Security and Communication Networks

Cover image for Vol. 6 Issue 4

April 2013

Volume 6, Issue 4

Pages i–iv, 385–547

  1. Issue Information

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. Issue Information (pages i–iv)

      Article first published online: 26 MAR 2013 | DOI: 10.1002/sec.656

  2. Editorial

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. You have free access to this content
  3. Special Issue Papers

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. Distributed monitoring for misbehaviour detection in wireless sensor networks (pages 388–400)

      Khelifa Benahmed, Madjid Merabti and Hafid Haffaf

      Article first published online: 29 AUG 2012 | DOI: 10.1002/sec.624

      Thumbnail image of graphical abstract

      The main idea of this work is to propose a simple and efficient distributed monitoring algorithm capable of detecting misbehaviours based on a clustered architecture, where the cluster head is elected according to a new set of metrics.

    2. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks (pages 401–419)

      Sanaa Taha and Xuemin (Sherman) Shen

      Article first published online: 9 OCT 2012 | DOI: 10.1002/sec.625

      Thumbnail image of graphical abstract

      ALPP adds anonymity and location privacy services to mobile IPv6 signaling to achieve mobile senders and receivers' privacy. Unlike existing schemes, ALPP alleviates the trade-off between the networking performance and the achieved privacy level. Combining onion routing and anonymizer in ALPP scheme increases the achieved location privacy level where no entity in the network except the mobile node itself can identify this node's location. Using entropy model, we show that ALPP achieves higher degree of anonymity than the mix-based scheme.

    3. Modeling tools for detecting DoS attacks in WSNs (pages 420–436)

      Paolo Ballarini, Lynda Mokdad and Quentin Monnet

      Article first published online: 14 FEB 2013 | DOI: 10.1002/sec.630

      Thumbnail image of graphical abstract

      Denial of service attacks constitute a threat for wireless sensor networks. This article presents a dynamic version of a solution involving control nodes to monitor traffic and detect and react to denial of service attacks. Good results for detection rate and energy balance are proved both by numerical results obtained with the NS-2 simulator and through statistical model checking with the Hybrid Automata Stochastic Logic.

    4. Performance comparison between IBE-HWMP and ECDSA-HWMP (pages 437–449)

      Yesica Imelda Saavedra Benitez, Jalel Ben-othman and Jean-Pierre Claude

      Article first published online: 28 FEB 2013 | DOI: 10.1002/sec.632

      Thumbnail image of graphical abstract

      We have implemented the IBE and ECDSA mechanisms to secure control messages in HWMP, namely PREQ (Path Request) and PREP (Path Reply). Our aim is to focus on secure data exchange in mutable fields. The performance of our protocol is studied and analyzed by means of computer simulations, and we show that our approach outperforms IBE-HWMP and ECDSA-HWMP protocols in terms of security, delay, throughput, packet delivery ratio and overhead.

    5. Context data distribution with quality guarantees for Android-based mobile systems (pages 450–460)

      Antonio Corradi, Mario Fanelli, Luca Foschini and Marcello Cinque

      Article first published online: 27 DEC 2012 | DOI: 10.1002/sec.633

      Thumbnail image of graphical abstract

      Context awareness has received an increasing attention up to becoming a core capability in next generation mobile scenarios. Context awareness intrinsically forces a continuous delivery of context data to resource-constrained mobile devices, to allow application adaptation, and that can become too severe a constraint even for modern mobile platforms (Android, iOS, etc.). This article focuses on the realization of a context data distribution support for Android-based mobile phones with guaranteed quality levels on the context data delivery time.

    6. Component-based security system (COMSEC) with QoS for wireless sensor networks (pages 461–472)

      Kashif Kifayat, Madjid Merabti, Qi Shi and Sohail Abbas

      Article first published online: 8 NOV 2012 | DOI: 10.1002/sec.634

      Thumbnail image of graphical abstract

      We propose a novel component-based security system based on proactive and reactive mechanisms. Each component takes care of a particular security issue, integrated with other components. The proposed system provides better secure communication, Sybil attack detection, secure data aggregation, and resilience against node capture attacks as well as replication attacks.

