Security and Communication Networks

Cover image for Vol. 8 Issue 8

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Hsiao-Hwa Chen and Hamid R. Sharif

Impact Factor: 0.433

ISI Journal Citation Reports © Ranking: 2013: 66/78 (Telecommunications); 116/135 (Computer Science Information Systems)

Online ISSN: 1939-0122

  1. Research Articles

    1. Modelling influence of Botnet features on effectiveness of DDoS attacks

      Simona Ramanauskaitė, Nikolaj Goranin, Antanas Čenys and Jonas Juknius

      Article first published online: 30 OCT 2014 | DOI: 10.1002/sec.1156

      Thumbnail image of graphical abstract

      Probability of victim resistance to DDoS depends on attack traceability, prevention and mitigation probabilities. We created a mathematical model to estimate how all of these components depend on Botnet features as well as victim and attack properties and used this model to analyse four different agent allocation strategies. Specifics of each of these four agent allocation strategies are presented in this paper too.

  2. Special Issue Papers

    1. Real-time audio steganography attack based on automatic objective quality feedback

      Qilin Qi, Aaron Sharp, Dongming Peng and Hamid Sharif

      Article first published online: 30 OCT 2014 | DOI: 10.1002/sec.1150

      Thumbnail image of graphical abstract

      This paper provides an efficient and effective method to attack the steganography in a real-time basis. The proposed generic method works well against a variety of steganography methods while preserving the cover audio quality by the automatic quality control scheme.

  3. Review Articles

    1. Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

      Muhammad Aamir and Syed Mustafa Ali Zaidi

      Article first published online: 29 OCT 2014 | DOI: 10.1002/sec.1149

      Thumbnail image of graphical abstract

      We provide a literature review on different types of possible DoS attacks in CCN and their proposed countermeasures. This survey makes a contribution by (a) highlighting state-of-the-art work in a tutorial manner on the exploration of different DoS attacks and their countermeasures in CCN, (b) identifying some potential problems of current CCN features and existing proposals of defense, and (c) forecasting and providing an overview of a few possible future techniques to help researchers fight against CCN-DoS attacks.

  4. Research Articles

    1. Preserving privacy in a smart grid scenario using quantum mechanics

      Fábio Borges, Raqueline A. M. Santos and Franklin L. Marquezino

      Article first published online: 28 OCT 2014 | DOI: 10.1002/sec.1152

      Thumbnail image of graphical abstract

      In this paper, we describe two quantum privacy-enhancing protocols: one of them requires that the parties initially share a certain amount of quantum entangled states, while the other uses only quantum key distribution methods without sharing quantum entangled states. The two proposed protocols are resistant to attacks from quantum computers, and the amount of stored keys is the minimum: zero. This paper also describes some recent advances of classical and quantum privacy-enhancing technologies.

  5. Research Article

    1. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

      Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

      Article first published online: 23 OCT 2014 | DOI: 10.1002/sec.1139

      Thumbnail image of graphical abstract

      We have proposed a new secure elliptic-curve cryptosystem-based single sign-on mechanism for user authentication and key establishment for the secure communications in a distributed computer networks using biometric-based smart card. Through informal and formal security analysis and verification, we have shown that our scheme is secure. Further, our scheme is efficient compared to other related existing schemes.

    2. Lattice-based obfuscation for re-encryption functions

      Rong Cheng and Fangguo Zhang

      Article first published online: 19 OCT 2014 | DOI: 10.1002/sec.1112

      Thumbnail image of graphical abstract

      This paper presents a lattice-based re-encryption function and then securely obfuscates it. Lattice-based cryptographic constructions are conjectured immune to quantum cryptanalysis.

    3. Enhancing the performance and security against media-access-control table overflow vulnerability attacks

      Yih-Jou Tzang, Hong-Yi Chang and Chih-Hsuan Tzang

      Article first published online: 14 OCT 2014 | DOI: 10.1002/sec.1142

      Thumbnail image of graphical abstract

      A media-access-control (MAC) table of switches is used to store the MAC addresses of stations in a local area network (LAN) segment to enable frame forwarding. A MAC table overflow vulnerability attack degrades switch-based LANs (each port of a switch comprises an individual operating domain and switch bandwidth) to bus-based LANs (all ports are bounded to one operating domain and share a bandwidth similarly to a hub). A novel per-port-based MAC table design is proposed to solve this vulnerability.

