower than that required by the Nyquist-Shannon sampling theorem. CS shows great potential in information security field from its birth date, owing to its intrinsic simplicity, convenience, robustness in various scenarios, and simultaneous encryption and compression performances. In recent years, extensive studies of CS-based security techniques have been launched from both theoretical and practical aspects. The primary object of theoretical security research is to investigate the confidentiality provided by the CS paradigm, such as its resistance under different attack assumptions, designing keyed sparsifying basis and measurement matrix, and developing adaptive quantization approach with cryptographic features. The other active topic is to exploit the great potentials of CS for various security applications, such as multimedia encryption, multimedia hashing, watermarking/data hiding, information authentication, privacy-preserving data aggregation, and compressing lightweight encrypted data. We invite investigators to contribute original research articles as well as review articles that exploit the security potentials of CS from various aspects. Original, high quality contributions that are not yet published and are not currently under review by other journals or peer-reviewed conferences will be highly appreciated. Potential topics include but are not limited to the following: Theoretic security evaluation of CS-based ciphers Research on cryptographic measurement matrix and keyed sparsifying basis Joint sampling-cryptographic-source coding schemes based on CS CS application for multimedia encryption Employing CS for image/video watermarking, hashing, and authentication Privacy-preserving data aggregation using CS Privacy-preserving CS reconstruction services Novel techniques integrating CS with Double Random Phase Encoding Illuminating ciphers using CS and chaos theory Other theoretical and practical achievements of CS Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/esac/. Manuscript Due Friday, 11 August 2017 First Round of Reviews Friday, 3 November 2017 Publication Date Friday, 29 December 2017
Last updated by Dou Sun in 2017-04-24
Special Issue on Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications
Submission Date: 2017-08-18

The integration of extensive parallel computation power, scalable platforms, and advanced communications has profoundly unleashed the potentials of big data mining in recent years. A large number of cloud datacenters have been established around the globe and provide necessary tools and infrastructure to utilize economical, on-demand, rapid-elasticity computation and storage services. With these, an increasingly huge amount of data of various types and formats have been collected from many different sources such as online social media, Internet of Things (IoT), mobile devices, and genome projects via both wired and wireless communication channels. Unlocking the value of big data through analytics and mining has been regarded as the key enabler to many innovation and marketing strategies which, in turn, has pushed more efforts and supports to the big data related R&D. As an evidence, for example, Gartner has recently reported that most of the world’s largest 200 companies have plans to invest in the development of intelligent apps as well as to utilize the full toolkit of big data and analytics tools by 2018. New founding from these investments then is to be incorporated to refine the services offered by companies and improve customer experience. This illustrates that an extensive research is expected to be more actively supported for big data mining infrastructure, platforms, and applications that runs both on wired and on wireless communication channels in order to conduct more efficient knowledge discovery and smart decision support. One of the major concerns in big data mining approach is with security and privacy. With big data applications such as online social media, mobile services, and smart IoT widely adopted in our daily life, an enormous amount of data has been generated based on various aspects of the individuals. Without a proper security and privacy protection in all aspects of computing environment including communication environment, this can be disclosed intentionally or unintentionally, posing severe threats on the individuals. Moreover, as the storage, delivery, management, processing, and mining of such massive data sets are often outsourced to cloud datacenters, traditional security solutions confined within a well-defined security perimeter fail to be applied in such open and sharing environments. These security and privacy issues pose tremendous barriers to taking advantages from the full use of our huge data assets. As such, it is high time to investigate the security and privacy issues in big data mining by examining big data infrastructure, platforms, and applications in detail hence for the call for this special issue. Potential topics include but are not limited to the following: Fundamental privacy related theory related to big data mining Differentially private big data mining Privacy-preserving big data delivery via wired and wireless communication networks Privacy-preserving big data sharing, publishing, and mining Private big data mining with IoT infrastructure and cloud and fog computing Privacy issues in cloud networking services Privacy issues in big data processing paradigms or platforms (e.g., MapReduce) Privacy issues in machine (deep) learning algorithms, models, and applications Privacy-as-a-Service Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/pibd/. Manuscript Due Friday, 18 August 2017 First Round of Reviews Friday, 10 November 2017 Publication Date Friday, 5 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Security and Privacy in 5G Enabled Network Services
Submission Date: 2017-08-25

