Security and Communication Networks

Cover image for Vol. 8 Issue 8

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Hsiao-Hwa Chen and Hamid R. Sharif

Impact Factor: 0.433

ISI Journal Citation Reports © Ranking: 2013: 66/78 (Telecommunications); 116/135 (Computer Science Information Systems)

Online ISSN: 1939-0122

  1. Special Issue Papers

    1. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

      Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

      Article first published online: 7 MAY 2014 | DOI: 10.1002/sec.1026

      Thumbnail image of graphical abstract

      A trust dynamic task allocation algorithm is proposed to address the task allocation problem for a heterogeneous wireless sensor network (WSN). A discrete particle swarm optimization is designed to generate a structure of the parallel coalitions. Task strategies and payoff functions by invoking the game theory in WSNs are designed.

    2. Location-preserved contention-based routing in vehicular ad hoc networks

      Qing Yang, Alvin Lim, Xiaojun Ruan, Xiao Qin and Dongjin Kim

      Article first published online: 11 APR 2014 | DOI: 10.1002/sec.1008

      Thumbnail image of graphical abstract

      Using pseudonyms and dummy distance to destination information, the proposed location preserved contention based routing protocol can achieve 11.7% improvement on network performance and a higher level of location privacy protection compared with the second best protocol-contention-based forwarding active selection.

    3. Single authentication through in convergence space using collaborative smart cameras

      Geon Woo Kim, Jong Wook Han, Deok Gyu Lee and Sang Wook Kim

      Article first published online: 4 APR 2014 | DOI: 10.1002/sec.1007

      Thumbnail image of graphical abstract

      In this paper, we suggest a single authentication through, a scheme to access any ubiquitous service with single authentication at initial stage for efficiently identifying an object moving multiple convergences spaces. This is performed by enabling distributed smart cameras to deliver identifiers temporarily generated during the object's handover.

    4. Towards secure identity management for the smart grid

      Todd Baumeister and Yingfei Dong

      Article first published online: 3 APR 2014 | DOI: 10.1002/sec.996

      Thumbnail image of graphical abstract

      The emerging smart grid incorporates modern information systems with traditional power delivery systems to achieve better control, efficiency, and reliability. However, it also brings potential cyber security risks into the essential power system. Therefore, we need a large-scale framework to address the basic security issues such as identity management in the smart grid. While public key infrastructures (PKIs) have been developed for large-scale distributed information systems, the existing PKI solutions cannot meet the unique requirements of the electrical power grid.

    5. Optimisation-based collaborative determination of component trustworthiness in service compositions

      Hisain Elshaafi and Dmitri Botvich

      Article first published online: 17 MAR 2014 | DOI: 10.1002/sec.985

      Thumbnail image of graphical abstract

      The paper describes an optimisation-based approach for the determination of component service trustworthiness based on the trustworthiness attributes of collaborating composite services. The approach can identify untrustworthy components and detect the trustworthiness of candidate components to be selected for new compositions. The composite services jointly invoke distributed component services. The paper covers some of the important attributes of trustworthy services that are service reliability, reputation and response time.

    6. Server-based code obfuscation scheme for APK tamper detection

      Yuxue Piao, Jin-Hyuk Jung and Jeong Hyun Yi

      Article first published online: 10 MAR 2014 | DOI: 10.1002/sec.936

      Thumbnail image of graphical abstract

      We propose an obfuscation technique based on a client/server model with one-time secret key delivery using SMS or network protocol. The main concept is to store the core execute class file through obfuscation on the server, so when a program needs to execute core routines, it must request these routines from the server. In this way, we can protect Android apps from reverse engineering.

    7. Performance evaluation of collision avoidance schemes in ad hoc networks

      Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

      Article first published online: 10 MAR 2014 | DOI: 10.1002/sec.959

      Thumbnail image of graphical abstract

      This paper surveys, evaluates, and compares representative schemes aimed to improve IEEE 802.11 distributed coordination function fairness in the presence of hidden and exposed terminals.

