Special Issue "Security and Privacy of Wireless Networks"

Special Issue Editor

Guest Editor
Prof. Claude Chaudet

Department of Computer Science and Mathematics, Webster University Geneva, 15, Route de Collex, 1293 Bellevue, Switzerland
Website | E-Mail
Phone: +41 22 959 80 19
Interests: wireless sensor networks; smart cities; smart grids; smart buildings; security; privacy; stochastic models; graph theory

Special Issue Information

Dear Colleagues,

From laptops to smartphones and from connected objects to mobile cyber-physical systems, the number of wireless devices has tremendously increased over the past two decades, as evidenced by the mobile traffic growth rate. If the underlying wireless networks rely on very different architectures and technologies, ranging from centralized cellular networks to distributed ad-hoc-like networks, they all present a relative fragility when it comes to security. Today, users are surrounded and even carry a real ecosystem of connected devices, whose complexity makes it difficult to monitor, control and to protect.

Despite their heterogeneous profiles, the use of a wireless medium by itself naturally exposes the network to opportunistic attackers. The multiplication of devices and their capability to connect to multiple networks simultaneously eases malevolent software propagation by circumventing network barriers. In addition, the constraints that stem from the use of portable battery-powered devices limit the usage of computationally intensive solutions.

From the user's point of view, the growing presence of connected devices into most human activities and the number of portable devices accompanying humans constantly pose serious challenges when it comes to privacy preservation.

For this Special Issue, we invite authors to submit original, previously unpublished articles concerning all types of wireless networks, including 4G/5G networks, Wireless Local Area Networks, ad-hoc, sensors, mesh, vehicular, body area and delay tolerant networks. We welcome theoretical and practical contributions addressing all aspects of wireless networks security and privacy, including:

  • Privacy and anonymity
  • Attacks and threats characterization
  • Intrusion Detection & Prevention
  • Networks forensics
  • Authentication
  • Access Control
  • Key distribution & management
  • Cryptography and cryptanalysis
  • Trust models & trust management
  • Secure Architectures
  • Wireless Networks resilience

Prof. Claude Chaudet
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless Networks
  • Security
  • Privacy
  • Trust
  • Internet of Things
  • Cybersecurity

Published Papers

This special issue is now open for submission.
Back to Top