Security and Communication Networks

Cover image for Vol. 9 Issue 11

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Hsiao-Hwa Chen and Hamid R. Sharif

Impact Factor: 0.806

ISI Journal Citation Reports © Ranking: 2015: 57/82 (Telecommunications); 102/143 (Computer Science Information Systems)

Online ISSN: 1939-0122

  1. Research Articles

    1. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness

      Algimantas Venckauskas, Vytautas Stuikys, Robertas Damasevicius and Nerijus Jusas

      Version of Record online: 27 JUN 2016 | DOI: 10.1002/sec.1537

      Thumbnail image of graphical abstract

      The paper introduces a modelling framework to model the security-energy-environment issues as main attributes to allow defining quality of service (QoS) for the IoT-based applications. We model IoT units using the feature-based modelling methodology adopted from the software engineering domain. The result of modelling is a set of feature model with valid configurations that describe the energy-security-environment-performance relationships and possible constraints to support various IoT applications.

    2. A refined filter for UHAD to improve anomaly detection

      Asif Iqbal Hajamydeen and Nur Izura Udzir

      Version of Record online: 27 JUN 2016 | DOI: 10.1002/sec.1514

      Thumbnail image of graphical abstract

      This paper presents a refined filterer for unsupervised heterogeneous anomaly detection that retains most anomalous events regardless of its volume in the logs and furthermore discusses the impact of the refined filterer in supporting the detection. The experiment conducted exposes that the refined filterer retained almost all the abnormal events, thus enabling the detection of maximum anomalies.

  2. Editorials

    1. You have free access to this content
  3. Research Articles

    1. Secure principal component analysis in multiple distributed nodes

      Hee-Sun Won, Sang-Pil Kim, Sanghun Lee, Mi-Jung Choi and Yang-Sae Moon

      Version of Record online: 24 JUN 2016 | DOI: 10.1002/sec.1501

      Thumbnail image of graphical abstract

      Privacy preservation becomes an important issue in recent big data analysis, and many secure multiparty computations have been proposed for privacy preservation in the distributing environment. In this paper, we propose a secure multiparty computation protocol that computes principle component analysis over all distributed data correctly while not disclosing the data itself of individual nodes. The participating nodes share non-sensitive mean vectors first and compute principal component analysis with covariance matrices securely using the shared mean vectors.

  4. Special Issue Papers

    1. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

      Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk and Joerg Keller

      Version of Record online: 17 JUN 2016 | DOI: 10.1002/sec.1500

      Thumbnail image of graphical abstract

      In network steganography, so-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization - just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals and introduce a protocol engineering approach for micro protocols.

  5. Editorials

    1. Special issue on provable security

      Shaoquan Jiang, Tsuyoshi Takagi and Guilin Wang

      Version of Record online: 2 JUN 2016 | DOI: 10.1002/sec.1496

  6. Research Articles

    1. Detecting domain-flux botnet based on DNS traffic features in managed network

      Dinh-Tu Truong and Guang Cheng

      Version of Record online: 17 MAY 2016 | DOI: 10.1002/sec.1495

      Thumbnail image of graphical abstract

      This work presents a method based on analyzing DNS traffic to detect domain-flux botnets. This method passively captures all DNS traffic from the gateway of a monitored network. Then we extract key features to distinguish between a domain name generated by humans or bots, and based on these features, we apply various machine learning algorithms to train predictive models for detection.

    2. An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing

      Peixin Chen, Jinshu Su, Baokang Zhao, Xiaofeng Wang and Ilsun You

      Version of Record online: 17 MAY 2016 | DOI: 10.1002/sec.1492

      Thumbnail image of graphical abstract

      People-centric sensing (PCS), which collects information closely related to human activity and interactions in societies, is stepping into a flourishing time. In this paper, we propose an escrow-free online/offline HIBS (EF-HIBOOS) scheme for securing PCS. By utilizing user-selected-secret signing algorithm and splitting the signing phase into online and offline procedures, our scheme solves the key escrow problem and achieves high scheme performance.

    3. Identity-based access control for pro-active message's DTN

      Adrián Sánchez-Carmona, Sergi Robles and Carlos Borrego

      Version of Record online: 12 MAY 2016 | DOI: 10.1002/sec.1494

      Thumbnail image of graphical abstract

      Pro-active message's delay tolerant networks (DTNs) are based on the usage of mobile code to build messages that contain their own routing code. The access of this routing code to contextual and application-related information must be protected in order to make the whole architecture feasible. We propose an identity-based access control system for pro-active message's DTN based on symmetric key encryption and hashes. Our system grants confidentiality and integrity to the contextual information.

  7. Special Issue Papers

    1. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing

      Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong and Kaoru Ota

      Version of Record online: 12 MAY 2016 | DOI: 10.1002/sec.1490

      Thumbnail image of graphical abstract

      Many applications on mobile devices based on the cloud computing have emerged and boomed recently. Mobile data owners would like to upload and share the data through the cloud. However, it is impossible to require mobile data owners to provide every authenticated computational results. In the paper, we propose several secure multi-entities delegated authentication protocols (named as MEDAPs) in mobile cloud computing, which enables the multiple mobile data owners to authorize a group-designated cloud servers with the signing rights.

  8. Research Articles

    1. A universal method for realizing non-repudiable provable data possession in cloud storage

      Hongyuan Wang, Liehuang Zhu, Chang Xu and Yijia Lilong

      Version of Record online: 12 MAY 2016 | DOI: 10.1002/sec.1489

      Thumbnail image of graphical abstract

      In this paper, we propose a method to reform any private verification provable data possession (PDP)/proofs of retrievability scheme without a third party into a non-repudiable one and give an instantiation, the non-repudiable PDP scheme, which focuses on the verification where both the server and client are dishonest. We prove the security in the random oracle model, and the performance measurement indicates that our scheme can be executed efficiently as the original PDP/proofs of retrievability scheme and guaranteed non-repudiation efficaciously.