  6. Research Articles

    1. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

      Santanu Chatterjee and Ashok Kumar Das

      Article first published online: 14 OCT 2014 | DOI: 10.1002/sec.1140

      Thumbnail image of graphical abstract

      In this paper, we have proposed a new user access control scheme with attribute-based encryption using elliptic curve cryptography in hierarchical wireless sensor networks. Through both the formal and informal security analysis and verification using the widely accepted and used Automated Validation of Internet Security Protocol and Applications tool, we have shown that our scheme has the ability to tolerate different known attacks required for a user access control designed for wireless sensor networks. Furthermore, our scheme is efficient as compared with other existing user access control schemes.

  7. Special Issue Papers

    1. Digital image steganalysis based on local textural features and double dimensionality reduction

      Fengyong Li, Xinpeng Zhang, Hang Cheng and Jiang Yu

      Article first published online: 14 OCT 2014 | DOI: 10.1002/sec.1094

      Thumbnail image of graphical abstract

      This work proposes a spatial steganalysis scheme based on local textural features and double dimensionality reduction. An image is filtered by multiple filters to obtain a number of residual images. By comparing the pixel values with the neighbors' value in each residual image, local textural patterns are employed to form a high-dimensional steganalysis feature set. Then, principle component analysis (PCA) is used twice to perform double dimensionality reduction for high-dimensional textural features. Finally, a textural feature set with low dimensionality is proposed and can be effectively used in steganalysis.

  8. Research Articles

    1. Biometric watermarks based on face recognition methods for authentication of digital images

      Wioletta Wójtowicz and Marek R. Ogiela

      Article first published online: 14 OCT 2014 | DOI: 10.1002/sec.1114

      Thumbnail image of graphical abstract

      In this paper, we propose to combine biometric recognition methods with watermarking technology to perform authentication of digital images. The facial images are processed to construct face feature vectors that as copyright watermarks undergo a few watermarking schemes. The system performance is evaluated by subject identification accuracy obtained using neural networks.

    2. MoTIVE: mobile two-hop integrity validation for emergency vehicle routing

      Hsiao-Ching Lin, Chinyang Henry Tseng and Hui-Tang Lin

      Article first published online: 3 OCT 2014 | DOI: 10.1002/sec.1137

      Thumbnail image of graphical abstract

      For disaster rescue services, secure VANET communication is important. Therefore, we propose Mobile Two-hop Integrity Validation for Emergency vehicle routing (MoTIVE) to enhance routing security of ad hoc on-demand distance vector (AODV), a popular routing protocol in VANET. MoTIVE uses two-hop integrity stamping and validation rules without modifying protocol design. Compared with the original AODV, experiment results show that MoTIVE is scalable and causes no performance degradation while supplementary security protection is applied.

  9. Special Issue Papers

    1. A clustering approach based on convergence degree chain for wireless sensor networks

      Xiao-Hui Kuang, Li Liu, Qiang Liu and Xiang Li

      Article first published online: 3 OCT 2014 | DOI: 10.1002/sec.1042

      Thumbnail image of graphical abstract

      A novel Energy-efficient Clustering Approach based on Convergence Degree chain for wireless sensor networks, termed as ECACD, is proposed in this paper. ECACD protocol use convergence degree and residual energy for cluster head election, and take the energy threshold policy for cluster maintenance, and apply convergence degree chain based cluster head rotation. Analysis and simulation on the cluster header characteristics and the network life time show that ECACD can effectively increases the stability and extends the network life.

  10. Research Articles

    1. Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission

      Songlin Sun, Bo Rong and Yi Qian

      Article first published online: 29 SEP 2014 | DOI: 10.1002/sec.1118

      Thumbnail image of graphical abstract

      This work proposes to achieve covert orthogonal frequency division multiplexing transmission using cyclic delay diversity featured multiple-input multiple-output technology. Particularly, the presented physical layer security scheme takes the advantage of artificial periodical frequency selective channel to confuse unauthorized receivers.

