Guest Editor(s)
-
- Prof. Yining Liu
- Computer and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China.
Website | E-mail
-
- Prof. Entao Luo
- School of Information Engineering, Hunan University of Science and Engineering, Yongzhou, Hunan, China.
Website | E-mail
-
- Prof. Jun Ye
- School of Cyberspace Security, Hainan University, Haikou, Hainan, China.
Website | E-mail
Special Issue Introduction
With the rapid development of information and communication technology (ICT), it is becoming increasingly important to share data within and between organizations. These organizations could be power companies, vehicle networking companies, or academic institutions. Data sharing reduces operational costs, enhances organizational capabilities, and enables mutual growth and profitability between organizations. However, data security and user privacy leakage issues arise in the process of data sharing. Specifically, a malicious attacker impersonates a legitimate user to access the organization's internal data, thus causing data security issues; unauthorized users illegally access user data, leading to user privacy leakage. A promising solution is to have a proper management mechanism for authentication and authorization. However, the authorization and authentication of both users and digital content in restricted or closed network environments is a pressing issue today.
Authentication is the process of determining the validity of a self-proclaimed legitimate user, and authorization is the process of determining which resources a user is allowed to access. Malicious attacks can be avoided in the Internet of vehicles, smart grid, and the Internet of Things (IoT) by verifying the user's legitimacy and reasonable authorized participants. Meanwhile, the confidentiality and integrity of data can be ensured through proper authentication and authorization mechanisms. How to achieve reasonable and efficient authentication and authorization has become an increasingly interesting topic for researchers and developers in academic fields and industries worldwide.
This Special Issue aims to gather recent advances and novel contributions from academic researchers and industry practitioners on the topic of protecting data security and user privacy through appropriate authentication and authorization mechanisms in various network environments. In addition, this Special Issue welcomes relevant researchers to discuss the recent developments in data security and privacy protection in the background of data sharing. Through this Special Issue, we aim to advance the development of authentication and authorization in data security and privacy protection. We welcome original research and review articles.
Potential topics include but are not limited to the following:
● Vehicle authentication and trajectory data privacy preserving algorithm in the Internet of vehicles;
● Attack defense model and data privacy-preserving in the Internet of Things (IoT);
● Security technologies and privacy-preserving of user data in the smart grid;
● Novel applications and research on lightweight authentication and authorization mechanisms;
● Collaborative authentication and authorization and other security technologies maintenance and operation in smart cities;
● Novel network and communication technologies that support authentication and authorization;
● New generalizable lightweight cryptographic authentication algorithms;
● Application and research of Authentication Encryption (AE) in various network environments.
Keywords
Authentication, authorization, authentication encryption, privacy-preserving, lightweight authentication
Submission Deadline
31 May 2023