Secure Computation on 4G/5G Enabled...

Preview:

Citation preview

EditorialSecure Computation on 4G/5G Enabled Internet-of-Things

Karl Andersson ,1 Ilsun You ,2 Rahim Rahmani,3 and Vishal Sharma 2

1Lulea University of Technology, Lulea, Sweden2Soonchunhyang University, Asan, Republic of Korea3Stockholm University, Stockholm, Sweden

Correspondence should be addressed to Karl Andersson; karl.andersson@ltu.se

Received 30 April 2019; Accepted 30 April 2019; Published 2 June 2019

Copyright © 2019 Karl Andersson et al.�is is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

�e rapid development of Internet-of-�ings (IoT) tech-niques in 4G/5G deployments is witnessing the generationof massive amounts of data which are collected, stored, pro-cessed, and presented in an easily interpretable form.Analysisof IoT data helps provide smart services such as smart homes,smart energy, smart health, and smart environments through4G and 5G technologies. At the same time, the threat ofthe cyberattacks and issues with mobile internet security isbecoming increasingly severe, which introduces new chal-lenges for the security of IoT systems and applications andthe privacy of individuals thereby. Protecting IoTdata privacywhile enabling data availability is an urgent but difficult task.

Data privacy in a distributed environment like IoT canbe attained through secure multiparty computation. Anemerging area of potential applications for secure computa-tion is to address privacy concerns in data aggregation andanalysis to match the explosive growth of the amount ofIoT data. However, the inherent complexity of IoT systemsreally complicates the design and deployment of efficient,interoperable, and scalable secure computation mechanisms.As a result, there is an increasing demand for the developmentof new secure computation methods and tools which can fillin the gap between security and practical usage in IoT.

�e scope of this special issue is in line with recentcontributions from academia and industry on the recentactivities that tackle the technical challenges making com-puting secure on 4G/5G enabled Internet-of-�ings. For thecurrent issue, we are pleased to introduce a collection ofpapers covering a range of topics such as securely verifiableremote erasure schemes, multiuser identification algorithms,privacy-preserving shared storage, situational aware threat

assessment, authorized client-side deduplication in cloudstorage, radio environment map construction, analysis ofthe vulnerabilities of connected car environments, combatpollution attacks in 5G multihop networks, automaticallytraceback RDP-based targeted ransomware attacks, multires-olution face recognition through virtual faces generation,anonymous communication via anonymous identity-basedencryption, and Secure Storage and Retrieval of IoT Data.

Conflicts of Interest

�e editors declare that they have no conflicts of interestregarding the publication of this special issue.

Acknowledgments

As always, we appreciate the high quality submissions fromauthors and the support of the community of reviewers.

Karl AnderssonIlsun You

Rahim RahmaniVishal Sharma

HindawiWireless Communications and Mobile ComputingVolume 2019, Article ID 3978193, 1 pagehttps://doi.org/10.1155/2019/3978193

International Journal of

AerospaceEngineeringHindawiwww.hindawi.com Volume 2018

RoboticsJournal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Shock and Vibration

Hindawiwww.hindawi.com Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwww.hindawi.com

Volume 2018

Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwww.hindawi.com Volume 2018

International Journal of

RotatingMachinery

Hindawiwww.hindawi.com Volume 2018

Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Navigation and Observation

International Journal of

Hindawi

www.hindawi.com Volume 2018

Advances in

Multimedia

Submit your manuscripts atwww.hindawi.com

Recommended