    2. A multilayer non-repudiation system: a Suite-B approach

      Sasan Adibi

      Article first published online: 29 SEP 2014 | DOI: 10.1002/sec.1117

      Thumbnail image of graphical abstract

      This paper summarizes the implementation of Suite-B algorithms in three layers: Internet application, transport, and network layer, with a focus on non-repudiative functionality. This functionality is achieved through the utilization of the Elliptic Curve Digital Signature Algorithm and Secure Hash Algorithm deployed in these three layers.

    3. TSSL: improving SSL/TLS protocol by trust model

      Maryam Asadzadeh Kaljahi, Ali Payandeh and Mohammad Bagher Ghaznavi-Ghoushchi

      Article first published online: 21 SEP 2014 | DOI: 10.1002/sec.1113

      Thumbnail image of graphical abstract

      Transport Layer Security (TLS) protocol is vulnerable to the malicious server attacks, and also, it sends many messages during the handshake phase for providing a secure communication. We are going to propose a new protocol based on trust model called “TSSL protocol” in this paper. This model is used to conquer the disadvantages with the TLS protocol.

    4. An efficient parallel algorithm for exact multi-pattern matching

      Hongli Zhang, Dongliang Xu, Zhihong Tian and Yujian Fan

      Article first published online: 21 SEP 2014 | DOI: 10.1002/sec.1115

      Thumbnail image of graphical abstract

      This paper presents a parallel algorithm Parallel Extended Bloom Filter for exact multi-pattern matching based on Bloom Filter. We adjust its data structures to make it suitable for GPU. We use a small but high bandwidth share memory to realize a counting-Bloom-filter-like data structure (filter, on-chip) so that it improves the lookup performance of an off-chip hash table, and an analyzer (off-chip, stored in Texture memory) probes a suspicious string.

  11. Research Article

    1. Security and trust management in opportunistic networks: a survey

      Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang and Ping Yi

      Article first published online: 18 SEP 2014 | DOI: 10.1002/sec.1116

      Thumbnail image of graphical abstract

      In this paper, we first systematically describe the security threats and requirements in opportunistic networks; then propose a general security architecture of opportunistic networks; and then make an in-depth analysis on authentication and access control, secure routing, privacy protection, trust management and incentive cooperation mechanisms; and at the same time, we present a comparison of various security and trust solutions for opportunistic networks. Finally, we conclude and give future research directions.

  12. Research Articles

    1. Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency

      Weiwei Liu, Guangjie Liu and Yuewei Dai

      Article first published online: 15 SEP 2014 | DOI: 10.1002/sec.1111

      Thumbnail image of graphical abstract

      In this paper, a general damage-resistance matrix embedding framework in information hiding is reported, and we reveal the detailed relationship between damage-resistance capability and embedding performance. A practical near-optimal damage-resistance matrix embedding scheme is proposed based on parity-check concatenated convolutional codes.

    2. Right translated AES gray S-boxes

      Mubashar Khan and Naveed Ahmed Azam

      Article first published online: 11 SEP 2014 | DOI: 10.1002/sec.1110

      Thumbnail image of graphical abstract

      This paper deals with an algorithm for the generation of impregnable substitution boxes based on the application of right translation and Gray codes over the original Advanced Encryption Standard (AES) S-box. Regular representation of Galois field is used to produce the translational effect in the AES S-box. The translated AES S-box is then subjected to Gray codes for the enhancement in their algebraic complexity.

  13. Special Issue Papers

    1. Small target detection using morphology and modified Gaussian distance function

      Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok Gyu Lee, Daesung Moon and Sang-Kyoon Kim

      Article first published online: 11 SEP 2014 | DOI: 10.1002/sec.1069

      Thumbnail image of graphical abstract

      This paper proposes a new small target detection system that detects small target candidates based on morphology operations and detects actual targets using a modified Gaussian distance function. The proposed method is less sensitive to clutters than existing methods and has a detection rate of 98%.

SEARCH

SEARCH BY CITATION