    2. Refined Shacham–Waters ring signature scheme in Seo–Cheon framework

      M. Prem Laxman Das, Jothi Rangasamy and R. Kabaleeshwaran

      Version of Record online: 12 MAY 2016 | DOI: 10.1002/sec.1470

      Thumbnail image of graphical abstract

      This paper instantiates the Shacham Waters ring signature scheme in the prime order setting. Interestingly, the converted scheme appears to be the first cryptographic scheme based on the Seo-Cheon asymmetric bilinear-group generator. This work also emphasizes that the Seo-Cheon definition of translating needs to be more specific, otherwise computational Delfie-Hellman problem becomes easy in general.

  9. Special Issue Papers

    1. Two-level security for message sequences

      Mohsen Alimomeni and Reihaneh Safavi-Naini

      Version of Record online: 10 MAY 2016 | DOI: 10.1002/sec.1453

      Thumbnail image of graphical abstract

      We consider a scenario where a sequence of messages must be protected and the security requirement is that, the most recent message has high level of security while past messages could be secured at a lower level. We assume the adversary is an eavesdropping adversary and has unlimited computational power. We formalize security of this scenario, construct an encryption system with provable security, and show that the required key length is optimal.

  10. Review Articles

    1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

      Sunil Kumar and Kamlesh Dutta

      Version of Record online: 5 MAY 2016 | DOI: 10.1002/sec.1484

      Thumbnail image of graphical abstract

      This paper describes a structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for mobile ad hoc networks in accordance with the technology layout and detection algorithms. These detection techniques are broadly classified into nine categories based on their primary detection engine(s). Further, an attempt has been made to compare different intrusion detection techniques with their operational strengths and limitations. Finally, the paper concludes with a number of future research directions in the design and implementation of intrusion detection systems for mobile ad hoc networks.

  11. Research Articles

    1. Publishing histograms with outliers under data differential privacy

      Qilong Han, Bo Shao, Lijie Li, Zhiqiang Ma, Haitao Zhang and Xiaojiang Du

      Version of Record online: 4 MAY 2016 | DOI: 10.1002/sec.1493

      Thumbnail image of graphical abstract

      The outliers in the original histogram can cause significant reconstruction errors. This paper puts forward a publication method for histograms with outliers under differential privacy, and experiments prove that the method proposed in this paper can improve the efficiency and accuracy of histogram publication.

  12. Special Issue Papers

    1. Perfect undetectability of network steganography

      Wojciech Frączek and Krzysztof Szczypiorski

      Version of Record online: 27 APR 2016 | DOI: 10.1002/sec.1491

      Thumbnail image of graphical abstract

      The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties, which will be used to transfer hidden messages. The paper presents the approach to perfect undetectability of network steganography, which was developed based on the rules of undetectability for general steganography.

    2. Attribution in cyberspace: techniques and legal implications

      Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh and Angelyn Flowers

      Version of Record online: 26 APR 2016 | DOI: 10.1002/sec.1485

      Thumbnail image of graphical abstract

      Attribution of cybercrimes is essential in mitigating cybercrimes. We propose a three-tier approach for attributing cybercrimes.These include the following: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. A comprehensive study of existing techniques reveals that level 3 attribution has only been achieved for very few crimes. We also discuss legal issues and highlight significant requirements for punishment and attribution in cyberspace.

    3. Stronger public key encryption system withstanding RAM scraper like attacks

      Sree Vivek Sivanandam, Sharmila Deva Selvi Selvaraj, Akshayaram Srinivasan and Pandu Rangan Chandrasekaran

      Version of Record online: 17 APR 2016 | DOI: 10.1002/sec.1454

      Thumbnail image of graphical abstract

      The notion of security of encryption scheme as defined by CCA2 security needs to be reexamined in the light of novel attacks based on newer technologies. Memory scrapers are among the deadliest attacks that go far beyond CCA2 security cover. This paper introduces a novel security model that models the memory scrapper like attacks precisely. Theeffectiveness of the new model is demonstrated, in theory and in practice.

  13. Research Articles

    1. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework

      Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

      Version of Record online: 15 APR 2016 | DOI: 10.1002/sec.1483

      Thumbnail image of graphical abstract

      In this paper, we proposed an online model for alert correlation using two modules, “online fuzzy clustering” and “fuzzzy inter-event pattern mining”. The former clusters alerts into fuzzy events based on their similarity and historical relevance, while the latter provides the historical relevance of alerts by mining frequent fuzzy patterns among them. Using these two modules, our approach is as fast as similarity-based approaches suitable for online alert correlation while it is able to extract complex attack scenarios too.

  14. Special Issue Papers

    1. Covert channel-internal control protocols: attacks and defense

      Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc and Michael Meier

      Version of Record online: 5 APR 2016 | DOI: 10.1002/sec.1471

      Thumbnail image of graphical abstract

      Micro protocols have been introduced in the recent years to enhance the capabilities of network covert channels. Usually placed within the hidden bits of a covert channel's payload, they enable features such as reliable data transfer, session management, and dynamic routing for network covert channels. This paper demonstrates some possible attacks on these protocols. The attacks are based on the attacker's interaction with the micro protocol. Defense techniques, which can safeguard these protocols against such attacks, are also presented.

SEARCH

SEARCH BY CITATION