Cyber Security, Crime, and Forensics of Wireless Networks and Applications.
Xiuzhen Cheng,Miroslaw Kutylowski,Kuai Xu,Haojin Zhu
DOI: https://doi.org/10.1002/sec.1646
IF: 1.968
2016-01-01
Security and Communication Networks
Abstract:The recent advances in cutting-edge electronic and computer technologies and wireless communications have paved the way for the proliferation of wireless networks, encompassing cellular, vehicular, body area, underwater, mobile ad hoc, and sensor networks. Wireless networks, allowing communications from any device, anywhere and anytime, bring a wide range of emerging and disruptive applications in manufacturing, healthcare, military, personal entertainment, safety, and rescue. However, the increasing sophistication and scale of cyber security and crimes in wireless networks have challenged traditional techniques of securing devices, applications, and traffic of wireless networks. Particularly, as the threats and vulnerabilities continue to grow in ubiquitous wireless networks, devices, and applications, it is crucial and imperative for researchers and practitioners of wireless networks to understand the entire cyber-attack and crime spectrum on wireless networks and applications and explore new technologies to mitigate and thwart these attacks, as well as to monitor, capture, and analyze security attacks via forensics analysis. The editorial committees have accepted 12 submissions in this special issue and all the papers have gone through a regular reviewing process. Among these accepted papers, four of them are related to Cloud Computing security. In the paper titled ‘PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data’, Li et al. propose a privacy and integrity-preserving multi-owner ranked-keyword search scheme named PIMRS, where an asymmetric scalar-product encryption function is adopted to preserve data privacy and to obtain more precise search results. In the paper titled ‘MEDAPs: Secure Multi-Entities Delegated Authentication Protocols for Mobile Cloud Computing’, three secure multi-entities delegated authentication protocols are proposed for mobile cloud computing. In these protocols, multiple mobile data owners can authorize a group-designated cloud server with signing rights. Irfan et al. present a framework based on security information and event management to efficiently collect evidence for crime investigation, which can benefit cloud forensics in their paper ‘A framework for cloud forensics evidence collection and analysis using security information and event management’. In the paper ‘Efficient Keyword Search over Encrypted Data in Multi-cloud Setting’, Miao et al. propose two keyword search schemes over encrypted data in multi-cloud setting scenarios. The proposed schemes can guarantee data privacy and reliability. Furthermore, the experimental results indicate that the proposed schemes are feasible and efficient in practical applications. Besides cloud computing security, this special issue also involves another 8 papers covering a wide variety of topics. In the paper titled ‘Secure the Internet, one home at a time’, Xu et al. propose a Bloom-filter based analytics framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. This work is the first one to characterize cyber threats towards home networks. In the paper titled ‘Secure multi-unit sealed first-price auction mechanisms’, Li et al. propose three secure, multi-unit, sealed-bid, and first-price auction schemes. An auctioneer is able to verify that the winners have paid the correct amounts in these three schemes. Theoretical analysis is provided to evaluate the security properties, computational complexity, and communication complexity of the auctions. Zhang et al. propose a data aggregation approach where an untrustful aggregator in mobile sensing can collect statistic data from mobile users in their paper titled ‘An Efficient Privacy Preserving Data Aggregation Approach for Mobile Sensing’. This approach preserves user privacy and can perform data integrity verification. Lai et al. propose a secure and privacy-preserving group setup framework, SPGS, for platoon-based VCPS in their paper titled ‘SPGS: A Secure and Privacy-Preserving Group Setup Framework for Platoon-Based Vehicular Cyber-Physical Systems’. Two authentication protocols are also provided accordingly. The security feature and efficiency of SPGS are verified by the thorough analysis. In the paper titled ‘Multi-proxy multi-signature binding positioning protocol’, Xue et al. propose a multi-proxy multi-signature binding positioning protocol, based on which a multi-proxy multi-signature binding positioning protocol is designed. The correctness and security features of the proposed protocols are analyzed. Qi et al. propose an effective steganography attacking method which is not limited by the types of the steganography method in their paper titled ‘Generic attack against robust steganography based on spring transform and geometrization’. The experiment results indicate that the peak signal-to-noise ratio of images can be above 32 dB Q4 while the stego data are destroyed. In the paper titled ‘Active jamming for multi-user information security improvement with the access statuses of users’, Xu et al. propose a novel physical layer scheme for improving multiple users' information security in the next-generation communication systems. The proposed scheme is linear without iteration and it is feasible for multi-user security enhancement. In the paper titled ‘Secured measurement fusion scheme against deceptive ECM attack in radar network’, in order to prevent electronic countermeasure attacks in radar networks, Yang et al. propose a new measurement fusion scheme, which shows better security performance when a DECM attack happens. The authors also perform simulations to demonstrate the superior of their novel scheme. On behalf of the editorial committee, we would like to thank all the authors for contributing their high quality papers to this special issue. We also want to thank all the reviewers for volunteering their time to review the papers and providing valuable comments, which help with improving the quality of the papers. We are also grateful to Prof. Hsiao-Hwa Chen and Prof. Hamid R. Sharif, who are the Editor-in-Chiefs of Security and Communication Networks, for providing us the opportunity to organize this special issue and for their support during the whole publication process.