Security and Communication Networks

Cover image for Vol. 4 Issue 4

April 2011

Volume 4, Issue 4

Pages 347–481

  1. Research Articles

    1. Top of page
    2. Research Articles
    3. Special Issue Papers
    4. Research Articles
    1. A novel approach to build QKD relaying models (pages 347–356)

      Quoc-Cuong Le and Patrick Bellot

      Version of Record online: 25 SEP 2009 | DOI: 10.1002/sec.139

      This paper presents a new approach for designing Quantum Key Distribution (QKD) relaying models. The idea is based on: (i) just revealing the classical XOR values at intermediate nodes, and (ii) using unknown quantum states to protect information on transmission links. As an illustration, we introduce two new untrusted QKD relaying models, one model works with single-photon sources and the other works with entangled-photon sources, that can extend QKD's range without reducing security of the original QKD schemes.

    2. Protocol oblivious classification of multimedia traffic (pages 357–371)

      Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura and Lixin Gao

      Version of Record online: 2 NOV 2009 | DOI: 10.1002/sec.154

      Thumbnail image of graphical abstract

      The paper presents VOVClassifier, an automated self-learning system that classifies network traffic data by extracting features from frequency domain using Power Spectral Density analysis and grouping features using Subspace Decomposition.

    3. SSL-enabled trusted communication: Spoofing and protecting the non-cautious users (pages 372–383)

      Fang Qi, Zhe Tang, Guojun Wang and Jie Wu

      Version of Record online: 4 DEC 2009 | DOI: 10.1002/sec.159

      Thumbnail image of graphical abstract

      We proposed the automatic detecting security indicator scheme (ADSI) to defend against spoofing attacks on SSL protected web servers. In a secure transaction, ADSI randomly chooses a picture and embeds it into the current web browser at the random place. This can be triggered by any security relevant event that has occurred on the browser, and then automatic checking is performed on the current active security status.

    4. Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism (pages 384–394)

      Sourour Meharouech, Adel Bouhoula and Tarek Abbes

      Version of Record online: 13 JAN 2010 | DOI: 10.1002/sec.161

      Thumbnail image of graphical abstract

      The high speed trusted intrusion detection architecture aims at accelerating the intrusion detection operation based on three main steps: traffic classification, load balancing and high availability mechanism.

  2. Special Issue Papers

    1. Top of page
    2. Research Articles
    3. Special Issue Papers
    4. Research Articles
    1. sRAMP: secure reconfigurable architecture and mobility platform (pages 395–409)

      Shao-Hsiu Hung, Jui-Hung Yeh and Jyh-Cheng Chen

      Version of Record online: 11 JAN 2010 | DOI: 10.1002/sec.167

      Thumbnail image of graphical abstract

      The sRAMP provides a reconfigurable framework for authentication protocols in addition to mobility management protocols. Furthermore, sRAMP can also secure the architecture against malicious attacks. The realization of the proposed sRAMP would be a step toward the integration of heterogeneous wireless networks and reconfigurable/programmable networks.

  3. Research Articles

    1. Top of page
    2. Research Articles
    3. Special Issue Papers
    4. Research Articles
    1. Adaptive Naive Bayes method for masquerade detection (pages 410–417)

      Subrat Kumar Dash, Krupa Sagar Reddy and Arun K. Pujari

      Version of Record online: 5 MAY 2010 | DOI: 10.1002/sec.168

      Thumbnail image of graphical abstract

      Masquerade attack is detected when the observed behavior, reportedly of a specific user, does not match with the learnt pattern of this user's past data. We propose, in this paper, a method based on the premise that the commands used by a legitimate user or an attacker may differ from the trained signature. But the deviation of the legitimate user is momentary whereas that of an attacker persists longer.

    2. Dynamic identity-based single password anti-phishing protocol (pages 418–427)

      Sandeep K. Sood, Anil K. Sarje and Kuldip Singh

      Version of Record online: 9 DEC 2009 | DOI: 10.1002/sec.169

      Thumbnail image of graphical abstract
    3. An iris recognition model for secured access to data (pages 428–435)

      Franjieh El Khoury, Marcel Egea, Nada Meskaoui and Nagi Wakim

      Version of Record online: 9 DEC 2009 | DOI: 10.1002/sec.170

      Thumbnail image of graphical abstract

      In this paper we present a new method of user's authentication for secured access to data based on the iris recognition biometric technique. Our model has proven a precision for the localization of the iris boundaries in an efficient process time.

    4. Packet-based algorithms for stepping-stone detection with chaff perturbation (pages 436–446)

      Han-Ching Wu and Shou-Hsuan Stephen Huang

      Version of Record online: 11 JAN 2010 | DOI: 10.1002/sec.177

      Thumbnail image of graphical abstract

      Network intruders usually launch attacks indirectly by constructing a long connection via intermediary hosts, called stepping-stones, to evade detection. It is important to identify a stepping-stone host to detect this type of attack, even though the connections are perturbed by inserting surperfluous padding packets (chaff) to defeat detection. We introduce the packet-based approach based on the range of a random walk model. Two effective algorithms, size-fluctuation and transformation, are proposed to distinguish the stepping-stone connections from the normal connections.

    5. A comprehensive investigation of secure location estimation techniques for WSN applications (pages 447–459)

      S. H. Arisar and A. H. Kemp

      Version of Record online: 11 JAN 2010 | DOI: 10.1002/sec.178

      Thumbnail image of graphical abstract

      Leakage of sensor location information is a threat to security in many security-sensitive applications of wireless sensor networks (WSN). This paper discusses strengths and weaknesses of secure location estimation schemes proposed globally for WSN. A classification of those schemes in various WSN application areas is proposed highlighting their performance in adversarial environments. Systematically it also provides an insight into steps leading to a novel optimized secure location estimation scheme design.

    6. Role-based authentication protocol (pages 460–470)

      Hongyan Yao

      Version of Record online: 6 OCT 2010 | DOI: 10.1002/sec.180

      Thumbnail image of graphical abstract

      In role-based authentication protocol, authentication and privacy can be achieved in one step by verifying user's role. The protocol is secure, reliable and practical.

    7. Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions (pages 471–481)

      R. Rajavelsamy, Jicheol Lee and Sungho Choi

      Version of Record online: 2 DEC 2009 | DOI: 10.1002/sec.155

      Thumbnail image of graphical abstract

      This paper evaluate the options for a viable security architecture for the 3GPP Home (evolved) NodeB (H(e)NB) and present the trade-off between the level of security provided and the associated cost of a H(e)NB device. It is of interest to analyse the security challenges, security requirements and security mechanisms for (i) H(e)NB authenticatioin, (ii) provisioning of security credentials, (iii) backhaul link protection, (iv) location verification and (v) user access control in the H(e)NB.

SEARCH

SEARCH BY CITATION