Table of Content

Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication

Submission Deadline: 30 November 2020 (closed)

Guest Editors

Dr. Gregorio Martinez Perez, University of Murcia (UMU), Spain
Dr. B. B. Gupta, National Institute of Technology, Kurukshetra, India
Byung-Gyu Kim, Sookmyung Women's University, Seoul, Rep. of Korea
Yining Liu, Guilin University of Electronic Technology, China

Summary

Mobile communication is being developed with an exponential growth of mobile users, how to protect mobile networks against various attacks has become a big challenge. Taking mobile devices as an example, these devices are tiny, and users may lose them easily. Moreover, these devices have become one of the most demanding goods which attract thieves because of their resale value. Moreover, multimedia data during the mobile communication including network, media and devices is an important issue to handle. Moreover, explosion of multimedia data has created unprecedented opportunities and fundamental security challenges as they are not just big in volume, but also unstructured and multi-modal. In the past years, as per the reports of cyber crime, the rise of malware and attacks on mobile communication can be easily said. As a result, there is an increasing need for secure solutions to protect users' private and sensitive multimedia data in the mobile environment. This special issue will focus on mobile context and aims to request original research papers that discuss the management of security, privacy and trust of multimedia data in mobile communication including design, configuration and implementation of networks, media and devices.


Keywords

• Definition, evaluation, and deployment requirements of 5G/6G systems
• Security, Privacy and Trust of multimedia data in mobile communication
• Trust evaluation on mobile networks/devices
• Detection of malicious information propagation in mobile networks
• Models, methods, and tools for testing the security of mobile networks
• Security, privacy and trust of multimedia big data in mobile networks
• Security of multimedia data in Semantic web based social network
• Security of multimedia data in communication systems
• Security of multimedia data in Information Systems
• Security of multimedia data in MCC
• Management of security and privacy of multimedia data in wireless network
• Massive MIMO technologies
• Millimeter wave wireless communication technologies
• Full-duplex radios for 5G/6G mobile communications
• Massive connectivity and synchronous transmission and random access
• Heterogeneous wireless network architecture design and implementation
• Privacy and Security of Building Data
• Cryptography, authentication, authorisation and usage control for multimedia data in mobile networks
• Security and privacy of multimedia Data in Web service
• Evolutionary algorithms for mining social networks for decision support
• Interference coordination in 5G/6G mobile communications
• Low latency transmission technologies
• Energy harvesting wireless communication technologies
• Energy-efficient technologies in 5G/6G mobile communications
• Distributed caching in 5G/6G mobile communications
• Device-to-device/machine-to-machine communications
• Tactile internet applications
• Cloud-assist wireless transmission
• Big data analytical modeling and solutions for wireless networks
• Mobile Cloud architecture and platform
• Software-defined wireless networks
• Evolution solutions from conventional cellular mobile to content-aware wireless communications
• Joint multimedia processing and wireless transmission design for wireless multimedia communications
• Adversarial modeling Vulnerability
• Assessment and testing Intrusion detection and prevention schemes
• Tracing back mobile attackers
• Impact of human social behavior on mobile usage
• Secure routing and access control
• Mobile authentication mechanisms
• Security testing of new or existing usability features
• Agent based intrusion surveillance
• Wireless Access Technologies
• Multimedia security issues for tackling intruders

Published Papers


  • Open Access

    Management of Schemes and Threat Prevention in ICS Partner Companies Security

    Sangdo Lee, Jun-Ho Huh
    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3659-3684, 2021, DOI:10.32604/cmc.2021.015632
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract An analysis of the recent major security incidents related to industrial control systems, revealed that most had been caused by company employees. Therefore, enterprise security management systems have been developed to focus on companies’ personnel. Nonetheless, several hacking incidents, involving major companies and public/financial institutions, were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work. Specifically, institutions that operate industrial control systems (ICSs) associated with critical national infrastructures, such as traffic or energy, have contracted several cooperative firms. Nonetheless, ICT's importance is gradually increasing, due to outsourcing, and is the most vulnerable factor in security. This… More >

  • Open Access

    ARTICLE

    Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis

    Rohit Srivastava, Ravi Tomar, Ashutosh Sharma, Gaurav Dhiman, Naveen Chilamkurti, Byung-Gyu Kim
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1-19, 2021, DOI:10.32604/cmc.2021.015466
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a modified Gabor Wavelet Transform for… More >

  • Open Access

    ARTICLE

    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai, Manikandan Ramachandran, Fadi Al-Turjman, Leonardo Mostarda
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam, Vinayakumar Ravi, Moez Krichen, Roobaea Alroobaea, Saeed Rubaiee
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

    Ali A. R. Alkhafaji, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat
    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 77-102, 2021, DOI:10.32604/cmc.2021.015770
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difficult challenges that researchers face today. Consequently, the diacritical marks in the Holy Quran which represent Arabic vowels () known as the kashida (or “extended letters”) must be protected from changes. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper… More >

  • Open Access

    ARTICLE

    Network Log-Based SSH Brute-Force Attack Detection Model

    Jeonghoon Park, Jinsu Kim, B. B. Gupta, Namje Park
    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 887-901, 2021, DOI:10.32604/cmc.2021.015172
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract The rapid advancement of IT technology has enabled the quick discovery, sharing and collection of quality information, but has also increased cyberattacks at a fast pace at the same time. There exists no means to block these cyberattacks completely, and all security policies need to consider the possibility of external attacks. Therefore, it is crucial to reduce external attacks through preventative measures. In general, since routers located in the upper part of a firewall can hardly be protected by security systems, they are exposed to numerous unblocked cyberattacks. Routers block unnecessary services and accept necessary ones while taking appropriate measures… More >

  • Open Access

    ARTICLE

    Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems

    Imtisal Qadeer, Muhammad Khurram Ehsan
    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2619-2630, 2021, DOI:10.32604/cmc.2021.015641
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices, device to device communication in Internet of Things (IoTs) and 5G wireless systems. Physical layer key generation (PLKG) tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium. In this paper, relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process. Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G… More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit, Sreeparna Ganguly, Souvik Pal, Ayman A. Aly, Dac-Nhuong Le
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri, Purushottam Sharma, Richa Sharma, Osama Alfarraj
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that the high feasibility and results… More >

  • Open Access

    ARTICLE

    Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)

    Iftikhar Ahmad, Rayan Atteah Alsemmeari
    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1097-1111, 2020, DOI:10.32604/cmc.2020.011732
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract An IDS (intrusion detection system) provides a foremost front line mechanism to guard networks, systems, data, and information. That’s why intrusion detection has grown as an active study area and provides significant contribution to cyber-security techniques. Multiple techniques have been in use but major concern in their implementation is variation in their detection performance. The performance of IDS lies in the accurate detection of attacks, and this accuracy can be raised by improving the recognition rate and significant reduction in the false alarms rate. To overcome this problem many researchers have used different machine learning techniques. These techniques have limitations… More >

Share Link

WeChat scan