Calls for papers


International Journal of Security and Networks
International Journal of Security and Networks


Special Issue on: "Privacy, Security and Trust in Mobile and Wireless Systems"

Guest Editors:
Kewei Sha, Oklahoma City University, USA
Abhishek Parakh, University of Nebraska Omaha

Recently, mobile wireless devices such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and have attracted significant interest from academia, industry and standard organisations. With the latest cloud computing technology, these mobile wireless devices will play an increasingly important role in computing and communication.

When these devices become pervasive, security, privacy and trust become critical components for the acceptance of applications built for and based on them. Moreover, several favourable characteristics of mobile and wireless devices, including portability, mobility and sensitivity, further increase the challenges of security and privacy in these systems.

Despite recent advances, many research issues still require addressing in the design of secure, privacy-preserving, trusted architectures, protocols, algorithms, services and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth and super sensing capability, more sensitive information will be stored in the devices. Additionally, operating systems running on these devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of these devices.

With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modelling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems.

This special issue aims to bring together works of technologists and researchers who share an interest in the area of security, privacy and trust in mobile and wireless systems, and to explore new venues of collaboration. Its main purpose is to promote discussions about research and relevant activities in the models and designs of secure, privacy-preserving, trusted architectures, protocols, algorithms, services and applications, as well as to analyse cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We seek papers that address theoretical, experimental research, and works-in-progress for security-, privacy- and trust-related issues in the context of mobile and wireless systems.

The issue will carry revised and substantially extended versions of selected papers presented at the MobiPST 2014 workshop held in conjunction with IEEE ICCCN 2014, but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Subject Coverage
Suitable topics include, but are not limited to, the following in relation to security, privacy and trust:

  • Wireless local area networks
  • Wireless sensor networks
  • Wireless mesh networks
  • Wireless ad-hoc networks
  • Vehicular networks
  • Body-area networks
  • Cellular networks (3G, 4G, etc.)
  • WiMAX Networks
  • Machine-to-machine (M2M) networks
  • Software-defined networks (SDN)
  • Social networks
  • Smart grid
  • RFID-based systems
  • Mobile cloud
  • Cyber-physical systems (CPS)
  • Internet of things
  • Location-based service systems
  • Mobile healthcare systems
  • Smart building systems
  • Big data

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our Submitting articles page.

Important Dates

Manuscript due: 10 November, 2014

Acceptance/rejection notification: 30 January, 2015

Final manuscript due: 28 March, 2015