Special Issue in Cryptography Journal

A-WEAR has launched another special issue “Security, Privacy and Trust Aspects of Wearable and Resource Constrained Devices”!


Dear Colleagues,

The plethora of new Internet-of-Things (IoT) devices mushroom around us every year, slowly but steadily forming the future of smart infrastructure and contributing to improving the way we live and act. Simultaneously, the trend of personal handheld devices miniaturization has enabled the development of a new IoT niche, namely, wearables and smaller resource-constrained devices. Traditional IoT and machine-to-machine (M2M) solutions and technologies are often implemented as best efforts providing no or very limited quality of service (QoS) or security/reliability control, which is of specific interest for the sensitive data collected and sent by wearable electronics. For this reason, the Special Issue provides a forum to discuss the various issues, trade-offs, methods, and practical experiences related to the further improvement of security, reliability, and dependability of IoT in general, and regarding wearables, as an essential part of the modern IoT ecosystem.

The objective of this Special Issue is to highlight the innovative developments, breakthrough technologies, and challenges related to next-generation systems as well as communication network security. We are soliciting original contributions that have not been published and are not currently under consideration by any other journals; we also welcome extended conference/workshop papers for fast-track reviews. For this Special Issue, we invite regular papers, short letters, and reviews, while encouraging authors to submit multimedia materials and/or open datasets, if they strengthen the contribution for the research community.

The topics of interest include, but are not limited to, the following:

  • 5G/6G network security;
  • Advanced authentication strategies;
  • Attacks on distributed systems;
  • Blockchain aspects;
  • Breach and attack simulation;
  • Cloud, edge, and fog systems security;
  • Communication systems security;
  • Cyber Asset Attack Surface Management (CAASM) tools;
  • Data privacy assurance aspects;
  • Device-to-device (D2D) security;
  • Distributed ledger technology operation aspects;
  • Distributed systems security for public protection and disaster relief (PPDR) scenarios;
  • Enablers for MTC/M2M secure operation;
  • Future Digital Risk Protection Services (DRPSs) for IoT;
  • New consensus algorithms;
  • New consensus algorithms for blockchain;
  • New emerging architectures for security and privacy in IoT applications;
  • Open issues and trends in blockchain-based systems;
  • Peer-to-peer (P2P) systems security;
  • Physical-layer attacks on 5G New Radio (5G NR);
  • Prototypes of distributed systems and related performance evaluation;
  • SDN, NFV, and network slicing security aspects;
  • Security orchestration, automation and response (SOAR).