Intelligent and trustworthy internet edge

  in Special Issue   Posted on March 6, 2020

Information for the Special Issue

Submission Deadline: Thu 30 Apr 2020
Journal Impact Factor : 2.250
Journal Name : Journal of Network and Systems Management
Journal Publisher:
Website for the Special Issue:
Journal & Submission Website:

Special Issue Call for Papers:

The emerging and ever-growing functionality of Internet edges, where physical and virtual things are connected to the network, are opening a wide set of new opportunities, both for novel services/applications and increased efficiency/scalability. These opportunities include locally sharing information, collaborating, and generating/consuming a huge amount of data, by involving a variety of entities, such as micro-data centers, end devices, and resourcesufficient networking nodes. While Fog/Edge Computing is usually expected to bring the resources, including storage and computation closer to users (in comparison to Cloud Computing), a significant effort is needed at the Internet edge to provide a trustworthy computation edge networking environment able to support new computation technologies. Indeed, distributed big data analytics, modern Machine Learning (ML) technology, Artificial Intelligence (AI), real-time data collection and processing, scalable and distributed security solutions such as blockchain, and distributed secure data processing, may play a significant role. Moreover, new networking technologies related to Information-Centric Networking (ICN), Software-Defined Networking (SDN), Network Function Virtualization (NFV), and network slicing have emerged as the novel paradigms for fast and efficient delivering and retrieving data. This triggers the convergence between the emerging networking concepts and the new computation technologies to reach the vision of an intelligent and trustworthy Internet edge.

In order to implement such trustworthy edge networks and services, several operation and management challenges associated with intelligent and trustworthy Internet edge need to be addressed. These challenges include: trustworthy connectivity and network resource management for heterogeneous networking (HetNet); security monitoring, measurement, and assessment to ensure networking and management functions to protect data; effective ML and computation models to consider different resources (storage, networking, and computing), security requirements, and real-time constraints; trustworthiness of data sources; in-network data processing and aggregation, intelligent planning and decision models to handle security and application requirements.

This special issue aims to bring together leading research on management infrastructure, applications and the most recent advances in Internet edge-based secure network management solutions. We hence encourage original paper submissions, which have not been published or submitted for publication elsewhere, from both academia and industry presenting novel research addressing the aforementioned challenges.

Guest editors

Dr. Dijiang Huang, Arizona State University, USA
Dr. Jéferson Campos Nobre, Federal University of Rio Grande do Sul (UFRGS), Brazil
Dr. Ruidong Li, NICT, Japan
Dr. Paolo Bellavista, DEIS, Università di Bologna, Italy
Dr. Abdelkader Lahmadi, University of Lorraine, France

Open submission schedule

This special issue will take an “open” approach to submissions, where we do not have a submission time period. Interested authors can submit the paper any time before the deadline, and the review process will begin after the paper submission, in a first-in first-serve fashion.

Manuscript due: April 30, 2020
Revision notification: 2 months after submission revised paper due: 1.5 months after revision notification
Final notification: 1 month after the revised paper notification

Submission format and review guidelines

The submitted manuscripts must be written in English and describe original research not published nor currently under review by other journals or conferences. Parallel submissions will not be accepted. All submitted papers, if relevant to the theme and objectives of the special issue, will go through a vigorous peer-review process. Submissions should (i) conform strictly to the Instructions for Authors available on the Journal website and (ii) be submitted through the Editorial Management system available at:

Other Special Issues on this journal


Cybersecurity management in the era of AI

Journal of Network and Systems Management
Sat 31 Oct 2020

Network management for beyond 5G systems

Journal of Network and Systems Management
Tue 30 Mar 2021