    7. Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems (pages 473–484)

      Kaouther Abrougui and Azzedine Boukerche

      Article first published online: 19 FEB 2013 | DOI: 10.1002/sec.641

      Thumbnail image of graphical abstract

      The key finding of this paper is the proposal of a secure service discovery protocols for vehicular ad hoc networks. The security aspect consists of the formation of authenticated groups or clusters. The latter permits the exchange of discovery messages in a secure way. We evaluate the performance of the proposed protocol.

    8. On downlink power allocation for multiuser variable-bit-rate video streaming (pages 485–497)

      Yingsong Huang, Shiwen Mao and Yihan Li

      Article first published online: 9 NOV 2012 | DOI: 10.1002/sec.642

      Thumbnail image of graphical abstract

      In this paper, we study the problem of power allocation for streaming multiple variable-bit-rate videos in the downlink of a cellular network. We analyze the convexity conditions of the formulated problem on optimal downlink power allocation for the variable-bit-rate video sessions and propose a two-step greedy approach to solve the problem. A distributed algorithm based on dual decomposition is also developed, which can be incorporated into the two-step solution procedure.

    9. Wireless security: securing mobile UMTS communications from interoperation of GSM (pages 498–508)

      Eric Southern, Abdelkader Ouda and Abdallah Shami

      Article first published online: 17 DEC 2012 | DOI: 10.1002/sec.674

      Thumbnail image of graphical abstract

      Two changes to the mobile networks security protocols have been proposed to protect against the legacy integration of global system for mobile communication (GSM). The former utilize a strong hash function to protect the secret key used in the GSM protocol. This will protect the GSM key from attackers and therefore, protect the universal mobile telecommunications system (UMTS) communication that depends on the keys devised from this GSM secret key. The later change is for the UMTS protocol to protect the key derivation process in UMTS so that if the secret key in GSM is compromised, still the secret keys used in UMTS are protected and unaffected.

    10. Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach (pages 509–522)

      Szymon Szott, Marek Natkaniec and Andrzej R. Pach

      Article first published online: 10 DEC 2012 | DOI: 10.1002/sec.677

      Thumbnail image of graphical abstract

      Selfish users can exploit mechanisms designed to assure quality of service in IEEE 802.11 networks. We propose a punishing mechanism that encourages standard-compliant behavior by degrading the selfish nodes' throughput proportionally to their degree of misbehavior. The suggested mechanism not only considerably improves quality of service provisioning but is also adaptive, does not have a negative impact on the throughput of well-behaving nodes, and provides legacy node support.

    11. Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support (pages 523–538)

      Soyoung Park, Baber Aslam, Damla Turgut and Cliff C. Zou

      Article first published online: 3 JAN 2013 | DOI: 10.1002/sec.679

      Thumbnail image of graphical abstract

      We propose two certificate mechanisms for preventing the Sybil attack in vehicular ad hoc network: the timestamp series approach and the temporary certificate approach. In the first approach, vehicles obtain a series of timestamps signed by the RSUs on their driving way. The Sybil attack can be detected by checking the similarity of timestamp series. The second approach issues temporary certificates to vehicles, which are valid only in a particular area for a limited time. By guaranteeing the uniqueness of the certificate, we prevent the Sybil attack.

    12. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks (pages 539–547)

      Farah Kandah, Yashaswi Singh, Weiyi Zhang and Chonggang Wang

      Article first published online: 18 FEB 2013 | DOI: 10.1002/sec.681

      Thumbnail image of graphical abstract

      We, in this work, show that an adversary can launch a colluding injected attack (CIA) on an arbitrary node thus preventing it from receiving or relaying any packets. Therefore, the attacked node could wrongly be reported as behaving maliciously by the neighborhood monitoring nodes. A monitoring verification (MOVE) scheme is proposed to mitigate the effect of the CIA attack. We show through simulations that our proposed MOVE scheme outperforms previous malicious detection schemes with more accurate decisions.

SEARCH

SEARCH BY CITATION