Guest Editor(s)
-
- Assoc. Prof. Jie Yang
- Department of Computer Science, Florida State University, Tallahassee, Florida, FL, USA.
Website | E-mail
-
- Asst. Prof. Jerry Cheng
- Department of Computer Science, New York Institute of Technology, New York, NY, USA.
Website | E-mail
-
- Asst. Prof. Yan Wang
- Department of Computer and Information Sciences, Temple University, Philadelphia, Pennsylvania, PA, USA.
Website | E-mail
Special Issue Introduction
Mobile and wearable devices, such as laptops, smartphones, smartwatches, wristbands, Augmented reality (AR) headsets, eyewear, earables, and IoT devices, have significantly evolved over the last decade with increasing storage and accessibility of users’ sensitive information. The widely deployed wireless networks further provide an underlying infrastructure for a vast array of online services and mobile applications. With the ability to access a wide variety of sensitive information and services on mobile and wearable devices, it is now critical to ensure such information and services are not misused or abused by malicious users.
As a key process that grants users access to cyberspace, authentication is a major step towards the protection of sensitive information and services. While authentication on mobile and wearable devices presents many challenges because of the limited powers and user interfaces, it also creates unique opportunities due to the rich sensing capability, extended computation and communication capacities, and mobility of the mobile and wearable devices. This special issue aims to present the recent advancements in authentication under the context of wireless and mobile environments by considering both challenges and opportunities presented in mobiles and wearables, such as laptops, smartphones, sensor nodes, smart vehicles, smartwatches, smart clothing, wristbands, AR and VR headsets, IoT devices, eyewear and earables. The potential topics include but are not limited to the following:
· Attacks and defenses of authentication on mobile and wearable devices
· Authentication for mobile edge and cloud computing
· Authentication in WSN, VANETs, and MANET
· Authentication in Smart home, Smart cars, Smart health, and IoTs
· Biometric authentication
· Device identification and authentication
· Device pairing and authentication
· Implicit authentication on mobile and wearable devices
· Lightweight authentication protocols
· Lightweight cryptographic primitives
· Liveness detection and anti-spoofing
· Multi-factor mobile authentication
· Multi-party authentication on mobile and wearable devices
· Mutual authentication protocols
· Performance analysis and user study
· Privacy issues of mobile authentication
· Security analysis of authentication on mobile and wearable devices
· Usability and security of mobile authentication
Submission Deadline
1 Oct 2021