EditorialSecure Computation on 4G/5G Enabled Internet-of-Things
Karl Andersson ,1 Ilsun You ,2 Rahim Rahmani,3 and Vishal Sharma 2
1Lulea University of Technology, Lulea, Sweden2Soonchunhyang University, Asan, Republic of Korea3Stockholm University, Stockholm, Sweden
Correspondence should be addressed to Karl Andersson; [email protected]
Received 30 April 2019; Accepted 30 April 2019; Published 2 June 2019
Copyright © 2019 Karl Andersson et al.�is is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
�e rapid development of Internet-of-�ings (IoT) tech-niques in 4G/5G deployments is witnessing the generationof massive amounts of data which are collected, stored, pro-cessed, and presented in an easily interpretable form.Analysisof IoT data helps provide smart services such as smart homes,smart energy, smart health, and smart environments through4G and 5G technologies. At the same time, the threat ofthe cyberattacks and issues with mobile internet security isbecoming increasingly severe, which introduces new chal-lenges for the security of IoT systems and applications andthe privacy of individuals thereby. Protecting IoTdata privacywhile enabling data availability is an urgent but difficult task.
Data privacy in a distributed environment like IoT canbe attained through secure multiparty computation. Anemerging area of potential applications for secure computa-tion is to address privacy concerns in data aggregation andanalysis to match the explosive growth of the amount ofIoT data. However, the inherent complexity of IoT systemsreally complicates the design and deployment of efficient,interoperable, and scalable secure computation mechanisms.As a result, there is an increasing demand for the developmentof new secure computation methods and tools which can fillin the gap between security and practical usage in IoT.
�e scope of this special issue is in line with recentcontributions from academia and industry on the recentactivities that tackle the technical challenges making com-puting secure on 4G/5G enabled Internet-of-�ings. For thecurrent issue, we are pleased to introduce a collection ofpapers covering a range of topics such as securely verifiableremote erasure schemes, multiuser identification algorithms,privacy-preserving shared storage, situational aware threat
assessment, authorized client-side deduplication in cloudstorage, radio environment map construction, analysis ofthe vulnerabilities of connected car environments, combatpollution attacks in 5G multihop networks, automaticallytraceback RDP-based targeted ransomware attacks, multires-olution face recognition through virtual faces generation,anonymous communication via anonymous identity-basedencryption, and Secure Storage and Retrieval of IoT Data.
Conflicts of Interest
�e editors declare that they have no conflicts of interestregarding the publication of this special issue.
Acknowledgments
As always, we appreciate the high quality submissions fromauthors and the support of the community of reviewers.
Karl AnderssonIlsun You
Rahim RahmaniVishal Sharma
HindawiWireless Communications and Mobile ComputingVolume 2019, Article ID 3978193, 1 pagehttps://doi.org/10.1155/2019/3978193
International Journal of
AerospaceEngineeringHindawiwww.hindawi.com Volume 2018
RoboticsJournal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Active and Passive Electronic Components
VLSI Design
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Shock and Vibration
Hindawiwww.hindawi.com Volume 2018
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawiwww.hindawi.com
Volume 2018
Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com
The Scientific World Journal
Volume 2018
Control Scienceand Engineering
Journal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com
Journal ofEngineeringVolume 2018
SensorsJournal of
Hindawiwww.hindawi.com Volume 2018
International Journal of
RotatingMachinery
Hindawiwww.hindawi.com Volume 2018
Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Navigation and Observation
International Journal of
Hindawi
www.hindawi.com Volume 2018
Advances in
Multimedia
Submit your manuscripts atwww.hindawi.com
Top Related