Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top
Topic: Authentication and Authorization

A special issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 31 May 2023

Guest Editor(s)

  • Prof. Yining Liu
    Computer and Information Security, Guilin University of Electronic Technology,  Guilin, Guangxi, China.

    Website | E-mail

  • Prof. Entao Luo
    School of Information Engineering, Hunan University of Science and Engineering, Yongzhou, Hunan, China.

    Website | E-mail

  • Prof. Jun Ye
    School of Cyberspace Security, Hainan University, Haikou, Hainan, China.

    Website | E-mail

Special Issue Introduction

With the rapid development of information and communication technology (ICT), it is becoming increasingly important to share data within and between organizations. These organizations could be power companies, vehicle networking companies, or academic institutions. Data sharing reduces operational costs, enhances organizational capabilities, and enables mutual growth and profitability between organizations. However, data security and user privacy leakage issues arise in the process of data sharing. Specifically, a malicious attacker impersonates a legitimate user to access the organization's internal data, thus causing data security issues; unauthorized users illegally access user data, leading to user privacy leakage. A promising solution is to have a proper management mechanism for authentication and authorization. However, the authorization and authentication of both users and digital content in restricted or closed network environments is a pressing issue today.

Authentication is the process of determining the validity of a self-proclaimed legitimate user, and authorization is the process of determining which resources a user is allowed to access. Malicious attacks can be avoided in the Internet of vehicles, smart grid, and the Internet of Things (IoT) by verifying the user's legitimacy and reasonable authorized participants. Meanwhile, the confidentiality and integrity of data can be ensured through proper authentication and authorization mechanisms. How to achieve reasonable and efficient authentication and authorization has become an increasingly interesting topic for researchers and developers in academic fields and industries worldwide.

This Special Issue aims to gather recent advances and novel contributions from academic researchers and industry practitioners on the topic of protecting data security and user privacy through appropriate authentication and authorization mechanisms in various network environments. In addition, this Special Issue welcomes relevant researchers to discuss the recent developments in data security and privacy protection in the background of data sharing. Through this Special Issue, we aim to advance the development of authentication and authorization in data security and privacy protection. We welcome original research and review articles.

Potential topics include but are not limited to the following:
● Vehicle authentication and trajectory data privacy preserving algorithm in the Internet of vehicles;
● Attack defense model and data privacy-preserving in the Internet of Things (IoT);
● Security technologies and privacy-preserving of user data in the smart grid;
● Novel applications and research on lightweight authentication and authorization mechanisms;
● Collaborative authentication and authorization and other security technologies maintenance and operation in smart cities;
● Novel network and communication technologies that support authentication and authorization;
● New generalizable lightweight cryptographic authentication algorithms;
● Application and research of Authentication Encryption (AE) in various network environments.

Keywords

Authentication, authorization, authentication encryption, privacy-preserving, lightweight authentication

Submission Deadline

31 May 2023

Submission Information

For Author Instructions, please refer to http://jsssjournal.com/pages/view/author_instructions
For Online Submission, please login at https://oaemesas.com/login?JournalId=jsss&SpecialIssueId=jsss230105
Submission Deadline: 31 May 2023
Contacts: Stella Qian, Assistant Editor, Stella@jsssjournal.com

Published Articles

none
© 2016-2023 OAE Publishing Inc., except certain content provided by third parties