PROPOSED TITLE:

Emerging Security Issues and Solutions for Location-Based Services Through Various Hardware Nodes

New technological advances allow us to connect devices such as smartphones and tablet computers, making them rich targets for malicious attackers. The increased use of location-based services generated by these devices presents new security challenges. These advances have also provided some solutions to these emerging threats. Location-based services are becoming increasingly popular because they facilitate interactions between users and physical locations in real-time. This trend is expected to continue, given that LBS are found in many fields, including tourism, e-commerce, business logistics, and many others. Security is one of the most important terms in this new era of networking, where it has become more important than ever to protect locations from external and internal threats whenever people interact with them. In addition, although wireless and mobile ad hoc networks are considered secure against existing attacks in some applications, these technologies may suffer from limitations such as increased power consumption or a limited range of antennas.

 

The emerging generation of technologies related to the internet of things (IoT) has opened up new possibilities in the field of cyber security. Wireless sensor networks and IoT devices connecting to remote server machines have become increasingly popular. The ability or inability of these systems to provide a secure environment for applications and services poses a serious challenge for developers. Such a situation requires the need to evaluate security features applicable to various hardware devices, especially in the area of location-based services. Location-based services are increasingly popular and well-received. However, it is challenging to ensure high security in an LBSs environment where the nodes are limited in their design, application, and capabilities. Further research is required on designing novel secure location-based services that ensure users' privacy while preserving their anonymity. The complexity of designing such systems requires research into several fundamental and complex issues relating to the security of location information: identity management and privacy protection, shared secret key management, encryption, and decryption methods, authorization/authorization models, laws, and policies.

 

The use of location-based services (LBS) is becoming more prevalent as a method for delivering location-related content and information without the need for direct human intervention. Security issues such as identity spoofing, session hijacking, and data tampering are some emerging problems that have raised the alarm in recent years. To mitigate these serious threats, various hardware nodes can be used to create a secure and reliable framework for security integration into LBS systems. In this special issue, we invite papers on topics concerning but not limited to: user authentication and authorization, strong cryptography, XML-based security protocols, trusted computing base, and virtual machines, among others.

 

LIST OF TOPICS AREAS INCLUDE, BUT ARE NOT LIMITED TO:

¡P         State of the art Cryptography, hash functions, and message authentication codes

¡P         Towards a secure system for LBSs and mobile devices

¡P         Authentication and Authorization in LBS systems

¡P         Trusted computing base for LBS Systems

¡P         Biometric-based identity management and authentication schemes for mobile devices.

¡P         Protocols for secure data transmission over wireless networks.

¡P         Recovery of user credentials after a system crash or power failure.

¡P         Identity spoofing, session hijacking, and data tampering mitigation techniques

¡P         Hardware architectures for security, including emerging technologies such as quantum computing and neuromorphic computing.

¡P         Security challenges in LBS systems, including access control, authorization, identity management, and privacy protection.

¡P         Secure data storage, transmission, and processing techniques for LBS systems

 

GUEST EDITOR INFORMATION:

Name:          Dr. Faheem Khan

Affiliation:    Assistant Professor,

Department of Computer Engineering,

Gachon University,

Seongnam, South Korea

Email:          faheem@gachon.ac.kr, hamzahooram0915@gmail.com  

G Scholar:    https://scholar.google.com.pk/citations?user=eIC_cSYAAAAJ&hl=en

Short Bio:     Faheem Khan received the Ph.D. degree in computer science from the University of Malakand, KPK, Pakistan. He served four years in Pakistan as an Assistant Professor and supervised many papers and students. Since April 2021, he has been an Assistant Professor with the Department of Computer Engineering, Gachon        University, South Korea. His field of interest is Computer Networking, Wireless Networking, MANET, IoT, AI, Machine Learning, etc.,

 

Name:          Dr. Umme Laila

Affiliation:    Assistant Professor,

Computer Engineering Department,

Sir Syed University of Engineering & Technology,

Karachi, Pakistan.

Email:          ulaila@ssuet.edu.pk

G Scholar:    https://scholar.google.com.pk/citations?user=wib1gQkAAAAJ&hl=en

Short Bio:     Dr. Umme Laila received her Ph.D. in Computer Science and Information Technology, NED University of Engineering and Technology, Karachi, Pakistan (2016~2021). Since May 2008, she has been an Assistant Professor with the Computer Engineering Department, Sir Syed University of Engineering & Technology, Karachi, Pakistan. Her area of interest includes Open-source software, Object oriented programming, Human Computer Interaction and Android.

 

Name:          Dr. Muhammad Adnan Khan

Affiliation:    Associate Professor,

Riphah International University, Pakistan.

Email:          khanadnan.khan@riphah.edu.pk   

G Scholar:    https://scholar.google.com/citations?user=0v2xyVUAAAAJ&hl=en&oi=ao

Short Bio:     Dr. Muhammad Adnan Khan received the B.S. and M.S. degrees from the International Islamic University, Islamabad, Pakistan, by obtaining the Scholarship Award from the Punjab Information and Technology Board, Government of Punjab, Pakistan, and the Ph.D. degree from ISRA University, Islamabad, by obtaining the Scholarship Award from the Higher Education Commission, Islamabad, in 2016. He is currently working as an Associate Professor in Riphah International University, Pakistan. He has been teaching graduate and undergraduate students in computer science and engineering for the past 12 years. He is guiding five Ph.D. scholars and six M.Phil. scholars. He has published more than 200 research articles with a Cumulative JCR-IF and more than 450 in reputed international journals as well as international conferences. His research interests primarily include machine learning, MUD, image processing and medical diagnosis, and channel estimation in multi-carrier communication systems using soft computing.

 

MANUSCRIPT SUBMISSION ¡V KEY DATES:

¡P         Submission Deadline:                           10th June, 2024

¡P         Author Notification:                                       20th September, 2024

¡P         Revision and Resubmission Deadline:     25th November, 2024

¡P         Paper Acceptance:                                05th February, 2025