Security, Privacy & Trust Management in Wireless Communication Networks

Submission Deadline: 25 May 2022 (closed)

Guest Editors

Dr. Chi Lin, Dalian University of Technology, China.
Dr. Chang Wu Yu, Chung Hua University, Taiwan.
Dr. Ning Wang, Rowan University, USA.


Recent technological advancements are largely dependent on sophisticated wireless communication networks and systems. But there exist certain persistent concerns on the security and privacy of data exchanged over such networks. Most of the available security solutions are difficult to be implemented directly because of the constraints on node resources. Hence the development of new techniques for improving the security, privacy, and trust in the existing wireless communication networks is of utmost significance in futuristic developments. The existing wireless communication technologies include Wireless Fidelity (Wi-Fi), cellular networks such as 4G and 5G, Bluetooth technology, and Worldwide Interoperability for Microwave Access (WiMax). Other wireless networks include Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), Wide Area Network (WAN), Wireless Mesh Networks (WMN), and cloud computing networks. All these forms of wireless technologies transmit and exchange a large amount of sensitive and private data every second. Hence the network architecture and design must employ safe and sound practices to protect the privacy of the user, provide user security etc.


While there exist various techniques, establishing a secure key between the mobile terminal and the wireless network protects user data and privacy by providing authentication and confidentiality through authenticated encryption. Some techniques offer limited access or control for tasks that require the user to provide crucial information that consists of billing information, bank details etc. One of the important techniques that are employed to offer security in cellular and mobile networks is the authenticated key agreement (AKA) using GSM security. The Subscriber Identity Module (SIM) stores the secret authentication key for the long term. However, this technique is limited by architectural and cryptographic protocol weaknesses. On the other hand, WPA uses the Extensible Authentication Protocol (EAP) for enabling multiple methods for authentication, one-time passwords (OTP), and smart cards. Normal traffic in this type of network security technique is allowed only after the authentication of the entity. The security in Bluetooth networks generates a key that is stored in non-volatile memory as a function of the 48-bit Bluetooth address and a number. This can be further improved with the employment of password-based authenticated key exchange (PAKE) which prevents key guessing. Finally, all types of wireless communication networks must follow adequate measures in order to protect the users and the systems against security breaches and privacy attacks. While there are various techniques that are currently in practice, innovation is much needed in order to meet future needs.

Security and privacy techniques for data-centric networks.

Innovative network architectures and designs for improving the security and privacy of cloud computing.

Integration of newer network protocols to ensure security in delay-tolerant networks.

Large-scale wireless network architectures with efficient security systems for future banking and investment platforms.

Integration of hardware and network security solutions for IoT based wireless sensor networks.

Enhancing the security, privacy, and trust in fog and edge computing.

Physical layer technology and wireless propagation characteristics for improved security, secrecy, and privacy of wireless communication networks.

Methods to improve utilization of system resources in wireless communication infrastructure

Wireless access techniques for high spectral efficiency, low latency, and high throughput for futuristic wireless communication technologies.

Integration of modern security solutions for security in blockchain technologies.


Security, Privacy
Wireless Communication Networks
edge computing
cloud computing IoT

Share Link