IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments
Due to the COVID-19 epidemic, face-to-face team working has changed into distanced work from home. Modern, decentralized digital communication environments are changing with the availability of new technologies and the development of new real-world applications, which lead to novel challenges in security and privacy protection. 5G/6G mobile applications, the smart Internet of Things (IoT) devices, big data applications, and cloud systems are developing to better meet new requirements.
... ud architecture is emerging as 5G /6G mobile IoT devices are generating large volumes of data which need cloud infrastructure to process. Many IoT systems and cloud systems are decentralized, and new security and privacy protection solutions are emerging in decentralized networks. The increasing interdependence of IT solutions accepted by society has led to a sharp increase in data. As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection. This Special Section in IEEE ACCESS aims to report highlighted security and privacy research in modern decentralized digital communication environments. The Special Section invited experts and scholars in the fields of digital security, so that readers can keep abreast of the latest developments in the industry and master the latest security technologies. This Special Section attracted a good number of submissions; 166 articles were submitted, and in total 53 articles were finally accepted. The invited article "Covert channels in the MQTT-based Internet of Things," by Velinov et al., presents the first comprehensive study of covert channels in the Internet of Things (IoT) environments by studying the network information hiding patterns, which presents an emerging topic of security solutions in decentralized communication. The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message attacks without random oracle, and provides anonymity, traceability, and privacy for the VANETs.