Skip to main navigation Skip to search Skip to main content

Security and privacy in emerging networks: Part II [Guest Editorial]

  • Mohsen Guizani
  • , Daojing He
  • , Kui Ren
  • , Joel J.P. Rodrigues
  • , Sammy Chan
  • , Yan Zhang

Research output: Contribution to journalReview articlepeer-review

Abstract

This is the second part of the »Security and Privacy in Emerging Networks» Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and privacy of such networks. In Part II, we present articles that overview new security schemes for emerging networks such as vehicular, biomedical, underwater, crowdsourcing, and mobile networks. We feel that even though these emerging networks have attracted many research efforts lately, the security and privacy aspects have not been investigated well. Thus, it is important to provide ways to protect such networks from various security and privacy attacks. The aim of this FT is to promote further research interests in security and privacy in emerging networks by providing a vehicle for researchers and practitioners to discuss research challenges and open issues, and disseminate their latest research results. This can pave the way to implementing emerging networks with the necessary protection from major vulnerabilities. We received a large number of submissions but were obliged to accept only the best 13 papers. Part I was composed of six contributions that dealt with the theory of security/privacy threats, while this issue (Part II) is composed of seven articles addressing security challenges in a specific set of emerging networks.

Original languageEnglish
Article number7180505
Pages (from-to)40-41
Number of pages2
JournalIEEE Communications Magazine
Volume53
Issue number8
DOIs
StatePublished - 1 Aug 2015
Externally publishedYes

Fingerprint

Dive into the research topics of 'Security and privacy in emerging networks: Part II [Guest Editorial]'. Together they form a unique fingerprint.

Cite this