Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols


A special issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 1 Oct 2021

Guest Editor(s)

  • Assoc. Prof. Jie Yang
    Department of Computer Science, Florida State University, Tallahassee, Florida, FL, USA.

    Website | E-mail

  • Asst. Prof. Jerry Cheng
    Department of Computer Science, New York Institute of Technology, New York, NY, USA.

    Website | E-mail

  • Asst. Prof. Yan Wang
    Department of Computer and Information Sciences, Temple University, Philadelphia, Pennsylvania, PA, USA.

    Website | E-mail

Special Issue Introduction

Mobile and wearable devices, such as laptops, smartphones, smartwatches, wristbands, Augmented reality (AR) headsets, eyewear, earables, and IoT devices, have significantly evolved over the last decade with increasing storage and accessibility of users’ sensitive information. The widely deployed wireless networks further provide an underlying infrastructure for a vast array of online services and mobile applications. With the ability to access a wide variety of sensitive information and services on mobile and wearable devices, it is now critical to ensure such information and services are not misused or abused by malicious users.

As a key process that grants users access to cyberspace, authentication is a major step towards the protection of sensitive information and services. While authentication on mobile and wearable devices presents many challenges because of the limited powers and user interfaces, it also creates unique opportunities due to the rich sensing capability, extended computation and communication capacities, and mobility of the mobile and wearable devices. This special issue aims to present the recent advancements in authentication under the context of wireless and mobile environments by considering both challenges and opportunities presented in mobiles and wearables, such as laptops, smartphones, sensor nodes, smart vehicles, smartwatches, smart clothing, wristbands, AR and VR headsets, IoT devices, eyewear and earables. The potential topics include but are not limited to the following:

· Attacks and defenses of authentication on mobile and wearable devices
· Authentication for mobile edge and cloud computing
· Authentication in WSN, VANETs, and MANET
· Authentication in Smart home, Smart cars, Smart health, and IoTs
· Biometric authentication
· Device identification and authentication
· Device pairing and authentication
· Implicit authentication on mobile and wearable devices
· Lightweight authentication protocols
· Lightweight cryptographic primitives
· Liveness detection and anti-spoofing
· Multi-factor mobile authentication
· Multi-party authentication on mobile and wearable devices
· Mutual authentication protocols
· Performance analysis and user study
· Privacy issues of mobile authentication
· Security analysis of authentication on mobile and wearable devices
· Usability and security of mobile authentication

Submission Deadline

1 Oct 2021

Submission Information

Articles of special issue are free of charge for article processing.
For Author Instructions, please refer to
For Online Submission, please login at
Submission Deadline: 1 Oct 2021
Contacts: Albert Zhang, Assistant Editor,

Published Articles

This special issue is now open for submission.
© 2016-2022 OAE Publishing Inc., except certain content provided by third parties