Recent advances in wireless and networking technologies such as software-defined networking, virtualization, and data caching accelerate the development for the fifth-generation mobile networks (5G). The next generation wireless network technology is being developed to provide significantly faster wireless networking experiences. It will have the potential to be 100 times faster than the current LTE networking. 5G will provide services such as mobile broadband, connection for smart objects in the context of Internet of Things (IoT), and connection for vehicles as well as utilities in the form of smart grids. In the Internet of Things era, 5G will be an enabler for connecting billions of IoT devices, while creating various new network services such as the Tactile Internet, Mobile Edge Computing, Mobile Cloud Computing, Mobile Fog Computing, Mobility Management, Named Data Networking, and Blockchain based services. Security and privacy are quite notable challenges among other underlying technologies for realizing 5G enabled network services. Threats and risks in the security and privacy have been elevated because of the increasing number of critical services offered such as connectivity to smart objects, smart grids, and vehicles. Large bandwidth and capacity of user smartphones also create new possibilities for attacks on 5G network. Thus, existing security approaches need to be revisited to consider new services, billions of connected devices, and higher capability of user devices. The vulnerabilities in 5G can arise from the basic design philosophy as well as from the flexibilities and opportunities offered by the network. The higher level of security, higher flexibility in the selection of security mechanisms, and higher degree of security automation are thus required for 5G enabled network services while ensuring users’ privacy strongly. The underlying technologies for 5G are not yet matured and standardized, including security and privacy. Researches dealing with security and privacy are still in their preliminary stages and there are many open questions that need to be answered before secure 5G can be designed. In other words, these unexploited and unexplored research areas are in need of intense interest and research from both academia and industry. This special issue aims at publishing high quality research and development results of security and privacy technologies for the 5G enabled network services. The research and development results related to fundamental security and privacy issues are welcome. Linked results such as big data analysis for security and privacy, security and privacy of cloud platforms, and security and privacy issues in intelligent systems are also welcome. Potential topics include but are not limited to the following: Security and privacy in tactile internet services Security and privacy in mobile edge computing services Security and privacy in mobility management services Security and privacy in 5G enabled named data networking services Security and privacy in 5G enabled fog computing services Security and privacy in 5G enabled cloud virtual networking services Security and privacy in 5G enabled blockchain based services Security and privacy architectures and protocols for 5G enabled network services Security measurements in 5G system and network services Security and privacy issues in 5G communication technologies (e.g., D2D, IoT, and VANET) Security and privacy management and policies for 5G enabled network services Threat and vulnerability analysis for 5G enabled network services Big data analysis based cybercrime investigation for 5G enabled network services Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/5gen/. Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Security of Cyberphysical Systems and Industrial Control Systems and Networks
Submission Date: 2017-08-25

Cyberphysical systems (CPS) are large-scale, interconnected physical, and engineered systems made up from heterogeneous components that interact with the physical environment, whose operations are monitored, coordinated, controlled, and integrated by information and communication technologies (ICT). These systems exist everywhere around us and range in size, complexity, and criticality, from embedded systems used in smart vehicles, to Supervisory Control And Data Acquisition (SCADA) systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS) connected through Industrial Control Networks (ICN). As ICS, CPS, and ICN proliferate and increasingly interact with us and affect our life, their security becomes of paramount importance. CPSs have some special characteristics that distinguish them from other types of ICT systems, such as the need for real-time availability, that render the use of known security approaches prohibitive and create new security (and privacy) challenges. Examples of such challenges include, but are not limited to, identifying ways for motivating the industry to adopt best practices, standards and guidelines for preventing attacks against CPSs; developing risk assessment and management methodologies that will combine security, safety, and resilience requirements; developing efficient techniques for intrusion detection that will not only exploit network traffic data but will also take into account the nature and the dynamics of the physical process that is controlled by the CPS, in real or near real time; designing systems resilient to cyberattacks, that is, systems able to operate, perhaps at a lower operational capacity, even when they have been compromised. With this special issue, we intend to bring together researchers, engineers, and governmental actors with an interest in the security of ICS, CPS, and ICN in the context of their increasing exposure to cyberspace. We seek novel submissions describing theoretical and practical security solutions to the security of CPS, ICS, and ICN. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy, manufacturing, autonomous systems, and transportation. We invite submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS, CPS, and ICN. Potential topics include but are not limited to the following: Security governance Security policies Risk analysis and management Vulnerability assessment and metrics Awareness, training, and simulation ICS/CPS/ICN security standards Privacy and anonymity in ICS/CPS/ICN System and network security Threat modeling Security architectures Access control Malware and cyberweapons Intrusion detection and visualization Defense in depth Monitoring and real-time supervision Applied cryptography Perimeter security Safety-security interactions Cybersecurity engineering Secure communication protocols Formal models for ICS/CPS/ICN security Hardware security Resilient ICS/CPS/ICN Application security Secure firmware Incident response and digital forensics for ICS/CPS/ICN Forensics in ICS/CPS/ICN Incident response Accountability Clinical Studies Clinical studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/spsi/. Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Cross-Layer Approaches for Enhancing the Security and Privacy of Wireless Communications and Networking
Submission Date: 2017-08-25

