Call for papers: Intelligent and trustworthy internet edge
Closed to new submissions
The emerging and ever-growing functionality of Internet edges, where physical and virtual things are connected to the network, are opening a wide set of new opportunities, both for novel services/applications and increased efficiency/scalability. These opportunities include locally sharing information, collaborating, and generating/consuming a huge amount of data, by involving a variety of entities, such as micro-data centers, end devices, and resourcesufficient networking nodes. While Fog/Edge Computing is usually expected to bring the resources, including storage and computation closer to users (in comparison to Cloud Computing), a significant effort is needed at the Internet edge to provide a trustworthy computation edge networking environment able to support new computation technologies. Indeed, distributed big data analytics, modern Machine Learning (ML) technology, Artificial Intelligence (AI), real-time data collection and processing, scalable and distributed security solutions such as blockchain, and distributed secure data processing, may play a significant role. Moreover, new networking technologies related to Information-Centric Networking (ICN), Software-Defined Networking (SDN), Network Function Virtualization (NFV), and network slicing have emerged as the novel paradigms for fast and efficient delivering and retrieving data. This triggers the convergence between the emerging networking concepts and the new computation technologies to reach the vision of an intelligent and trustworthy Internet edge.
In order to implement such trustworthy edge networks and services, several operation and management challenges associated with intelligent and trustworthy Internet edge need to be addressed. These challenges include: trustworthy connectivity and network resource management for heterogeneous networking (HetNet); security monitoring, measurement, and assessment to ensure networking and management functions to protect data; effective ML and computation models to consider different resources (storage, networking, and computing), security requirements, and real-time constraints; trustworthiness of data sources; in-network data processing and aggregation, intelligent planning and decision models to handle security and application requirements.
This special issue aims to bring together leading research on management infrastructure, applications and the most recent advances in Internet edge-based secure network management solutions. We hence encourage original paper submissions, which have not been published or submitted for publication elsewhere, from both academia and industry presenting novel research addressing the aforementioned challenges.
Dr. Dijiang Huang, Arizona State University, USA email@example.com
Dr. Jéferson Campos Nobre, Federal University of Rio Grande do Sul (UFRGS), Brazil firstname.lastname@example.org
Dr. Ruidong Li, NICT, Japan email@example.com
Dr. Paolo Bellavista, DEIS, Università di Bologna, Italy firstname.lastname@example.org
Dr. Abdelkader Lahmadi, University of Lorraine, France email@example.com
Open submission schedule
This special issue will take an “open” approach to submissions, where we do not have a submission time period. Interested authors can submit the paper any time before the deadline, and the review process will begin after the paper submission, in a first-in first-serve fashion.
Manuscript due: April 30, 2020
Revision notification: 2 months after submission revised paper due: 1.5 months after revision notification
Final notification: 1 month after the revised paper notification
Submission format and review guidelines
The submitted manuscripts must be written in English and describe original research not published nor currently under review by other journals or conferences. Parallel submissions will not be accepted. All submitted papers, if relevant to the theme and objectives of the special issue, will go through a vigorous peer-review process. Submissions should (i) conform strictly to the Instructions for Authors available on the Journal website and (ii) be submitted through the Editorial Management system available at: