Security and Communication Networks

Cover image for Vol. 8 Issue 9

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Hsiao-Hwa Chen and Hamid R. Sharif

Impact Factor: 0.433

ISI Journal Citation Reports © Ranking: 2013: 66/78 (Telecommunications); 116/135 (Computer Science Information Systems)

Online ISSN: 1939-0122

  1. Research Articles

    1. 3S: three-signature path authentication for BGP security

      Yaping Liu, Wenping Deng, Zhihong Liu and Feng Huang

      Article first published online: 18 FEB 2015 | DOI: 10.1002/sec.1227

      Thumbnail image of graphical abstract

      We propose a three-signature path authentication (3S) scheme to improve the performance of path authentication. We first introduce the concept of " virtual AS," to reflect a cluster of prefixes that are announced along with a common path/sub-path. Then we aggregate those prefixes into an atom and only need to sign the first route announcement of a virtual AS instead of single prefixes; thus, it can reduce the number of cryptographic operations significantly. We evaluate the performance of 3S scheme in both theoretical and experimental ways; the results have shown that our proposed scheme is more efficient yet without losing security capabilities as existing methods such as S-BGP and BGPsec.

    2. Identity-based universal re-encryption for mixnets

      Habib Allah Yajam, Javad Mohajeri and Mahmoud Salmasizadeh

      Article first published online: 18 FEB 2015 | DOI: 10.1002/sec.1226

      Thumbnail image of graphical abstract

      In a conventional re-encryption cryptosystem, re-encryption is permitted only for a party who has access to the public key corresponding to a given ciphertext. However, in universal cryptosystems, no knowledge about the public key is necessary for performing re-encryption. In this paper, we generalize the definition of universal cryptosystems to ID-based cryptography and propose two provable secure ID-based universal cryptosystem schemes. The paper includes experimental results that demonstrate high performance of the schemes for practical purposes.

  2. Research Article

    1. Privacy preserving smartcard-based authentication system with provable security

      Jin Wook Byun

      Article first published online: 17 FEB 2015 | DOI: 10.1002/sec.1229

      Thumbnail image of graphical abstract

      In this paper, we suggest a new privacy preserving smartcard-based password authenticated key exchange with provable security. Only the user who has two secrets (smartcard and password) can go through authentication with key exchange while concealing its identifier from outsider adversaries.

  3. Research Articles

    1. Construction of resilient Boolean functions with high nonlinearity and good algebraic degree

      Lu-Yang Li and Wei-Guo Zhang

      Article first published online: 17 FEB 2015 | DOI: 10.1002/sec.1218

      Thumbnail image of graphical abstract

      In this paper, two construction methods are proposed to obtain resilient Boolean functions with high nonlinearity and good algebraic properties. It is shown that a class of resilient functions with high algebraic degree and currently best known nonlinearity can be constructed by using our technique. The algebraic immunity of the constructed functions is also analyzed.

  4. Special Issue Papers

    1. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds

      Bo Li, Jianxin Li, Lu Liu and Chao Zhou

      Article first published online: 17 FEB 2015 | DOI: 10.1002/sec.1216

      Thumbnail image of graphical abstract

      A flexible and fine-grained access control framework, named IaaS-oriented Hybrid Access Control (iHAC), is proposed in this paper. iHAC designs a permission transition model to dynamically assign permissions to virtual machines and regulates the behaviors of virtual machines in a fine-grained manner.

    2. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

      Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang and Muhammad Khurram Khan

      Article first published online: 16 FEB 2015 | DOI: 10.1002/sec.1214

      Thumbnail image of graphical abstract

      This paper points out some security flaws the authentication protocol of He et al.s for healthcare applications using wireless medical sensor networks. Besides, a new three-factor user-anonymous authentication protocol based on wireless medical sensor networks is proposed. Some security analysis and comparisons are done to illustrate the efficiency and security of the protocol.

  5. Research Article

    1. Modeling and verification of trust and reputation systems

      Alessandro Aldini

      Article first published online: 16 FEB 2015 | DOI: 10.1002/sec.1220

      Thumbnail image of graphical abstract

      The proposed approach combines a process algebraic architectural description language with a mathematical paradigm for trust modeling in a framework subsuming a unifying formal semantics on which model checking techniques can be applied to verify trust properties described in a trust temporal logic.

  6. Research Articles

    1. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

      Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

      Article first published online: 13 FEB 2015 | DOI: 10.1002/sec.1208

      Thumbnail image of graphical abstract

      This paper proposes a provably secure unpredictability-based forward privacy model for radio frequency identification authentication system. It also presents an radio frequency identification protocol that is proved to be secure under the proposed model.

  7. Special Issue Paper

    1. Constructing authentication web in cloud computing

      Gansen Zhao, Zhongjie Ba, Xinming Wang, Feng Zhang, Changqin Huang and Yong Tang

      Article first published online: 13 FEB 2015 | DOI: 10.1002/sec.1202

      Thumbnail image of graphical abstract

      This work proposes a cross-domain single sign-on mechanism. It allows service providers to verify user identities in a decentralized way and allows users to unify their identities from various domains in a safe way. The verification process used in this mechanism is able to support hybrid authentication protocols as well as to accelerate the verification of credentials by eliminating single point of failure and single-point bottleneck.

