Journal Information
Security and Communication Networks (SCN)
Impact Factor:

Call For Papers
Security and Communication Networks is an international journal publishing original research and review papers on all security areas including network security, cryptography, cyber security, etc. The emphasis is on security protocols, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms.

The journal provides a prestigious forum for the R&D community in academia and industry working at the inter-disciplinary nexus of next generation communications technologies for security implementations in all network layers.

Answering the highly practical and commercial importance of network security R&D, submissions of applications-oriented papers describing case studies and simulations are encouraged as well as research analysis-type papers.

The most recent Impact Factor for Security and Communication Networks is 0.806 according to the 2015 Journal Citation Reports released by Thomson Reuters in 2016.

Content published prior to 2017 is hosted on the Wiley Online Library.

Security and Communication Networks currently has an acceptance rate of 17%. The average time between submission and final decision is 56 days and the average time between acceptance and publication is 44 days. 
Last updated by Dou Sun in 2017-04-24
Special Issues
Special Issue on Security and Privacy in 5G Enabled Network Services
Submission Date: 2017-08-25

Recent advances in wireless and networking technologies such as software-defined networking, virtualization, and data caching accelerate the development for the fifth-generation mobile networks (5G). The next generation wireless network technology is being developed to provide significantly faster wireless networking experiences. It will have the potential to be 100 times faster than the current LTE networking. 5G will provide services such as mobile broadband, connection for smart objects in the context of Internet of Things (IoT), and connection for vehicles as well as utilities in the form of smart grids. In the Internet of Things era, 5G will be an enabler for connecting billions of IoT devices, while creating various new network services such as the Tactile Internet, Mobile Edge Computing, Mobile Cloud Computing, Mobile Fog Computing, Mobility Management, Named Data Networking, and Blockchain based services. Security and privacy are quite notable challenges among other underlying technologies for realizing 5G enabled network services. Threats and risks in the security and privacy have been elevated because of the increasing number of critical services offered such as connectivity to smart objects, smart grids, and vehicles. Large bandwidth and capacity of user smartphones also create new possibilities for attacks on 5G network. Thus, existing security approaches need to be revisited to consider new services, billions of connected devices, and higher capability of user devices. The vulnerabilities in 5G can arise from the basic design philosophy as well as from the flexibilities and opportunities offered by the network. The higher level of security, higher flexibility in the selection of security mechanisms, and higher degree of security automation are thus required for 5G enabled network services while ensuring users’ privacy strongly. The underlying technologies for 5G are not yet matured and standardized, including security and privacy. Researches dealing with security and privacy are still in their preliminary stages and there are many open questions that need to be answered before secure 5G can be designed. In other words, these unexploited and unexplored research areas are in need of intense interest and research from both academia and industry. This special issue aims at publishing high quality research and development results of security and privacy technologies for the 5G enabled network services. The research and development results related to fundamental security and privacy issues are welcome. Linked results such as big data analysis for security and privacy, security and privacy of cloud platforms, and security and privacy issues in intelligent systems are also welcome. Potential topics include but are not limited to the following: Security and privacy in tactile internet services Security and privacy in mobile edge computing services Security and privacy in mobility management services Security and privacy in 5G enabled named data networking services Security and privacy in 5G enabled fog computing services Security and privacy in 5G enabled cloud virtual networking services Security and privacy in 5G enabled blockchain based services Security and privacy architectures and protocols for 5G enabled network services Security measurements in 5G system and network services Security and privacy issues in 5G communication technologies (e.g., D2D, IoT, and VANET) Security and privacy management and policies for 5G enabled network services Threat and vulnerability analysis for 5G enabled network services Big data analysis based cybercrime investigation for 5G enabled network services Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Security of Cyberphysical Systems and Industrial Control Systems and Networks
Submission Date: 2017-08-25

Cyberphysical systems (CPS) are large-scale, interconnected physical, and engineered systems made up from heterogeneous components that interact with the physical environment, whose operations are monitored, coordinated, controlled, and integrated by information and communication technologies (ICT). These systems exist everywhere around us and range in size, complexity, and criticality, from embedded systems used in smart vehicles, to Supervisory Control And Data Acquisition (SCADA) systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS) connected through Industrial Control Networks (ICN). As ICS, CPS, and ICN proliferate and increasingly interact with us and affect our life, their security becomes of paramount importance. CPSs have some special characteristics that distinguish them from other types of ICT systems, such as the need for real-time availability, that render the use of known security approaches prohibitive and create new security (and privacy) challenges. Examples of such challenges include, but are not limited to, identifying ways for motivating the industry to adopt best practices, standards and guidelines for preventing attacks against CPSs; developing risk assessment and management methodologies that will combine security, safety, and resilience requirements; developing efficient techniques for intrusion detection that will not only exploit network traffic data but will also take into account the nature and the dynamics of the physical process that is controlled by the CPS, in real or near real time; designing systems resilient to cyberattacks, that is, systems able to operate, perhaps at a lower operational capacity, even when they have been compromised. With this special issue, we intend to bring together researchers, engineers, and governmental actors with an interest in the security of ICS, CPS, and ICN in the context of their increasing exposure to cyberspace. We seek novel submissions describing theoretical and practical security solutions to the security of CPS, ICS, and ICN. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy, manufacturing, autonomous systems, and transportation. We invite submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS, CPS, and ICN. Potential topics include but are not limited to the following: Security governance Security policies Risk analysis and management Vulnerability assessment and metrics Awareness, training, and simulation ICS/CPS/ICN security standards Privacy and anonymity in ICS/CPS/ICN System and network security Threat modeling Security architectures Access control Malware and cyberweapons Intrusion detection and visualization Defense in depth Monitoring and real-time supervision Applied cryptography Perimeter security Safety-security interactions Cybersecurity engineering Secure communication protocols Formal models for ICS/CPS/ICN security Hardware security Resilient ICS/CPS/ICN Application security Secure firmware Incident response and digital forensics for ICS/CPS/ICN Forensics in ICS/CPS/ICN Incident response Accountability Clinical Studies Clinical studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Cross-Layer Approaches for Enhancing the Security and Privacy of Wireless Communications and Networking
Submission Date: 2017-08-25