    8. Robust three-factor remote user authentication scheme with key agreement for multimedia systems

      Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao

      Article first published online: 5 MAR 2014 | DOI: 10.1002/sec.961

      Thumbnail image of graphical abstract

      In this paper, we analyzed the security weaknesses of a biometric-based authentication scheme, which is proposed by An, where An's scheme vulnerable to denial-of-service attack and forgery attack cannot detect unauthorized login quickly and does not provide session key agreement. Then, in order to provide high levels of security for multimedia systems, we design a robust three-factor remote user authentication scheme with key agreement using elliptic curve cryptosystem.

    9. A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages

      Aziz Nasridinov, Young-Sik Jeong, Jeong-Yong Byun and Young-Ho Park

      Article first published online: 4 MAR 2014 | DOI: 10.1002/sec.934

      Thumbnail image of graphical abstract

      In order to secure the content of simple object access protocol (SOAP) messages in Web services, several security standards of Web service security, such as XML digital signature, are used. However, the content of a SOAP message, protected with XML digital signature, can be altered without invalidating the signature. This is the so-called XML rewriting attack, and it can occur because XML digital signature does not protect the location of the signed element within the SOAP message tree. In this paper, we propose an efficient method for detecting XML rewriting attacks on SOAP message using a histogram.

    10. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks

      Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong and Zhenfu Cao

      Article first published online: 17 JAN 2014 | DOI: 10.1002/sec.950

      Thumbnail image of graphical abstract

      In this paper, we present a novel hybrid cloud-based privacy-preserving outsourced data aggregation framework. Under this framework, we present the protocols to realize the privacy-preserving aggregation and resist the malicious data mining attack. The detailed performance simulations are given to demonstrate the security, effectiveness, and efficiency of the proposed protocols.


    1. Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

      Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang and Ying Qi

      Article first published online: 16 JAN 2014 | DOI: 10.1002/sec.932

      Thumbnail image of graphical abstract

      This paper proposes the link and node vulnerabilities as metrics for characterizing the degree of link and node sharing among paths, develops two polynomial-time algorithms for deriving the node and link vulnerability-constrained minimum cost paths, and analyzes the necessary condition for the solution existence, the optimality of the proposed algorithms, and the related properties of tree network theoretically.


    1. Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation

      Pengbo Si, Jia Liu, Yanhua Sun and Yanhua Zhang

      Article first published online: 8 JAN 2014 | DOI: 10.1002/sec.928

      Thumbnail image of graphical abstract

      Taking into account the application layer quality of service and wireless link security, a dynamic spectrum management scheme is proposed to minimize the system cost of cyber-physical surveillance system for transportation. Video distortion is considered as the application layer quality of service metric, and the system cost is defined as a combination of distortion and security cost. The problem is formulated as a restless bandit system to utilize the current and historical information for system optimization.


    1. A mobile phone-based physical-social location proof system for mobile social network service

      Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu and Dong Xuan

      Article first published online: 8 JAN 2014 | DOI: 10.1002/sec.926

      Thumbnail image of graphical abstract

      Location-related mobile social network services rely on people's self-report location claims, which can be easily cheated by malicious users who transmit fake location to access restricted resource. To address this problem, we propose a mobile phone based physical-social location proof system. The core idea is using a set of selective physical encountered people serving as “witnesses” who are co-located in that area. Our experimental results show our system can achieve high accuracy and good performance.

  5. Research Articles

    1. A privacy enhanced device access protocol for an IoT context

      G.M. Køien

      Article first published online: 28 NOV 2013 | DOI: 10.1002/sec.880

      Thumbnail image of graphical abstract

      We increasingly inhabit a world of massively distributed Internet-of-Things devices, but ubiquitous access also means ubiquitous privacy exposure. In this paper, we outline a lightweight and efficient device access protocol that will allow secure and privacy enhanced access to Internet-of-Things devices. We use a novel convoluted scheme together with randomized temporary identities to achieve strong security and credible user privacy.

