3978193, Volume 2019 (2019)

3978193, Volume 2019 (2019)

Wireless Communications and Mobile Computing Secure Computation on 4G/5G Enabled Internet-of-Things Lead Guest Editor: Karl Andersson Guest Editors: Ilsun You, Rahim Rahmani, and Vishal Sharma Secure Computation on 4G/5G Enabled Internet-of-Things Wireless Communications and Mobile Computing Secure Computation on 4G/5G Enabled Internet-of-Things Lead Guest Editor: Karl Andersson Guest Editors: Ilsun You, Rahim Rahmani, and Vishal Sharma Copyright © 2019 Hindawi. All rights reserved. This is a special issue published in “Wireless Communications and Mobile Computing.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, pro- vided the original work is properly cited. Editorial Board Javier Aguiar, Spain Oscar Esparza, Spain Maode Ma, Singapore Ghufran Ahmed, Pakistan Maria Fazio, Italy Imadeldin Mahgoub, USA Wessam Ajib, Canada Mauro Femminella, Italy Pietro Manzoni, Spain Muhammad Alam, China Manuel Fernandez-Veiga, Spain Álvaro Marco, Spain Eva Antonino-Daviu, Spain Gianluigi Ferrari, Italy Gustavo Marfia, Italy Shlomi Arnon, Israel Ilario Filippini, Italy Francisco J. Martinez, Spain Leyre Azpilicueta, Mexico Jesus Fontecha, Spain Davide Mattera, Italy Paolo Barsocchi, Italy Luca Foschini, Italy Michael McGuire, Canada Alessandro Bazzi, Italy A. G. Fragkiadakis, Greece Nathalie Mitton, France Zdenek Becvar, Czech Republic Sabrina Gaito, Italy Klaus Moessner, UK Francesco Benedetto, Italy Óscar García, Spain Antonella Molinaro, Italy Olivier Berder, France Manuel García Sánchez, Spain Simone Morosi, Italy Ana M. Bernardos, Spain L. J. García Villalba, Spain Kumudu S. Munasinghe, Australia Mauro Biagi, Italy José A. García-Naya, Spain Enrico Natalizio, France Dario Bruneo, Italy Miguel Garcia-Pineda, Spain Keivan Navaie, UK Jun Cai, Canada A.-J. García-Sánchez, Spain Thomas Newe, Ireland Zhipeng Cai, USA Piedad Garrido, Spain Tuan M. Nguyen, Vietnam Claudia Campolo, Italy Vincent Gauthier, France Petros Nicopolitidis, Greece Gerardo Canfora, Italy Carlo Giannelli, Italy Giovanni Pau, Italy Rolando Carrasco, UK Carles Gomez, Spain Rafael Pérez-Jiménez, Spain Vicente Casares-Giner, Spain Juan A. Gómez-Pulido, Spain Matteo Petracca, Italy Luis Castedo, Spain Ke Guan, China Nada Y. Philip, UK Ioannis Chatzigiannakis, Italy Antonio Guerrieri, Italy Marco Picone, Italy Lin Chen, France Daojing He, China Daniele Pinchera, Italy Yu Chen, USA Paul Honeine, France Giuseppe Piro, Italy Hui Cheng, UK Sergio Ilarri, Spain Vicent Pla, Spain Ernestina Cianca, Italy Antonio Jara, Switzerland Javier Prieto, Spain Riccardo Colella, Italy Xiaohong Jiang, Japan Rüdiger C. Pryss, Germany Mario Collotta, Italy Minho Jo, Republic of Korea Sujan Rajbhandari, UK Massimo Condoluci, Sweden Shigeru Kashihara, Japan Rajib Rana, Australia Daniel G. Costa, Brazil Dimitrios Katsaros, Greece Luca Reggiani, Italy Bernard Cousin, France Minseok Kim, Japan Daniel G. Reina, Spain Telmo Reis Cunha, Portugal Mario Kolberg, UK Jose Santa, Spain Igor Curcio, Finland Nikos Komninos, UK Stefano Savazzi, Italy Laurie Cuthbert, Macau Juan A. L. Riquelme, Spain Hans Schotten, Germany Donatella Darsena, Italy Pavlos I. Lazaridis, UK Patrick Seeling, USA Pham Tien Dat, Japan Tuan Anh Le, UK Muhammad Z. Shakir, UK AndrédeAlmeida,Brazil Xianfu Lei, China Mohammad Shojafar, Italy Antonio De Domenico, France Hoa Le-Minh, UK Giovanni Stea, Italy Antonio de la Oliva, Spain Jaime Lloret, Spain Enrique Stevens-Navarro, Mexico Gianluca De Marco, Italy Miguel López-Benítez, UK Zhou Su, Japan Luca De Nardis, Italy Martín López-Nores, Spain Luis Suarez, Russia Liang Dong, USA Javier D. S. Lorente, Spain Ville Syrjälä, Finland Mohammed El-Hajjar, UK Tony T. Luo, Singapore Hwee Pink Tan, Singapore Pierre-Martin Tardif, Canada Juan F. Valenzuela-Valdés, Spain Jie Yang, USA Mauro Tortonesi, Italy Aline C. Viana, France Sherali Zeadally, USA Federico Tramarin, Italy Enrico M. Vitucci, Italy Jie Zhang, UK Reza Monir Vaghefi, USA Honggang Wang, USA Meiling Zhu, UK Contents Secure Computation on 4G/5G Enabled Internet-of-Things Karl Andersson ,IlsunYou , Rahim Rahmani, and Vishal Sharma Editorial (1 page), Article ID 3978193, Volume 2019 (2019) Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks Sandi Rahmadika and Kyung-Hyune Rhee Research Article (13 pages), Article ID 6219868, Volume 2019 (2019) UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization Sieun Kim ,Taek-YoungYoun , Daeseon Choi ,andKi-WoongPark Research Article (11 pages), Article ID 8913910, Volume 