Wireless communications infrastructure and services have been required regular upgradation to manage the rapidly increasing demands. To improve wireless communications security to fight against cybercriminal activities, especially because more and more people are using wireless networks (e.g., cellular networks and Wi-Fi) for online banking and personal e-mails, owing to the widespread use of Smartphones. The wireless communication makes transmission of data more valuable than wired communication. Wireless communications have more vulnerable, secure, passive eavesdropping for data interception and active jamming. Wireless communication needs authenticity, availability, confidentiality, and integrity requirements. To ensure the requirements we need to design the wireless communication system secure and easy, to gain the users satisfaction. Wireless networks generally adopt the OSI protocol architecture.
Further, due to the rapid expansion of modern and developing information technology such as social media, artificial intelligence, big data, the Internet of Things (IoT), and smart cities in past several decades, cyber threats and computer crimes have escalated in recent decades. Organizations due to actual and suspected cyber threats correlated with such developments have slowed the implementation of big data and the cloud. Secure communication is available to protect cyber risks, but it is a hot topic of ongoing research, as there is generally no clear view of how to model cyber risk and therefore how to price it. For companies, the value of cyber/ wireless communication protection is raising. Security of wireless communication implies the ability to develop and assess a typology of cyber offenses and cyber threats in order to address them.
Call for Book Chapters
Wireless communication security research is multidisciplinary in nature, including researchers from data analysis, economics, mathematics, forensics, information systems, IT and computer science. The proposed book delivers an ideal platform to gather leading-edge work from diverse fields on the complex subject of computational intelligence security in wireless communications. Further, this book aims to publish high-quality papers on this subject based on quantitative analysis, simulation and management. Our motivation is to offer a state-of-the-art discussion and introduce in this area new conceptual or/ and practical advancements. We invite original unpublished manuscripts which are not submitted anywhere in parallel.
Recommended topics, but not limited to:
Computational intelligence in wireless network and communications;
Artificial intelligence and wireless communication security;
Security risk scenarios in communications;
Cyber (re)insurance;
Security/resilience metrics and their measurements;
Data analytics of cyber-crimes;
Modeling of wireless communication security risks;
Computational strategies (economics, IT) for wireless communication security;
Systemic cyber risk;
Advances in cyber threats and computer crimes;
Adaptive and learning techniques for secure estimation and control;
Decision support systems;
IoT and cloud-based security and their applications;
Fault tolerance and diagnosis;
Cloud forensics and information systems;
Intelligent information retrieval;
Human-machine interaction and interfaces;
System modeling, simulation and optimization;
Lightweight portable security;