secure computation on 4g/5g enabled...

2
Editorial Secure Computation on 4G/5G Enabled Internet-of-Things Karl Andersson , 1 Ilsun You , 2 Rahim Rahmani, 3 and Vishal Sharma 2 1 Lule˚ a University of Technology, Lule˚ a, Sweden 2 Soonchunhyang University, Asan, Republic of Korea 3 Stockholm University, Stockholm, Sweden Correspondence should be addressed to Karl Andersson; [email protected] Received 30 April 2019; Accepted 30 April 2019; Published 2 June 2019 Copyright © Karl Andersson et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. e rapid development of Internet-of-ings (IoT) tech- niques in G/G deployments is witnessing the generation of massive amounts of data which are collected, stored, pro- cessed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through G and G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new chal- lenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task. Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computa- tion is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT. e scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making com- puting secure on G/G enabled Internet-of-ings. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multires- olution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data. Conflicts of Interest e editors declare that they have no conflicts of interest regarding the publication of this special issue. Acknowledgments As always, we appreciate the high quality submissions from authors and the support of the community of reviewers. Karl Andersson Ilsun You Rahim Rahmani Vishal Sharma Hindawi Wireless Communications and Mobile Computing Volume 2019, Article ID 3978193, 1 page https://doi.org/10.1155/2019/3978193

Upload: others

Post on 28-May-2020

16 views

Category:

Documents


0 download

TRANSCRIPT

EditorialSecure Computation on 4G/5G Enabled Internet-of-Things

Karl Andersson ,1 Ilsun You ,2 Rahim Rahmani,3 and Vishal Sharma 2

1Lulea University of Technology, Lulea, Sweden2Soonchunhyang University, Asan, Republic of Korea3Stockholm University, Stockholm, Sweden

Correspondence should be addressed to Karl Andersson; [email protected]

Received 30 April 2019; Accepted 30 April 2019; Published 2 June 2019

Copyright © 2019 Karl Andersson et al.�is is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

�e rapid development of Internet-of-�ings (IoT) tech-niques in 4G/5G deployments is witnessing the generationof massive amounts of data which are collected, stored, pro-cessed, and presented in an easily interpretable form.Analysisof IoT data helps provide smart services such as smart homes,smart energy, smart health, and smart environments through4G and 5G technologies. At the same time, the threat ofthe cyberattacks and issues with mobile internet security isbecoming increasingly severe, which introduces new chal-lenges for the security of IoT systems and applications andthe privacy of individuals thereby. Protecting IoTdata privacywhile enabling data availability is an urgent but difficult task.

Data privacy in a distributed environment like IoT canbe attained through secure multiparty computation. Anemerging area of potential applications for secure computa-tion is to address privacy concerns in data aggregation andanalysis to match the explosive growth of the amount ofIoT data. However, the inherent complexity of IoT systemsreally complicates the design and deployment of efficient,interoperable, and scalable secure computation mechanisms.As a result, there is an increasing demand for the developmentof new secure computation methods and tools which can fillin the gap between security and practical usage in IoT.

�e scope of this special issue is in line with recentcontributions from academia and industry on the recentactivities that tackle the technical challenges making com-puting secure on 4G/5G enabled Internet-of-�ings. For thecurrent issue, we are pleased to introduce a collection ofpapers covering a range of topics such as securely verifiableremote erasure schemes, multiuser identification algorithms,privacy-preserving shared storage, situational aware threat

assessment, authorized client-side deduplication in cloudstorage, radio environment map construction, analysis ofthe vulnerabilities of connected car environments, combatpollution attacks in 5G multihop networks, automaticallytraceback RDP-based targeted ransomware attacks, multires-olution face recognition through virtual faces generation,anonymous communication via anonymous identity-basedencryption, and Secure Storage and Retrieval of IoT Data.

Conflicts of Interest

�e editors declare that they have no conflicts of interestregarding the publication of this special issue.

Acknowledgments

As always, we appreciate the high quality submissions fromauthors and the support of the community of reviewers.

Karl AnderssonIlsun You

Rahim RahmaniVishal Sharma

HindawiWireless Communications and Mobile ComputingVolume 2019, Article ID 3978193, 1 pagehttps://doi.org/10.1155/2019/3978193

International Journal of

AerospaceEngineeringHindawiwww.hindawi.com Volume 2018

RoboticsJournal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Shock and Vibration

Hindawiwww.hindawi.com Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwww.hindawi.com

Volume 2018

Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwww.hindawi.com Volume 2018

International Journal of

RotatingMachinery

Hindawiwww.hindawi.com Volume 2018

Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Navigation and Observation

International Journal of

Hindawi

www.hindawi.com Volume 2018

Advances in

Multimedia

Submit your manuscripts atwww.hindawi.com