Security in Mobile Communications and Computing

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (11 November 2022) | Viewed by 6093

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, Asia University, Taichung 41354, Taiwan
Interests: mobile computing security; blockchain technology; cryptography; steganography; network and communication security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The long-term vision of mobile communication and computing is to transform the network into an energy-saving distributed computer that can be flexibly and dynamically created and moved to meet users' needs. To make this vision a reality, it must continuously improve innovative service management and network communication technologies. However, the main challenge facing these mobile computing technologies is protecting networks and system assets (i.e., services, data, and network infrastructure) from potential network security risks brought about by unprecedented hacker threats.

This Special Issue aims to gather the latest research results concerning security in mobile communication and computing. Researchers, experts, and scholars are encouraged to present their contributions and research directions on this issue.

Topics of interest include, but are not limited to:

  • Security, privacy, and trust in mobile communications and computing;
  • Security, privacy, and trust in 5G/beyond 5G and 6G;
  • Security, privacy, and trust in VANET;
  • Security, privacy, and trust in the IoT;
  • Artificial intelligence/machine learning techniques in security for mobile communications and computing;
  • Security, privacy, and trust of digital twins;
  • Security, privacy, and trust in edge computing.

Prof. Dr. Min-Shiang Hwang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 1941 KiB  
Article
Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites
by Hengfei Cheng, Zhaobin Xu, Xiaoxu Guo, Jia Yang, Kedi Xu, Shuqin Liu, Zhonghe Jin and Xiaojun Jin
Future Internet 2022, 14(7), 207; https://doi.org/10.3390/fi14070207 - 04 Jul 2022
Viewed by 1610
Abstract
Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy algorithms and their derivatives also have some limitations. [...] Read more.
Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy algorithms and their derivatives also have some limitations. The path delay calculated by the flooding algorithm is small but the calculation is large, while the greedy algorithm is the opposite. In this paper, a balanced inter-satellite routing algorithm based on partition routing is proposed. This paper presents the simulation experiments for the following indexes of the classic inter-satellite routing algorithms and the balanced partition routing algorithm: computation complexity, single-node computation pressure, routing path delay, path delay variance (data in Topo table satisfy μ =5, σ2=10). The results reveal that the balanced partition routing algorithm achieves better performance. In this paper, two optimization directions of the balanced partition routing algorithm are simulated under conditions that the data in the Topo table satisfy μ =5, σ2= 6, σ2=10 and σ2=15, respectively, when comparing their performance indicators. The experiments show that these two optimization methods can be adapted to various application scenarios and can further reduce the hardware cost of satellite nodes. Full article
(This article belongs to the Special Issue Security in Mobile Communications and Computing)
Show Figures

Figure 1

20 pages, 4653 KiB  
Article
Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile
Future Internet 2022, 14(5), 145; https://doi.org/10.3390/fi14050145 - 10 May 2022
Cited by 18 | Viewed by 3695
Abstract
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their management. The [...] Read more.
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their management. The classical security approaches are not suitable in WSNs given the limited resources of the nodes, which subsequently require lightweight cryptography mechanisms in order to achieve high security levels. In this paper, a security analysis is provided comparing BMAC and LMAC protocols, in order to determine, using AES, RSA, and elliptic curve techniques, the protocol with the best trade-off in terms of received packets and energy consumption. Full article
(This article belongs to the Special Issue Security in Mobile Communications and Computing)
Show Figures

Figure 1

Back to TopTop