2019 (2019) Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage Taek-Young Youn ,Nam-SuJho ,KyungHyuneRhee , and Sang Uk Shin Research Article (11 pages), Article ID 7840917, Volume 2019 (2019) A Multiuser Identification Algorithm Based on Internet of Things Kaikai Deng , Ling Xing , Mingchuan Zhang ,HonghaiWu ,andPingXie Research Article (11 pages), Article ID 6974809, Volume 2019 (2019) Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness Mookyu Park , Jaehyeok Han, Haengrok Oh, and Kyungho Lee Research Article (14 pages), Article ID 5121054, Volume 2019 (2019) Radio Environment Map Construction by Kriging Algorithm Based on Mobile Crowd Sensing Zhifeng Han , Jianxin Liao ,QiQi , Haifeng Sun, and Jingyu Wang Research Article (12 pages), Article ID 4064201, Volume 2019 (2019) Enhanced Android App-Repackaging Attack on In-Vehicle Network Yousik Lee, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee Research Article (13 pages), Article ID 5650245, Volume 2019 (2019) Automatically Traceback RDP-Based Targeted Ransomware Attacks ZiHan Wang ,ChaoGeLiu ,JingQiu ,ZhiHongTian , Xiang Cui, and Shen Su Research Article (13 pages), Article ID 7943586, Volume 2018 (2019) Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks Jian Li , Tongtong Li, Jian Ren, and Han-Chieh Chao Research Article (13 pages), Article ID 3473910, Volume 2018 (2019) Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT Liaoliang Jiang, Tong Li , Xuan Li, Mohammed Atiquzzaman, Haseeb Ahmad, and Xianmin Wang Research Article (8 pages), Article ID 6809796, Volume 2018 (2019) Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval Khaled Riad and Lishan Ke Research Article (8 pages), Article ID 5452463, Volume 2018 (2019) Multiresolution Face Recognition through Virtual Faces Generation Using a Single Image for One Person Hae-Min Moon, Min-Gu Kim, Ju-Hyun Shin ,andSungBumPan Research Article (8 pages), Article ID 7584942, Volume 2018 (2019) Hindawi Wireless Communications and Mobile Computing Volume 2019, Article ID 3978193, 1 page https://doi.org/10.1155/2019/3978193 Editorial Secure Computation on 4G/5G Enabled Internet-of-Things Karl Andersson ,1 Ilsun You ,2 Rahim Rahmani,3 and Vishal Sharma 2 1 LuleaUniversityofTechnology,Lule˚ a,˚ Sweden 2Soonchunhyang University, Asan, Republic of Korea 3Stockholm University, Stockholm, Sweden Correspondence should be addressed to Karl Andersson; [email protected] Received 30 April 2019; Accepted 30 April 2019; Published 2 June 2019 Copyright © Karl Andersson et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. e rapid development of Internet-of-ings (IoT) tech- assessment, authorized client-side deduplication in cloud niques in G/ G deployments is witnessing the generation storage, radio environment map construction, analysis of of massive amounts of data which are collected, stored, pro- the vulnerabilities of connected car environments, combat cessed, and presented in an easily interpretable form. Analysis pollution attacks in G multihop networks, automatically ofIoT data helpsprovide smart services such assmart homes, traceback RDP-based targeted ransomware attacks, multires- smart energy, smart health, and smart environments through olution face recognition through virtual faces generation, G and G technologies. At the same time, the threat of anonymous communication via anonymous identity-based the cyberattacks and issues with mobile internet security is encryption, and Secure Storage and Retrieval of IoT Data. becoming increasingly severe, which introduces new chal- lenges for the security of IoT systems and applications and Conflicts of Interest the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task. e editors declare that they have no conflicts of interest Data privacy in a distributed environment like IoT can regarding the publication of this special issue. be attained through secure multiparty computation. An emerging area of potential applications for secure computa- tion is to address privacy concerns in data aggregation and Acknowledgments analysis to match the explosive growth of the amount of As always, we appreciate the high quality submissions from IoT data. However, the inherent complexity of IoT systems authors and the support of the community of reviewers. really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. Karl Andersson As a result, there is an increasing demand for the development Ilsun You

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    144 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us