emerging security threats and defense technologies in Mobile computing and Networking

نویسنده

  • Ilsun You
چکیده

With the rapid evolution of computing paradigms and the increasing popular of mobile devices, newly emerging mobile computing paradigms become more and more prevalent, such as crowd-souring computing, human-centred computing, mobile cloud computing etc. Moreover, with the emergence of new computing paradigms, communication networks experience unprecedented transformation which greatly improves their network capacity and thus Quality of Service. However, the newly developed computing and networking paradigms are also faced with many traditional security threats in the networking plane, as well as the computing knowledge plane, such as jammer attacks, wireless network intrusion, and those attacks on the content of the data, etc. Moreover, the newly emerging security threats such as network structure sniff, smart jammer attacks, and privacy leak also restrict the development of these new paradigms. The objective of this special issue is to collect different thoughts of the researchers and practitioners on the relevant topics. Given the current status, any enhanced technology addressing security issues arise in application layer, transmission layer and physical layer can be considered as the wide work space. In this issue, we mainly thought about getting some specific contributions on security issues in application and transmission layers. Though there were other submissions with high quality, because of the restrictions of the number of papers in one special issue, we have accepted only 6 papers while each paper has been reviewed by at least three experts to ensure the quality of this special issue. Let us give a brief introduction of the papers for a better understand of their contribution in this special issue's area. Wang et al., in their work " Jammer Location-oriented Noise Node Elimination Method for MHWN " develop an algorithm to eliminate noise nodes based on the Mean of Squared Dis

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Security Threats in Software Defined Mobile Clouds (SDMC)

Future Internet comprises of emerging ICT mega-trends (e.g., mobile, social, cloud, and big data) commands new challenges like ubiquitous accessibility, high bandwidth, and dynamic management to meet the data tsunami requirements. In the recent years, the rapid growth of smartphone business is highly evidenced due to its versatile usage irrespective of location, personality or context. Despite ...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016