Security and Communication Networks

Cover image for Vol. 5 Issue 4

April 2012

Volume 5, Issue 4

Pages 343–437, e1–e2

  1. Research Articles

    1. Top of page
    2. Research Articles
    3. Review Articles
    4. Call for Papers
    1. A security enhanced authentication and key distribution protocol for wireless networks (pages 343–352)

      Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

      Version of Record online: 8 APR 2011 | DOI: 10.1002/sec.312

      Thumbnail image of graphical abstract

      In this paper, we propose an enhanced authentication and key distribution protocol to prevent off-line guessing attacks. Security analysis and formal verification prove that the proposed solution has strong security functionality to protect system from various malicious attacks.

    2. Robust track-and-trace video watermarking (pages 353–363)

      Lei Yang, Qian Chen, Jun Tian and Dapeng Wu

      Version of Record online: 30 MAR 2011 | DOI: 10.1002/sec.319

      Thumbnail image of graphical abstract

      We propose a robust track-and-trace video watermarking. At watermark embedder, we insert PN sequences as watermarking patterns into video frames according to AEC encrypted watermarking payload, with embedding strength determined from a human perceptual model, as well as geometric anticollusion code. At watermark decoder, we extract the watermarks and register videos by using cross correlation and KLT feature tracker. The proposed watermarking system is robust to geometric and collusion attacks.

    3. A cross-layer game for energy-efficient jamming detection in ad hoc networks (pages 364–373)

      G. Thamilarasu and R. Sridhar

      Version of Record online: 25 APR 2011 | DOI: 10.1002/sec.320

      Thumbnail image of graphical abstract

      This paper proposes a game theoretic framework using cross-layer mechanism to detect jamming attacks in wireless networks. Jamming is formulated as a non co-operative Bayesian game to analyze the interaction between attacker and monitoring nodes in the network. The cross-layer (CL) detection engine detects and records statistical PHY/MAC layer information such as average RTS/DATA retransmission value and average carrier sensing failure duration value. The cross-layer decision component uses these measurements to estimate the current game state and decides the optimal monitoring strategy.

    4. Discovering AODV-based multipath routes in wireless ad hoc networks (pages 374–383)

      Gang Li and Hongmei Sun

      Version of Record online: 31 MAY 2011 | DOI: 10.1002/sec.322

      Thumbnail image of graphical abstract

      In this paper, we propose an AODV-based acyclic multipath routing method, which uses dynamic hop count to discover loop-free multipath routes. The advantage of our method is that it allows a node to add a route entry with a hop count which is larger than its current hop count. This increases the possibility to find more loop-free route backups.

    5. Toward attack-resistant localization under infrastructure attacks (pages 384–403)

      Jie Yang and Yingying Chen

      Version of Record online: 12 MAY 2011 | DOI: 10.1002/sec.323

      Thumbnail image of graphical abstract

      We investigated the impact of infrastructure attacks on localization and showed that the performance of location estimations degraded significantly under the attack. We derived an attack-resistant scheme that is not algorithm specific and can be integrated with existing localization algorithms. Our attack-resistant scheme exploited the characteristics of the geometric patterns returned by location estimates. We validated our scheme using a large-scale wireless network test bed and a real office environment.

  2. Review Articles

    1. Top of page
    2. Research Articles
    3. Review Articles
    4. Call for Papers
    1. A survey of security visualization for computer network logs (pages 404–421)

      Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

      Version of Record online: 11 MAY 2011 | DOI: 10.1002/sec.324

      Thumbnail image of graphical abstract

      Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. In this survey, we looked into different security visual analytics, and we organized them into five categories.

    2. A survey of cyber crimes (pages 422–437)

      Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

      Version of Record online: 13 JUL 2011 | DOI: 10.1002/sec.331

      Thumbnail image of graphical abstract

      This paper provides a survey of cyber crimes that have actually occurred. First, cyber crimes in the digital world are compared with crimes in the physical world. Then, cyber crimes are categorized according to the roles of computers or networks.

  3. Call for Papers

    1. Top of page
    2. Research Articles
    3. Review Articles
    4. Call for Papers

SEARCH

SEARCH BY CITATION