International Journal of Network Management

Cover image for Vol. 27 Issue 5

Edited By: James Won-Ki Hong

Impact Factor: 1.118

ISI Journal Citation Reports © Ranking: 2016: 69/89 (Telecommunications); 107/146 (Computer Science Information Systems)

Online ISSN: 1099-1190

Recently Published Issues

See all

International Journal of Network Management

The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems.

Click here to read more about this journal.

Recently Published Articles

  1. Secure and efficient verification for data aggregation in wireless sensor networks

    Omar Rafik Merad Boudia, Sidi Mohammed Senouci and Mohammed Feham

    Version of Record online: 15 SEP 2017 | DOI: 10.1002/nem.2000

    Thumbnail image of graphical abstract

    This paper presents a secure data aggregation for WSNs. The solution provides end-to-end privacy and allows early detection of attacks through a hop-by-hop verification, thus reducing the need to rely entirely on sink node for verification. Based on an enhanced version of TinyECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.

  2. A service-agnostic method for predicting service metrics in real time

    Rerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad and Rolf Stadler

    Version of Record online: 13 SEP 2017 | DOI: 10.1002/nem.1991

    Thumbnail image of graphical abstract

    We collect device and network statistics from a cloud testbed and use statistical learning to predict client-side service metrics for video streaming and key-value store services. Our method predicts service metrics in real time, with mean absolute error below 16% for video frame rate and read latency. The method is service agnostic as it does not rely on service-specific metrics on the server side. We find that feature set reduction can improve prediction accuracy, while significantly reducing model computation time.

  3. Rendezvous-based access control for information-centric architectures

    Nikos Fotiou and Bander A. Alzahrani

    Version of Record online: 13 SEP 2017 | DOI: 10.1002/nem.2007

    Thumbnail image of graphical abstract

    This work leverages identity-based proxy re-encryption for protecting content in information centric networking architectures. Content can be stored in arbitrary network locations, outside the administration realm of the content owner, and still be protected. Moreover, by carefully selecting identities used by the encryption mechanisms, the scheme is robust even against misbehaving network entities.

  4. NomadiKey: User authentication for smart devices based on nomadic keys

    Artur Souza, Ítalo Cunha and Leonardo B Oliveira

    Version of Record online: 31 AUG 2017 | DOI: 10.1002/nem.1998

    Thumbnail image of graphical abstract

    In this paper we review the state-of-the-art of attacks and defenses on user to smart device authentication mechanisms and argue that existing mechanisms are either vulnerable to attacks or do not fully meet usability needs. To address this, we design, prototype, and evaluate a novel authentication mechanism based on nomadic keys called NomadiKey. We also design a security extension to NomadiKey that uses out-of-band channels during authentication to protect shoulder-surfing attacks.

  5. A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter

    Vennila Ganesan and Manikandan msk

    Version of Record online: 31 AUG 2017 | DOI: 10.1002/nem.1995

    Thumbnail image of graphical abstract

    A two-tier model has been developed in this work that includes Handler and Bloom filter (HBF). The handler, in the first-tier, detects both flooding and fake signaling attacks. The Bloom filter, in the second-tier, prevents both attacks before reaching the victim. The two-tier model ensures the reliability and trustworthiness between the service provider and customer. Besides, it also provides billing information to a customer who made a call and duration of the call actually carried out. The experimental results show that the HBF results a reduced detection time of 9 seconds with reduced false positive (FP) or less than 1% and false negative (FN) of 0.002% and preserves the voice call quality during media conservation.

SEARCH

SEARCH BY CITATION