Trillions of network-connected objects are expected to emerge in the global network around 2020, leading to Internet of things (IoT) for which wireless communications and networking are the communications and networking infrastructure. However, IoT and other multihop wireless networks (such as MANETs, WSNs, and Wireless Mesh networks) are subject to threats stemming from increasing reliance on communications and networking technologies. A lot of research advances have been made on communication and network system security for enabling multihop networks, including but not limited to physical layer security; anonymization and privacy methods; cross-layer methods for enhancing security and privacy; availability of communications and survivability of networks in the presence of attacks. Among these potential solutions, cross-layer methods represent one of the most promising solutions for securing multihop networks. We seek high-quality papers focusing on novel cross-layer approaches for enhancing the security and privacy of wireless communications and networking. Papers will be peer-reviewed by independent reviewers and selected based on their quality and relevance to the topics of this special issue. Potential topics include but are not limited to the following: Cross-layer solutions for IoT protection Cross-layer hardware/software attacks and protections on IoT Hardware-supported trustworthy IoT Topographic and data flow modeling for IoT security Non-redundancy-based methods for persistent threat prognostics Security-enhanced hardware structure for IoT protection Trusted computing platforms for smart devices in IoT Interplay between security, trust, and reliability of emerging nanotechnologies Cross-layer security techniques for MANETs, WSNs, WMNs, and WBAN Cognitive cross-layer security mechanisms for wireless networks Intelligent cross-layer protocols (Routing, MAC) Cross-layer intrusion detection systems Cross-layer threats modeling Cross-layer security attacks simulations Cross-layer behavior management Cross-layer Game theoretic security modeling Artificial immune, artificial neural network, and other intelligent modeling for security and privacy Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/cla/. Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Privacy Issues in the Internet of Things
Submission Date: 2017-08-25

Nowadays, the Internet of Things (IoT) became an advanced technology widely deployed in several fields including industry, transportation, energy, home and environment monitoring, and healthcare and wellbeing applications. IoT provides an added value service allowing users to easily supervise their environments and helping them make suitable decisions. IoT is likely to improve the quality of people's lives, create new markets and new opportunities, increase economic growth, and be a momentum for competition. Many research efforts focus on collecting and processing data coming from different connected things. Others proposed novel processing and communication architectures, technologies, and management strategies. IoT systems can leverage wireless sensor networks to collect and process data and use cloud technologies, peer-to-peer systems, and big data paradigms to provide computation and analysis capabilities. The other side of the coin is clearly the security and privacy issues raised by the widespread usage of IoT. Indeed, IoT is based on the large number of wireless sensors which involve accessibility, availability, accuracy, and confidentiality problems. Thus, the security problems start from the data collection phase and continue throughout the collected data life cycle going through the transmission, storage, and processing phases. On the other hand, the increasingly invisible, dense, and pervasive collection, processing, and dissemination of data in the midst of people's private lives give rise to serious privacy concerns. The tracking of personal details of lifestyle, activities, habits, and preferences would potentially be accessible for third or unauthorized persons to see. Through the power of machine learning, someone can then analyze and make predictions about future behaviors of people. The current personal data protection approaches are based mainly on security techniques like data encryption or access control mechanisms. However, the privacy threats in the IoT outstrip these solutions and provoke serious challenges like tracking and profiling leakage, accountability and responsibility, and privacy by design paradigm. This special issue on privacy in the Internet of Things aims to bring together state-of-the-art contributions on IoT privacy, discover the existing IoT privacy challenges, and introduce threat and attacker models that can be applied to IoT architectures and design methods for ensuring privacy of IoT applications and architectures. Original and unpublished contributions are solicited in all aspects of this discipline. Potential topics include but are not limited to the following: Privacy by design in IoT Tracking and profiling threats Middleware for preserving privacy in the Internet of Things Enhanced oil/gas recovery for unconventional resources Big data and privacy issues in the IoT Privacy-preserving data collection and mining in IoT Accountability and responsibility in IoT Privacy-preserving cloud of things New cryptographic approaches for IoT Anonymization techniques for IoT Proactive privacy models for IoT Data retention and disclosure issues in IoT Privacy policies enforcement in IoT Ethics and legal compliance in IoT Voluntary and controlled release of privacy Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/spii/. Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs
Submission Date: 2017-09-01