Trillions of network-connected objects are expected to emerge in the global network around 2020, leading to Internet of things (IoT) for which wireless communications and networking are the communications and networking infrastructure. However, IoT and other multihop wireless networks (such as MANETs, WSNs, and Wireless Mesh networks) are subject to threats stemming from increasing reliance on communications and networking technologies. A lot of research advances have been made on communication and network system security for enabling multihop networks, including but not limited to physical layer security; anonymization and privacy methods; cross-layer methods for enhancing security and privacy; availability of communications and survivability of networks in the presence of attacks. Among these potential solutions, cross-layer methods represent one of the most promising solutions for securing multihop networks. We seek high-quality papers focusing on novel cross-layer approaches for enhancing the security and privacy of wireless communications and networking. Papers will be peer-reviewed by independent reviewers and selected based on their quality and relevance to the topics of this special issue. Potential topics include but are not limited to the following: Cross-layer solutions for IoT protection Cross-layer hardware/software attacks and protections on IoT Hardware-supported trustworthy IoT Topographic and data flow modeling for IoT security Non-redundancy-based methods for persistent threat prognostics Security-enhanced hardware structure for IoT protection Trusted computing platforms for smart devices in IoT Interplay between security, trust, and reliability of emerging nanotechnologies Cross-layer security techniques for MANETs, WSNs, WMNs, and WBAN Cognitive cross-layer security mechanisms for wireless networks Intelligent cross-layer protocols (Routing, MAC) Cross-layer intrusion detection systems Cross-layer threats modeling Cross-layer security attacks simulations Cross-layer behavior management Cross-layer Game theoretic security modeling Artificial immune, artificial neural network, and other intelligent modeling for security and privacy Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Privacy Issues in the Internet of Things
Submission Date: 2017-08-25

Nowadays, the Internet of Things (IoT) became an advanced technology widely deployed in several fields including industry, transportation, energy, home and environment monitoring, and healthcare and wellbeing applications. IoT provides an added value service allowing users to easily supervise their environments and helping them make suitable decisions. IoT is likely to improve the quality of people's lives, create new markets and new opportunities, increase economic growth, and be a momentum for competition. Many research efforts focus on collecting and processing data coming from different connected things. Others proposed novel processing and communication architectures, technologies, and management strategies. IoT systems can leverage wireless sensor networks to collect and process data and use cloud technologies, peer-to-peer systems, and big data paradigms to provide computation and analysis capabilities. The other side of the coin is clearly the security and privacy issues raised by the widespread usage of IoT. Indeed, IoT is based on the large number of wireless sensors which involve accessibility, availability, accuracy, and confidentiality problems. Thus, the security problems start from the data collection phase and continue throughout the collected data life cycle going through the transmission, storage, and processing phases. On the other hand, the increasingly invisible, dense, and pervasive collection, processing, and dissemination of data in the midst of people's private lives give rise to serious privacy concerns. The tracking of personal details of lifestyle, activities, habits, and preferences would potentially be accessible for third or unauthorized persons to see. Through the power of machine learning, someone can then analyze and make predictions about future behaviors of people. The current personal data protection approaches are based mainly on security techniques like data encryption or access control mechanisms. However, the privacy threats in the IoT outstrip these solutions and provoke serious challenges like tracking and profiling leakage, accountability and responsibility, and privacy by design paradigm. This special issue on privacy in the Internet of Things aims to bring together state-of-the-art contributions on IoT privacy, discover the existing IoT privacy challenges, and introduce threat and attacker models that can be applied to IoT architectures and design methods for ensuring privacy of IoT applications and architectures. Original and unpublished contributions are solicited in all aspects of this discipline. Potential topics include but are not limited to the following: Privacy by design in IoT Tracking and profiling threats Middleware for preserving privacy in the Internet of Things Enhanced oil/gas recovery for unconventional resources Big data and privacy issues in the IoT Privacy-preserving data collection and mining in IoT Accountability and responsibility in IoT Privacy-preserving cloud of things New cryptographic approaches for IoT Anonymization techniques for IoT Proactive privacy models for IoT Data retention and disclosure issues in IoT Privacy policies enforcement in IoT Ethics and legal compliance in IoT Voluntary and controlled release of privacy Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 25 August 2017 First Round of Reviews Friday, 17 November 2017 Publication Date Friday, 12 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs
Submission Date: 2017-09-01

