Special Issue "Selected Papers from 3rd International Conference on Future Networks and Distributed Systems (ICFNDS 2019)"

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708).

Deadline for manuscript submissions: closed (30 November 2019).

Special Issue Editors

Dr. Mohammad Hammoudeh

Guest Editor
School of Computing, Math and Digital Technology, Manchester Metropolitan University, Manchester M15 6BH, UK
Interests: wireless sensor networks; Internet of things; wireless ad hoc communications; mobile communications; network security; sensor/actuator networks; cyber–physical systems
Special Issues and Collections in MDPI journals
Dr. Ahcène Bounceur
Website
Guest Editor
Lab-STICC Laboratory, CNRS UMR 6285, University of Brest, 29200, Brest, France
Interests: wireless sensor networks; Internet of Things; Simulation; Optimization; Distributed Algorithms
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

As massively distributed computing dominates the landscape, transformative technologies such as software-defined networking (SDN) and network functions virtualization (NFV) is playing a key role in the design of “next-generation” infrastructure. With the race to the fifth-generation mobile communications (5G) already underway, business and network operators are increasingly seeking to realize the opportunities to keep pace with business needs. Today, research and development in future networks and distributed systems are centered on 5G, Internet of Things (IoT), software-driven, automated, and intelligent networks.

The deployment of innovative networking technologies and development of new commercial models has driven research into various networking infrastructures that are becoming primary parts of our daily lives. The breadth of existing algorithms and architectures for parallel and distributed computing combined with the proliferation of future wireless technologies and electronic devices, resulted in fast-growing applications of future networks and highly decentralized systems. Future networks and distributed systems research is an interdisciplinary research field involving academic researchers in computer science, communication engineering, physics, and social and behavior studies, as well as information technology industry consultants and practitioners to support multi-service, multimedia services convergence, service ubiquity and context awareness, mobility, fixed-mobile convergence, variable connectivity, quality of service, spontaneous and autonomic networking, cybersecurity, and other capabilities.

This Special Issue aims to provide a contribution by presenting cutting edge research advances and state-of-the-art knowledge on future networks and distributed systems ranging from theoretical analysis to case studies in the deployment of networking services/applications. This Special Issue particularly welcomes contributions on wireless, sensor, and actuator networks in the context of smart cities or intelligent critical infrastructure. Carefully selected contributions from the International Conference on Future Networks and Distributed Systems (ICFNDS) 2019 will be invited to submit extended versions of their papers to this Special Issue, particularly papers presenting novel theoretical and applied advances in the interdisciplinary field sensor and actuator networks.

ICFNDS was established in 2017 to address advances in research on distributed systems and future networks, covering topics ranging from enabling technologies to emerging applications and industrial experiences. CFNDS aims to encourage both researchers and practitioners to exchange and share their experiences and recent studies in an interactive atmosphere. Authors are solicited to contribute original, unpublished contributions in all aspects of future networking and distributed systems. Submitted articles must not be concurrently considered elsewhere for publication. The 2017 ICFNDS meeting was held at The Møller Centre, Churchill College, University of Cambridge, Cambridge, UK. The 2018 ICFNDS meeting was held at The Middle East University, Amman, Jordan. This year, ICFNDS will be held in July at the University of Paris Sud, France.

Dr. Mohammad Hammoudeh
Dr. Ahcène Bounceur
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Next generation networks
  • 5G
  • Wireless communications
  • Distributed systems
  • Sensor and actuator networks
  • Smart cities
  • Intelligent infrastructure
  • Network security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices
J. Sens. Actuator Netw. 2020, 9(1), 1; https://doi.org/10.3390/jsan9010001 - 20 Dec 2019
Cited by 1
Abstract
Emerging Mobile Cloud Computing (MCC) technologies offer a new world of promise by leveraging the quality of mobile services. With MCC, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. While MCC adoption is growing significantly, several [...] Read more.
Emerging Mobile Cloud Computing (MCC) technologies offer a new world of promise by leveraging the quality of mobile services. With MCC, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. While MCC adoption is growing significantly, several challenges need to be addressed to make MCC-based solutions scale and meet the ever-growing demand for more resource intensive applications. Security is a critical problem hindering the adoption of MCC. One of the most important aspects of MCC security is to establish authenticated communication sessions between mobile devices and cloud servers. The huge amount of data stored on mobile devices poses information security risks and privacy concerns for individuals, enterprises, and governments. The ability to establish authenticated communication sessions between mobile devices and cloud servers can resolve many security concerns. Limited computing and energy resources on mobile devices makes authentication and encryption a challenging task. In this paper, an overview of MCC authentication protocols is presented. Then, a Dual-Factor Authentication Protocol for MCC devices (D-FAP) is proposed. D-FAP aims at increasing authentication security by using multi-factors while offloading computation to the cloud to reduce battery consumption. The security of the protocol is formally verified and informal analysis is performed for various attacks. The results prove that the D-FAP is successful in mitigating various outsider and insider attacks. Full article
Show Figures

Figure 1

Back to TopTop