International Journal of Network Management

Cover image for Vol. 27 Issue 5

Edited By: James Won-Ki Hong

Impact Factor: 1.118

ISI Journal Citation Reports © Ranking: 2016: 69/89 (Telecommunications); 107/146 (Computer Science Information Systems)

Online ISSN: 1099-1190

Recently Published Issues

See all

International Journal of Network Management

The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems.

Click here to read more about this journal.

Recently Published Articles

  1. Automatic data aggregation for recursively modeled NFV services

    Xuejun Cai, Wolfgang John and Catalin Meirosu

    Version of Record online: 25 SEP 2017 | DOI: 10.1002/nem.2009

    Thumbnail image of graphical abstract

    In this paper, we propose to use Datalog, a declarative logic programming language, to build a framework which supports efficient data aggregation for performance metrics of recursively modeled network services. We also describe the design and implementation of a proof-of-concept query engine utilizing the language. The experimental evaluation shows that the proposed query language and engine are practicable and effective in recursively retrieving performance metrics of NFV environments supporting large-scale service graphs and large numbers of query requests.

  2. Secure and efficient verification for data aggregation in wireless sensor networks

    Omar Rafik Merad Boudia, Sidi Mohammed Senouci and Mohammed Feham

    Version of Record online: 15 SEP 2017 | DOI: 10.1002/nem.2000

    Thumbnail image of graphical abstract

    This paper presents a secure data aggregation for WSNs. The solution provides end-to-end privacy and allows early detection of attacks through a hop-by-hop verification, thus reducing the need to rely entirely on sink node for verification. Based on an enhanced version of TinyECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.

  3. A service-agnostic method for predicting service metrics in real time

    Rerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad and Rolf Stadler

    Version of Record online: 13 SEP 2017 | DOI: 10.1002/nem.1991

    Thumbnail image of graphical abstract

    We collect device and network statistics from a cloud testbed and use statistical learning to predict client-side service metrics for video streaming and key-value store services. Our method predicts service metrics in real time, with mean absolute error below 16% for video frame rate and read latency. The method is service agnostic as it does not rely on service-specific metrics on the server side. We find that feature set reduction can improve prediction accuracy, while significantly reducing model computation time.

  4. Rendezvous-based access control for information-centric architectures

    Nikos Fotiou and Bander A. Alzahrani

    Version of Record online: 13 SEP 2017 | DOI: 10.1002/nem.2007

    Thumbnail image of graphical abstract

    This work leverages identity-based proxy re-encryption for protecting content in information centric networking architectures. Content can be stored in arbitrary network locations, outside the administration realm of the content owner, and still be protected. Moreover, by carefully selecting identities used by the encryption mechanisms, the scheme is robust even against misbehaving network entities.

  5. NomadiKey: User authentication for smart devices based on nomadic keys

    Artur Souza, Ítalo Cunha and Leonardo B Oliveira

    Version of Record online: 31 AUG 2017 | DOI: 10.1002/nem.1998

    Thumbnail image of graphical abstract

    In this paper we review the state-of-the-art of attacks and defenses on user to smart device authentication mechanisms and argue that existing mechanisms are either vulnerable to attacks or do not fully meet usability needs. To address this, we design, prototype, and evaluate a novel authentication mechanism based on nomadic keys called NomadiKey. We also design a security extension to NomadiKey that uses out-of-band channels during authentication to protect shoulder-surfing attacks.