PROPOSED
TITLE:
Emerging
Security Issues and Solutions for Location-Based Services Through Various
Hardware Nodes
New
technological advances allow us to connect devices such as smartphones and
tablet computers, making them rich targets for malicious attackers. The
increased use of location-based services generated by these devices presents
new security challenges. These advances have also provided some solutions to
these emerging threats. Location-based services are becoming increasingly
popular because they facilitate interactions between users and physical
locations in real-time. This trend is expected to continue, given that LBS are
found in many fields, including tourism, e-commerce, business logistics, and
many others. Security is one of the most important terms in this new era of
networking, where it has become more important than ever to protect locations
from external and internal threats whenever people interact with them. In
addition, although wireless and mobile ad hoc networks are considered secure
against existing attacks in some applications, these technologies may suffer
from limitations such as increased power consumption or a limited range of
antennas.
The
emerging generation of technologies related to the internet of things (IoT) has
opened up new possibilities in the field of cyber security. Wireless sensor
networks and IoT devices connecting to remote server machines have become
increasingly popular. The ability or inability of these systems to provide a
secure environment for applications and services poses a serious challenge for
developers. Such a situation requires the need to evaluate security features
applicable to various hardware devices, especially in the area of
location-based services. Location-based services are increasingly popular and
well-received. However, it is challenging to ensure high security in an LBSs
environment where the nodes are limited in their design, application, and
capabilities. Further research is required on designing novel secure
location-based services that ensure users' privacy while preserving their
anonymity. The complexity of designing such systems requires research into
several fundamental and complex issues relating to the security of location
information: identity management and privacy protection, shared secret key
management, encryption, and decryption methods, authorization/authorization
models, laws, and policies.
The
use of location-based services (LBS) is becoming more prevalent as a method for
delivering location-related content and information without the need for direct
human intervention. Security issues such as identity spoofing, session
hijacking, and data tampering are some emerging problems that have raised the
alarm in recent years. To mitigate these serious threats, various hardware
nodes can be used to create a secure and reliable framework for security
integration into LBS systems. In this special issue, we invite papers on topics
concerning but not limited to: user authentication and authorization, strong
cryptography, XML-based security protocols, trusted computing base, and virtual
machines, among others.
LIST
OF TOPICS AREAS INCLUDE, BUT ARE NOT LIMITED TO:
¡P
State of the art
Cryptography, hash functions, and message authentication codes
¡P
Towards a secure system for
LBSs and mobile devices
¡P
Authentication and
Authorization in LBS systems
¡P
Trusted computing base for
LBS Systems
¡P
Biometric-based identity
management and authentication schemes for mobile devices.
¡P
Protocols for secure data
transmission over wireless networks.
¡P
Recovery of user
credentials after a system crash or power failure.
¡P
Identity spoofing, session
hijacking, and data tampering mitigation techniques
¡P
Hardware architectures for
security, including emerging technologies such as quantum computing and
neuromorphic computing.
¡P
Security challenges in LBS
systems, including access control, authorization, identity management, and
privacy protection.
¡P
Secure data storage,
transmission, and processing techniques for LBS systems
GUEST
EDITOR INFORMATION:
Name: Dr.
Faheem Khan
Affiliation:
Assistant Professor,
Department of Computer
Engineering,
Gachon University,
Seongnam, South Korea
Email:
faheem@gachon.ac.kr,
hamzahooram0915@gmail.com
G
Scholar: https://scholar.google.com.pk/citations?user=eIC_cSYAAAAJ&hl=en
Short Bio: Faheem Khan received
the Ph.D. degree in computer science from the University of Malakand, KPK,
Pakistan. He served four years in Pakistan as an Assistant Professor and
supervised many papers and students. Since April 2021, he has been an Assistant
Professor with the Department of Computer Engineering, Gachon University,
South Korea. His field of interest is Computer Networking, Wireless Networking,
MANET, IoT, AI, Machine Learning, etc.,
Name: Dr.
Umme Laila
Affiliation:
Assistant Professor,
Computer Engineering
Department,
Sir Syed University of
Engineering & Technology,
Karachi, Pakistan.
Email:
ulaila@ssuet.edu.pk
G
Scholar: https://scholar.google.com.pk/citations?user=wib1gQkAAAAJ&hl=en
Short Bio: Dr. Umme Laila received
her Ph.D. in Computer Science and Information Technology, NED University of
Engineering and Technology, Karachi, Pakistan (2016~2021). Since May 2008, she
has been an Assistant Professor with the Computer Engineering Department, Sir Syed
University of Engineering & Technology, Karachi, Pakistan. Her area of
interest includes Open-source software, Object oriented programming, Human
Computer Interaction and Android.
Name: Dr.
Muhammad Adnan Khan
Affiliation:
Associate Professor,
Riphah International
University, Pakistan.
Email:
khanadnan.khan@riphah.edu.pk
G Scholar: https://scholar.google.com/citations?user=0v2xyVUAAAAJ&hl=en&oi=ao
Short Bio: Dr. Muhammad Adnan Khan
received the B.S. and M.S. degrees from the International Islamic University,
Islamabad, Pakistan, by obtaining the Scholarship Award from the Punjab
Information and Technology Board, Government of Punjab, Pakistan, and the Ph.D.
degree from ISRA University, Islamabad, by obtaining the Scholarship Award from
the Higher Education Commission, Islamabad, in 2016. He is currently working as
an Associate Professor in Riphah International University, Pakistan. He has
been teaching graduate and undergraduate students in computer science and
engineering for the past 12 years. He is guiding five Ph.D. scholars and six
M.Phil. scholars. He has published more than 200 research articles with a
Cumulative JCR-IF and more than 450 in reputed international journals as well
as international conferences. His research interests primarily include machine
learning, MUD, image processing and medical diagnosis, and channel estimation
in multi-carrier communication systems using soft computing.
MANUSCRIPT
SUBMISSION ¡V KEY DATES:
¡P
Submission Deadline: 10th
June, 2024
¡P
Author Notification: 20th
September, 2024
¡P
Revision and Resubmission
Deadline: 25th
November, 2024
¡P
Paper Acceptance: 05th
February, 2025