International Journal of Network Management
© John Wiley & Sons Ltd
Edited By: James Won-Ki Hong
Impact Factor: 0.681
ISI Journal Citation Reports © Ranking: 2015: 65/82 (Telecommunications); 110/143 (Computer Science Information Systems)
Online ISSN: 1099-1190
International Journal of Network Management
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics.
Recently Published Articles
- Seamless integration of cloud and fog networks
Igor Duarte Cardoso, João P. Barraca, Carlos Gonçalves and Rui L. Aguiar
Version of Record online: 22 JUL 2016 | DOI: 10.1002/nem.1944
A way to merge cloud computing infrastructures with traditional or legacy network deployments, by extending virtualized network segments towards the fog and having pluggable interfaces to support any kind of network device that can be remotely configured. Provisioning times can be reduced when using legacy equipment, by centralizing and automating control and configuration, with migration to full SDN-based deployments done iteratively and in tandem with existing deployments.
- Effective network management via dynamic network anomaly visualization
Qi Liao and Ting Li
Version of Record online: 20 JUL 2016 | DOI: 10.1002/nem.1945
One of the biggest challenges of managing large-scale dynamic networks is the ability to make sense of and identify the causes of potentially bad activities from a large amount of log data. To that end, we designed and implemented a network log data visualization tool to analyze network anomalies. In particular, our link anomaly graphs augmented by link anomaly detection algorithms, together with other views such as parallel coordinates, tree maps, and Gantt charts, can effectively analyze hard-to-find anomalies in dynamic networks.
- A flexible information service for management of virtualized software-defined infrastructures
Lefteris Mamatas, Stuart Clayman and Alex Galis
Version of Record online: 15 JUL 2016 | DOI: 10.1002/nem.1943
The paper introduces and presents the design details of the virtual infrastructure information service, a new management information handling framework that (i) provides logically centralized information flow establishment, optimization, coordination, synchronization and management with respect to the diverse management and control entity demands, (ii) is designed according to the characteristics and requirements of software-defined networking and network function virtualization and (iii) inter-operates with our own virtualized infrastructure framework. It includes evaluation results demonstrating its flexible and adaptable behaviour.
- An adaptive Paris Metro Pricing scheme for mobile data networks
Huai-Sheng Huang, Shu-Chiung Hu, Po-Han Lee and Yu-Chee Tseng
Version of Record online: 15 JUL 2016 | DOI: 10.1002/nem.1941
In this paper, we propose an adaptive PMP scheme, so-called APMP, which determines the dynamic access prices of different classes for the next 24 h. The accessible prices should try to increase the revenue while operators can serve more subscribers. Our simulation results show that APMP can significantly improve total revenue and average revenue per user for the operator.
- A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He and Naveen Chilamkurti
Version of Record online: 8 JUL 2016 | DOI: 10.1002/nem.1937
- We put forward a privacy-aware two-factor authentication protocol based on elliptic curve cryptography for WSNs.
- Our new protocol accomplishes various security features necessary for real-life application environments while maintaining acceptable efficiency.
- We prove that the new protocol fulfills mutual authentication in the Burrows-Abadi-Needham logic.
- Additionally, by way of informal security analysis, we show that the new protocol can withstand a variety of attacks and provide desirable security features.