Special Issue "Security and Privacy in Wireless and Mobile Networks"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: 30 June 2017

Special Issue Editors

Guest Editor
Dr. Georgios Kambourakis

Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece
Website | E-Mail
Fax: +30 22730 82009
Interests: mobile and wireless communication systems security and privacy; VoIP security and privacy; mobile medical systems security and privacy; e-learning and m-learning security; DNS Security
Guest Editor
Dr. Félix Gómez Mármol

Dept. of Information and Communications Engineering, University of Murcia, Spain
Website | E-Mail
Interests: intrusion detection systems; security and privacy; Internet of Things
Guest Editor
Dr. Guojun Wang

Dept. of Computer Science and Technology, Central South University, China
Website | E-Mail
Interests: system security; network security; trusted computing

Special Issue Information

Dear Colleagues,

Being the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking has become increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (i) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction, (ii) such devices uniquely identify their users and store sensitive and detailed information about them, and (iii) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the user and the underlying systems have augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures be deployed.

To cope with the aforementioned challenges, this Special Issue is dedicated to the security and privacy aspects of mobile networks, wireless communications, as well as their apps. Particularly, apart from network and link layer security, focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. We encourage original and high-quality contributions, addressing both theoretical and systems research.

Possible topics include but are not limited to:

  • Attacks on MAC layer, Network layer, Security infrastructure, Mobile OS
  • Users' awareness to security solutions for mobile devices
  • Security and privacy considerations for the emerging field of Internet-of-Things
  • Intrusion and malware detection in mobile ecosystems
  • Methods for locating the source of attacks
  • Privacy and security issues for wearable devices
  • Usable mobile security and privacy
  • Wireless and mobile privacy and anonymity
  • BYOD security
  • Location privacy
  • Cellular network security and fraud
  • Mobile botnets
  • Biometric user authentication and continuous authentication for smart devices

Papers with a strong cryptographic background will not be considered as part of this Special Issue.

Submission

Papers will be evaluated based on their originality, presentation, relevance and contribution to the fields of security and privacy, as well as their suitability to the Special Issue, and for their overall quality. The submitted papers have to describe original research which has not been published nor currently under review by other journals or conferences. Guest Editors will make an initial determination of the suitability and scope of all submissions. Papers that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and authors will be promptly informed in such cases.

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the Special Issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed Open Access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 500 CHF (Swiss Francs). English correction and/or formatting fees of 250 CHF (Swiss Francs) will be charged in certain cases for those articles accepted for publication that require extensive additional formatting and/or English corrections.

 

Keywords

Security; privacy; mobile; wireless; threat; attack; vulnerability; defense; intrusion; anonymity; IoT

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessArticle Private and Secure Distribution of Targeted Advertisements to Mobile Phones
Future Internet 2017, 9(2), 16; doi:10.3390/fi9020016
Received: 4 April 2017 / Revised: 24 April 2017 / Accepted: 26 April 2017 / Published: 1 May 2017
PDF Full-text (945 KB) | HTML Full-text | XML Full-text
Abstract
Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, such as websites and app developers, but
[...] Read more.
Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, such as websites and app developers, but at the same time creates a serious privacy threat for users who expose their consumer interests. In this paper, we categorize the available ad-distribution methods and identify their limitations in terms of security, privacy, targeting effectiveness and practicality. We contribute our own system, which utilizes opportunistic networking in order to distribute targeted adverts within a social network. We improve upon previous work by eliminating the need for trust among the users (network nodes) while at the same time achieving low memory and bandwidth overhead, which are inherent problems of many opportunistic networks. Our protocol accomplishes this by identifying similarities between the consumer interests of users and then allows them to share access to the same adverts, which need to be downloaded only once. Although the same ads may be viewed by multiple users, privacy is preserved as the users do not learn each other’s advertising interests. An additional contribution is that malicious users cannot alter the ads in order to spread malicious content, and also, they cannot launch impersonation attacks. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
Figures

Figure 1

Open AccessArticle Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish
Future Internet 2017, 9(2), 11; doi:10.3390/fi9020011
Received: 18 October 2016 / Revised: 20 March 2017 / Accepted: 4 April 2017 / Published: 7 April 2017
PDF Full-text (399 KB) | HTML Full-text | XML Full-text
Abstract
Advancements in information and communication technologies have enhanced our possibilities to communicate worldwide, eliminating borders and making it possible to interact with people coming from other cultures like never happened before. Such powerful tools have brought us to reconsider our concept of privacy
[...] Read more.
Advancements in information and communication technologies have enhanced our possibilities to communicate worldwide, eliminating borders and making it possible to interact with people coming from other cultures like never happened before. Such powerful tools have brought us to reconsider our concept of privacy and social involvement in order to make them fit into this wider environment. It is possible to claim that the information and communication technologies (ICT) revolution is changing our world and is having a core role as a mediating factor for social movements (e.g., Arab spring) and political decisions (e.g., Brexit), shaping the world in a faster and shared brand new way. It is then interesting to explore how the perception of this brand new environment (in terms of social engagement, privacy perception and sense of belonging to a community) differs even in similar cultures separated by recent historical reasons. Recent historical events may in effect have shaped a different psychological representation of Participation, Privacy and Sense of Community in ICT environments, determining a different perception of affordances and concerns of these complex behaviors. The aim of this research is to examine the relation between the constructs of Sense of Community, Participation and Privacy compared with culture and gender, considering the changes that have occurred in the last few years with the introduction of the web environment. A questionnaire, including ad hoc created scales for Participation and Privacy, have been administered to 180 participants from Turkey and Italy. In order to highlight the cultural differences in the perception of these two constructs, we have provided a semantic differential to both sub-samples showing interesting outcomes. The results are then discussed while taking into account the recent history of both countries in terms of the widespread of new technologies, political actions and protest movements. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
Figures

Figure 1

Open AccessArticle An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning
Future Internet 2017, 9(1), 7; doi:10.3390/fi9010007
Received: 23 December 2016 / Revised: 28 February 2017 / Accepted: 1 March 2017 / Published: 5 March 2017
PDF Full-text (3134 KB) | HTML Full-text | XML Full-text
Abstract
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy
[...] Read more.
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy protection in smart home applications, since attacks can be launched even without the need for access to the cipher. Rather, attacks can be successfully realized through analyzing the frequency of radio signals, as well as the timestamp series, so that the daily activities of the residents in the smart home can be learnt. Such types of attacks can achieve a very high success rate, making them a great threat to users’ privacy. In this paper, we propose an adaptive method based on sample data analysis and supervised learning (SDASL), to hide the patterns of daily routines of residents that would adapt to dynamically changing network loads. Compared to some existing solutions, our proposed method exhibits advantages such as low energy consumption, low latency, strong adaptability, and effective privacy protection. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
Figures

Figure 1

Journal Contact

MDPI AG
Future Internet Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
E-Mail: 
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Special Issue Edit a special issue Review for Future Internet
loading...
Back to Top