We are venturing into the new era of Internet of Everything (IoE) where smaller and smarter computing devices have begun to be integrated into the cyber-physical-social environments in which we are living our lives. Despite its great potential, IoE also exposes devices and their users to new security and privacy threats, such as attacks emanating from the Internet that can impact human users’ health and safety. User authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense. However, conventional user authentication mechanisms are not capable of addressing these new challenges. Firstly, it is not possible to directly utilize many Internet-centric security solutions because of the inherent characteristics of IoE devices (e.g., their limited computational capabilities and power supply). Secondly, IoE devices may lack conventional user interfaces, such as keyboards, mice, and touch screens, so that many traditional solutions simply cannot be applied. In summary, the subjects of user authentication in IoE are compelling, yet largely underexplored, and new technologies are needed by both the industry and academia. This special issue aims to provide a venue for researchers to disseminate their recent research ideas and results about user authentication in IoE. Potential topics include but are not limited to the following: Lightweight authentication Password-based authentication Biometric-based authentication Multifactor authentication Continuous/implicit authentication Authentication for fog/edge computing Authentication for cloud computing Anonymous authentication Privacy enhancing technologies for authentication New paradigms for user authentication Attacks on authentication for IoE devices Human aspects of authentication in IoE Foundational principles for authentication Evaluation metrics for authentication schemes Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 1 September 2017 First Round of Reviews Friday, 24 November 2017 Publication Date Friday, 19 January 2018
Last updated by Dou Sun in 2017-04-24
Special Issue on Network Security and Management in SDN
Submission Date: 2017-09-29

Software Defined Networking (SDN) enables flexible deployment and innovation of new networking applications by decoupling and abstracting the control and data planes. It has radically changed the concept and way that we build, and manage networked systems, and reduced the barriers to entry for new players in the services markets. Recently, SDN has been widely studied and applied to facilitate network management and new network security systems development. However, the separation of control and data planes makes SDN vulnerable to security threats. Attackers can monitor and tamper network management information, disrupt network communication by implementing man-in-the-middle attacks, saturation attacks, denial of service attacks, etc. Therefore, it is important to analyze the vulnerability, improve trust management, and design defense mechanism for securing SDN based systems. Although some important progress has been made in SDN security, there are still many technical challenges. In this special issue, we welcome submissions addressing the underlying technical issues in the area of network security and management in SDN and aim to publish papers presenting recent research results and implementation experiences from both academia and industrial community. Survey papers offering a perspective on related work and identifying promising directions will also be considered. Potential topics include, but are not limited to: -Vulnerability analysis and evaluations in SDN -Network Architecture of securing SDN -Employment experiences of securing SDN -Attack detection and desponse in SDN -Abnormal traffic detection in SDN -Potential solution of securing SDN -Network and flow verification in SDN -Protection and restoration in SDN -Protocol of securing SDN -QoS/QoE of securing SDN -Authentication of securing SDN -Data Plane Protection in SDN -Control Plane Protection in SDN -Test-bed and proof of concept -Trust management in SDN -Measurement in securing SDN
Last updated by Dou Sun in 2017-06-03
Special Issue on Multimedia Security: Novel Steganography and Privacy Preserving
Submission Date: 2017-09-29

With the quick evolution of information technologies, computer networks, and digital imaging technology over the past decades, the modification of media has been greatly leveraged with tools easily available. Meanwhile, the use of media also made sensitive information available to potential eavesdroppers. The credibility of digital media has thus decreased and the demand for new technologies has emerged. Many techniques have been introduced to study their intrinsic principles. Nowadays, many challenges emerge. First, the traditional steganography is now seriously threatened by machine learning based steganalysis. Therefore, new types of steganography, for example, constructive steganography, are urgently needed to combat state-of-the-art steganalysis. Second, when transmitting stego media over social networks, the servers always modify the covers, for example, changing the resolution or recompressing the multimedia. Since the traditional steganography techniques are always fragile, robust steganography is now required. Third, the lack of efficient techniques of privacy preserving is now preventing the development of cloud computing. For example, how to encrypt a JPEG image for cloud storage users and how to reliably solve a complicated computation by outsourcing are still open questions. This special issue focuses on active research areas on multimedia security, such as novel types of steganography, privacy preserving on cloud computing, multimedia tampering detection, and source device identification. We invite the authors to submit original research articles covering theoretical aspects models and solutions to stimulate the development of multimedia security. Potential topics include but are not limited to the following: Latest techniques of steganography and steganalysis Recent developments in multimedia forensics Advances in reversible data hiding in plaintext or ciphertext multimedia Reliable computing and outsourcing of multimedia Novel techniques of multimedia watermarking Privacy preserving of multimedia Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 29 September 2017 First Round of Reviews Friday, 22 December 2017 Publication Date Friday, 16 February 2018
Last updated by Dou Sun in 2017-04-24
Related Publications