We are venturing into the new era of Internet of Everything (IoE) where smaller and smarter computing devices have begun to be integrated into the cyber-physical-social environments in which we are living our lives. Despite its great potential, IoE also exposes devices and their users to new security and privacy threats, such as attacks emanating from the Internet that can impact human users’ health and safety. User authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense. However, conventional user authentication mechanisms are not capable of addressing these new challenges. Firstly, it is not possible to directly utilize many Internet-centric security solutions because of the inherent characteristics of IoE devices (e.g., their limited computational capabilities and power supply). Secondly, IoE devices may lack conventional user interfaces, such as keyboards, mice, and touch screens, so that many traditional solutions simply cannot be applied. In summary, the subjects of user authentication in IoE are compelling, yet largely underexplored, and new technologies are needed by both the industry and academia. This special issue aims to provide a venue for researchers to disseminate their recent research ideas and results about user authentication in IoE. Potential topics include but are not limited to the following: Lightweight authentication Password-based authentication Biometric-based authentication Multifactor authentication Continuous/implicit authentication Authentication for fog/edge computing Authentication for cloud computing Anonymous authentication Privacy enhancing technologies for authentication New paradigms for user authentication Attacks on authentication for IoE devices Human aspects of authentication in IoE Foundational principles for authentication Evaluation metrics for authentication schemes Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/uaie/. Manuscript Due Friday, 1 September 2017 First Round of Reviews Friday, 24 November 2017 Publication Date Friday, 19 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Multimedia Security: Novel Steganography and Privacy Preserving
Submission Date: 2017-09-29

With the quick evolution of information technologies, computer networks, and digital imaging technology over the past decades, the modification of media has been greatly leveraged with tools easily available. Meanwhile, the use of media also made sensitive information available to potential eavesdroppers. The credibility of digital media has thus decreased and the demand for new technologies has emerged. Many techniques have been introduced to study their intrinsic principles. Nowadays, many challenges emerge. First, the traditional steganography is now seriously threatened by machine learning based steganalysis. Therefore, new types of steganography, for example, constructive steganography, are urgently needed to combat state-of-the-art steganalysis. Second, when transmitting stego media over social networks, the servers always modify the covers, for example, changing the resolution or recompressing the multimedia. Since the traditional steganography techniques are always fragile, robust steganography is now required. Third, the lack of efficient techniques of privacy preserving is now preventing the development of cloud computing. For example, how to encrypt a JPEG image for cloud storage users and how to reliably solve a complicated computation by outsourcing are still open questions. This special issue focuses on active research areas on multimedia security, such as novel types of steganography, privacy preserving on cloud computing, multimedia tampering detection, and source device identification. We invite the authors to submit original research articles covering theoretical aspects models and solutions to stimulate the development of multimedia security. Potential topics include but are not limited to the following: Latest techniques of steganography and steganalysis Recent developments in multimedia forensics Advances in reversible data hiding in plaintext or ciphertext multimedia Reliable computing and outsourcing of multimedia Novel techniques of multimedia watermarking Privacy preserving of multimedia Authors can submit their manuscripts through the Manuscript Tracking System at https://mts.hindawi.com/submit/journals/scn/mtsc/. Manuscript Due Friday, 29 September 2017 First Round of Reviews Friday, 22 December 2017 Publication Date Friday, 16 February 2018
Last updated by Dou Sun in 2017-04-24
Related Publications
Advertisment
Recommendation