  8. Special Issue Papers

    1. An intrusion detection method for wireless sensor network based on mathematical morphology

      Yanwen Wang, Xiaoling Wu and Hainan Chen

      Article first published online: 11 FEB 2015 | DOI: 10.1002/sec.1181

      Thumbnail image of graphical abstract

      In this paper, " An intrusion detection method for wireless sensor network based on mathematical morphology" written by Yanwen Wang, Xiaoling Wu* and Hainan Chen, an innovative method called Granulometric Size Distribution (GSD) method is proposed based on mathematical morphology for detecting malicious attack in IoTs. GSD clusters are successfully generated to monitor the number of active nodes in a wireless sensor network because the GSD curves are similar when the number of active nodes in a wireless sensor network isfixed.

  9. Research Articles

    1. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

      Keke Gai, Meikang Qiu, Lixin Tao and Yongxin Zhu

      Article first published online: 11 FEB 2015 | DOI: 10.1002/sec.1224

      Thumbnail image of graphical abstract

      This paper proposes a high level framework of using mobile cloud-computing-based Intrusion Detection Systems (IDSs) on mobile applications. The types of IDS are reviewed and synthesized by this paper. Connecting mobile cloud computing platform with IDS techniques is an efficient approach for securing mobile apps in 4G/5G.

    2. On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

      Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan and Bok-Min Goi

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1234

      Thumbnail image of graphical abstract

      In 2011, Eissa, Razak and Ngadi proposed a lightweight authentication and encryption scheme to enhance the performance for mobile ad hoc network (MANET). This paper shows the security weaknesses of their proposed scheme and explains the reasons why such scheme does not solve the challenging issues faced by MANET.

    3. Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme

      Hongfeng Zhu

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1225

      Thumbnail image of graphical abstract

      The paper firstly shows that Lin's scheme cannot resist many attacks. Then we firstly proposed an attack method called XOR with pad operation leaking attack, which can lead to the worst case scenario: an adversary can get the session key without being detected. Finally, we proposed an improved protocol with provable security under the random oracle model. Compared with previous related works, the improved protocol not only can withstand existential active attacks but also has better computational efficiency.

    4. Truncated differential cryptanalysis of PRINCE

      Guangyao Zhao, Bing Sun, Chao Li and Jinshu Su

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1213

      Thumbnail image of graphical abstract

      We exploit some new vulnerabilities of PRINCE and apply truncated differential cryptanalysis to it. There exist 5-round and 6-round (out of 12 rounds) truncated differential distinguishers, and we can introduce a key recovery attack on 7-round PRINCEinline image using two 5-round distinguishers.

    5. Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting

      Michael Farcasin and Eric Chan-tin

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1184

      Thumbnail image of graphical abstract

      We performed two surveys to understand how members of a university managed their passwords when the university offered four pre-generated random passwords or the option for users to create their own subject to stringent requirements. We found that most respondents chose to create their own password and utilized coping strategies that undermined the security of the requirements. We also attempt to connect these behaviors to respondents' other password habits and demographics and analyzed participant comments.

  10. Special Issue Papers

    1. You have free access to this content
      Universal steganography model for low bit-rate speech codec

      Shanyu Tang, Qing Chen, Wei Zhang and Yongfeng Huang

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1183

      Thumbnail image of graphical abstract

      The authors proposed a universal VoIP steganography model for covert communications using low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream. With the proposed model, it achieved the average PESQ deterioration rate of 4.04% (indicating strong imperceptibility) and a high data hiding capacity up to 12 bits/frame (400 bits/second, three times larger than other methods), and could effectively resist the latest steganalysis.

  11. Research Articles

    1. One-time identity–password authenticated key agreement scheme based on biometrics

      Hongfeng Zhu

      Article first published online: 10 FEB 2015 | DOI: 10.1002/sec.1182

      Thumbnail image of graphical abstract

      The paper firstly proposed a new concept of one-time identity–password, which means identity and password can be used only once. Then, we present a provably secure and flexible one-time identity–password authenticated key agreement scheme based on biometrics. The core ideas of our scheme are features of security and efficiency in the mobile device and server's side and feature of user friendly for the user's side. Through comparing with recently related work, our scheme has satisfactory security, efficiency, and functionality.

    2. Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications

      Chris DelBello, Kazi Raihan and Tao Zhang

      Article first published online: 9 FEB 2015 | DOI: 10.1002/sec.1223

      Thumbnail image of graphical abstract

      We aim to measure the energy consumption of a cellphone as it transmits and encrypts data in a WBAN scenario. We evaluated the impact of various design parameters in an effort to discover the ideal WBAN operational protocols. In conclusion, we recommend an optimal file size strategy, data communication network, and encryption algorithm that minimize energy consumption and enhance WBAN operation.

    3. A security framework for developing service-oriented software architectures

      Vahid Rafe and Ramin Hosseinpouri

      Article first published online: 9 FEB 2015 | DOI: 10.1002/sec.1222

      Thumbnail image of graphical abstract

      This research provides a secure framework through which to develop software based on the service-oriented architecture. The proposed framework has been modeled using the SoaML profile, which has been introduced for modeling service-oriented environments. The framework's security aspects have been tested by the modeling and specification language Alloy, which is based on the first-order logic. Its accuracy has also been well-investigated.

    4. Privacy enhancement in anonymous network channels using multimodality injection

      Mehran Alidoost Nia, Reza Ebrahimi Atani and Antonio Ruiz-Martínez

      Article first published online: 9 FEB 2015 | DOI: 10.1002/sec.1219

      Thumbnail image of graphical abstract

      In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto-types. The random walk is responsible for generating network patterns, and the crypto-type performs the micro-encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.

SEARCH

SEARCH BY CITATION