Sensor Networks Call for Papers:
Special Collection on Security and Privacy in Distributed Networks and Internet of Vehicles
To have your paper included, submit by January 31, 2019
Currently, most computing systems, including cloud computing, vehicle networks, and Cyber-Physical Systems (CPS), are mostly parallel and distributed systems. However, the distributed nature may expose these systems to unexpected security and privacy issues, i.e., the vulnerability vectors may be shared by the whole system or network, as all system devices or sensors are connected with each other.
In addition, Internet of Vehicles (IoV) receives more attention, as it is an important part of intelligent transportation system. It enables information sharing and the gathering of information on vehicles, roads, and their surroundings through V2X communications, e.g., vehicle-to-vehicle (V2V), vehicle-to-roadside unit (V2R), vehicle-to-people (V2P), and vehicle-to-network communications. Based on V2X communications, many safety-related and value-added applications can be realized. For instances, vehicle guidance and supervision, real-time road traffic information sharing, and infotainment. With the rapid development of communication and computation technologies, IoV can provide many commercial interests and research values.
Generally, distributed sensor networks and IoV can offer tremendous benefits; however, they are also facing various security and privacy issues. A distributed sensor network, and an IoV system may be attacked by different intrusion approaches, e.g., jamming, tampering and eavesdropping. The major security concerns include but not limited to authenticity, confidentiality, integrity and availability. Moreover, security in IoV also implies the ability to ensure vehicle responsibility while maintaining vehicle privacy, i.e., drivers’ identities and location history are a kind of sensitive information. Over the years, many secure and privacy-preserving schemes have been proposed for distributed sensor networks and IoV, but they still face many challenges. For instance, how to verify and transmit numerous (vehicular) messages in high-density traffic, and how to manage security and privacy in distributed sensor networks and IoV in a decentralized and trustworthy manner.
This Special Collection aims to attract contributions from both academic and industrial organizations addressing emerging security and privacy issues in distributed sensor networks and IoV, and to publish consolidated research results focusing on analyzing security and privacy threats, applying cutting-edge technologies to provide secure and privacy-preserving communications in this field.
The potential topics include, but are not limited to the following:
-
Security framework of distributed networks and IoV
-
Privacy-preserving data aggregation for distributed networks and IoV
-
Privacy evaluation for distributed networks and IoV
-
Secure routing for distributed networks and IoV
-
Secure and privacy-preserving distributed networks and IoV
-
Secure vehicular fog computing for distributed networks and IoV
-
Security in cloud-based distributed networks and IoV
-
Access control in distributed networks and IoV
-
Vulnerability scanning technologies for distributed networks and IoV
-
Intrusion detection technologies for distributed networks and IoV
Keywords: Distributed network, security challenges, privacy issues, vehicle network, security and privacy solutions, intrusion detection
Deadline for submissions
January 31, 2019
Lead Guest Editor
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Weizhi Meng received his Ph.D in the Department of Computer Science from the City University of Hong Kong (CityU), Kowloon, Hong Kong in 2013. He is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark, Denmark. Prior to that, he worked as a research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU. His research interests are cyber security including intrusion detection, mobile security and biometric authentication, malware detection, HCI security, cloud security, and intelligent security applications. He won the Outstanding Academic Performance Award during his doctoral study and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in both 2014 and 2017. He has been a program committee member for various security conferences and a guest editor for Future Generation Computer Systems and Journal of Information Security and Applications, Security Communications and Networks, and Sensors with MDPI.
Guest Editors
Prof. Lei Zhang, East China Normal University, China
Lei Zhang received his Ph.D. degree in computer engineering from Universitat Rovira i Virgili, Tarragona, Spain. Since then, he has been with Universitat Rovira i Virgili, Tarragona, Spain, as a Postdoctoral Researcher. He is a full Professor with the School of Computer Science and Software Engineering, East China Normal University, Shanghai, China. He has been a holder/co-holder of more than 10 China/Spain-funded (key) projects. His fields of activity are VANET security, cloud security, cryptography and data privacy. He has authored over 70 publications, including: IEEE Transactions on Information Forensics and Security, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Vehicular Technology, IEEE Transactions on Computers, IEEE-ACM Transactions on Networking, ESORICS 2014, ASIACRYPT 2011. He is the editors of several international journals, and, was the Guest Editor of Future Generation Computer Systems. He has served in the program committee of more than 40 international conferences, in the steering committee of 2 international conferences, and as a technical reviewer for over 40 major scientific journals in information security and privacy.
Dr. Chunhua Su, University of Aizu, Japan
Chunhua Su received the B.S. degree for Beijing Electronic and Science Institute in 2003 and received his M.S. and PhD of computer science from Faculty of Engineering, Kyushu University in 2006 and 2009, respectively. He is currently working as an Associate Professor in Division of Computer Science, University of Aizu. He has worked as a research scientist in Cryptography & Security Department of the Institute for Infocomm Research, Singapore from 2011-2013. From 2013-2016, he has worked as an Assistant professor in School of Information Science, Japan Advanced Institute of Science and Technology. From 2016-2017, he worked as Assistant Professor in Graduate School of Engineering, Osaka University. His research interests include cryptanalysis, cryptographic protocols, privacy-preserving technologies in data mining and IoT security & privacy.
Prof. Kouichi Sakurai, Kyushu University, Japan
Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography and information security at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of associate professor, and became a full professor there in 2002. He is concurrently working also with the Institute of Systems & Information Technologies and Nanotechnologies, as the chief of Information Security laboratory, for promoting research co-oporations among the industry, university and government under the theme "Enhancing IT-security in social systems". He has been successful in generating such co-operation between Japan, China and Korea for security technologies as the leader of a Cooperative International Research Project supported by the National Institute of Information and Communications Technology (NICT) during 2005-2006. Moreover, in March 2006, he established research co-oporations under a Memorandum of Understanding in the field of information security with Professor Bimal Kumar Roy, the first time Japan has partnered with The Cryptology Research Society of India (CRSI). Professor Sakurai has published more than 250 academic papers around cryptography and information security.
Add Email Alerts
close Add Email Alerts DialogYou are adding the following journals to your email alerts