  6. Special Issue Papers

    1. TCP-polite rate control based on cooperative measurement

      Wen-Yong Wang, Li-Sheng Huang, Chang-Chun Li and Xin Wang

      Article first published online: 18 NOV 2013 | DOI: 10.1002/sec.901

      Thumbnail image of graphical abstract

      A new cooperative transmission control mechanism, called TCP-polite rate control (TPRC), is proposed. In this scheme, the congestion metric of network is obtained with cooperative measurement and feeds back to rate-based pacing mechanism, thus keeping the transmission rate at the lower bound of available bandwidth.

    2. An enhanced security framework for reliable Android operating system

      Jong Hyuk Park, Dohyun Kim, Ji Soo Park and Sangjin Lee

      Article first published online: 13 NOV 2013 | DOI: 10.1002/sec.908

      Thumbnail image of graphical abstract

      In order to provide reliability on Android OS, there is a need to analyze and address these malwares and recover the modified data. In this paper, we propose an enhanced security framework for a reliable Android OS. The framework provides means to prevent influx of malware by examining the Android OS and file system. In addition, it recovers data once deleted by security breaches.

    3. Enforcing mobile security with location-aware role-based access control

      Nils Ulltveit-Moe and Vladimir Oleshchuk

      Article first published online: 13 NOV 2013 | DOI: 10.1002/sec.879

      Thumbnail image of graphical abstract

      This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of Geospatial eXtensible Access Control Markup Language (GeoXACML), in order to provide location-dependent access control and security enhancements for mobile devices, such as location-dependent device locking, firewall, intrusion prevention or payment anti-fraud systems. This solution allows for physical instead of logical addressing of locations, which facilitates easy deployment of location-aware authorisation policies.


    1. CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid

      Mi Wen, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Ruilong Deng and Xuemin (Sherman) Shen

      Article first published online: 12 NOV 2013 | DOI: 10.1002/sec.895

      Thumbnail image of graphical abstract

      This paper propose a credit-based incentive tariff (CIT) scheme with fraud-traceability for smart grid. Specifically, the CIT encourages retail customers to sell the power generated by their renewable resources back to the grid during peak hours via giving additional incentive rate to them based on their credits. The security analysis shows that the CIT resists various security threats and makes the incentive tariff fair and more secure. The performance evaluation demonstrates that the CIT can dramatically increase the peak-hour supply and reduce the peak-to-average power demand ratio by up to 7%.

  8. Research Articles

    1. Generalized (identity-based) hash proof system and its applications

      Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

      Article first published online: 7 NOV 2013 | DOI: 10.1002/sec.827

      Thumbnail image of graphical abstract

      We generalize the paradigm of the hash proof system (HPS) and present a general construction of leakage-resilient anonymous public-key encryption (PEK) from anonymous HPS. We generalize the paradigm of an identity-based HPS (IB-HPS) and introduce an anonymous IB-HPS. We consider the security for PEK with keyword search (PEKS) in the presence of token leakage and provide a generic construction of leakage-resilient secure PEKS from a leakage-resilient anonymous identity-based encryption, which in turn is based on anonymous IB-HPS.

  9. Special Issue Papers

    1. A survey on security and privacy issues in Wireless Mesh Networks

      Aggeliki Sgora, Dimitrios D. Vergados and P. Chatzimisios

      Article first published online: 12 SEP 2013 | DOI: 10.1002/sec.846

      Thumbnail image of graphical abstract

      Wireless mesh networks (WMNs) are considered a promising solution for offering low-cost access to broadband services. However, the multi-hop nature, the lack of physical protection, the dynamic topology, and ad hoc connectivity among end user nodes are such characteristics of WMNs that pose new challenges in achieving security. Although security in WMNs has attracted many researchers and many intrusion prevention, detection and response mechanisms may be found in the literature, the question about which is the best solution still remains unanswered, because each of them focuses on specific attacks and requirements.