submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 1   Issue: 1

Published In:   January 2012

Publication Frequency: Quarterly

Articles in 2020

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Lin Cai and Roberto Rojas-Cessa

Networking Research Laboratory, ECE Department, New Jersey Institute of Technology, University Heights, Newark, NJ 07102, USA;

Abstract: [+]    |    Download File [ 297KB ]

Abstract: Peer-to-peer (P2P) networking enables users with similar interests to exchange, contribute, or obtain files. This network model has been proven popular to exchange music, pictures, or software applications. These files are saved, and most likely executed, at the downloading host. At the expense of this mechanism, worms, viruses, and malware find an open front door to the downloading host and gives them a convenient environment for successful proliferation throughout the network. Although virus detection software is currently available, this countermeasure works in a reactive fashion, and in most times, in an isolated manner. In this paper, we consider a trust management scheme to contain the proliferation of viruses in P2P networks. Specifically, we propose a cooperative and distributed trust management scheme based on a two-layer approach to bound the proliferation of viruses. The new scheme is called double-layer dynamic trust (DDT) management scheme. Our results show that the proposed scheme bounds the proliferation of malware. With the proposed scheme, the number of infected hosts and the proliferation rate are limited to small values. In addition, we show that network activity is not discouraged by using the proposed scheme.

Keywords: malware, peer-to-peer networks, P2P, trust management, virus proliferation

Security Implications and Considerations for Femtocells

Jing Chen and Marcus Wong

Huawei Technologies, 400 Crossings Blvd, 2FL Bridgewater, NJ 08807, USA

Abstract: [+]    |    Download File [ 189KB ]

Abstract: A Femto system is able to provide new services with higher data rate at relatively lower cost than traditional cellular system. Operators have already indicated their interest in this area and the number of deployments is ever increasing. Security is a critical part of Femto in all aspects of the operation of Femto services. In this paper, we analyze the security of Femto based on 3GPP system architecture. In addition, we will look into the details of other security aspects of Femto system, including security requirement and security mechanism.

Keywords: 3GPP, cellular, femtocells, security.

E-Health: Chances and Challenges of Distributed, Service oriented Architectures

C. Thuemmler1, L. Fan2, W. Buchanan2, O. Lo2, E. Ekonomou1, and S. Khedim2

1Edinburgh NapierUniversity, Centre for Applied E-Health, Sighthill Campus, Edinburgh, UK
2Edinburgh Napier University, Centre for Distributed Computing and Security, Merchiston Campus, Edinburgh, UK

Abstract: [+]    |    Download File [ 567KB ]

Abstract: Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud computing will play a major role in order to help to achieve the necessary level of virtualization and service aggregation. There are, however, technological challenges in terms of security, trust, user friendliness and deployment of innovative E-Health strategies.

Keywords: E-Health, SOA, distributed system, DACAR PaaS.

On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks

Cristina Comaniciu

Stevens Institute of Technologies, Castle Point on Hudson, Hoboken New Jersey, 07030-5991, USA

Abstract: [+]    |    Download File [ 103KB ]

Abstract: In this paper we discuss the inherent security-energy tradeoffs that exist in wireless ad hoc networks. We propose a closed form cost computation approximation formula to determine the energy cost of monitoring for an intrusion detection algorithm based on its computational complexity and data size. Based on energy and security costs, we formulate a game theoretic distributed monitoring algorithm that enforces cooperative behavior for individual nodes by means of reward functions. Various energy-security tradeoffs operating points for the network intrusion detection can be achieved by tuning the rewards parameter.

Keywords: energy security tradeoff, ad hoc networks, intrusion detection, game theory.

Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach

Pranav M. Pawar1, Rasmus H. Nielsen2, Neeli R. Prasad2, Shingo Ohmori3 and Ramjee Prasad1

1Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
2Princeton, USA
3Yokosuka, Japan

Abstract: [+]    |    Download File [ 287KB ]

Abstract: Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulnerability to security attacks/threats. The performance and behaviour of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behaviour of the attacks.
This paper addresses the behavioural modelling of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays. The behavioural modelling of attacks will be beneficial for designing efficient and secureMAClayer protocols. The security attacks are modelled using a sequential diagram approach of Unified Modelling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed.

Keywords: wireless sensor networks (WSNs), media access control (MAC), unified modelling language (UML), security and attacks.

Physical Encoding in Optical Layer Security

Zhenxing Wang, Mable P. Fok and Paul R. Prucnal

Princeton University, Princeton, NJ, 08544, USA

Abstract: [+]    |    Download File [ 5704KB ]

Abstract: Data security at the physical layer of optical networks, or optical layer security, has received considerable research attention due to the rapid growth of optical network capacity [1]. Among various optical layer approaches, optical codedivision multiple access (OCDMA) systems are considered to be promising because of the physical encoding and decoding processes comprising these systems. Generally, physical encoding is an important concept in the field of optical layer security, which implements encoding to the transmitted optical signals, and protects the transmitted data from attack. In this paper, we provide an overview of various OCDMA systems, and discuss the impact of different physical encoding methods on OCDMA systems, in terms of security assurance. Furthermore, we introduce the application of physical encoding to optical steganography and optical transmission with wireless CDMA for security improvement.

Keywords: optical networks, physical encoding, physical layer security, optical layer security, OCDMA.

Evolution of Mobility in Future Wireless Networks

Ajay Rajkumar

Alcatel-Lucent, 600 Mountain Avenue, Murray Hill, NJ, USA

Abstract: [+]    |    Download File [ 430KB ]

Abstract: With an ever increasing appetite for data over wireless networks, one is forced to think where the additional capacity in the wireless networks come from to carry the traffic? Some would argue that additional spectrum needs to be made available or a substantial increase in spectral efficiency has to come by. However, notwithstanding the above, an additional area that has important implications is to evolve seamless and non-seamless session mobility across disparate access technologies such as WiFi to offload some of the traffic to these alternate networks. Similarly, selective handover of specific flows across smaller cells such as Femto and Pico cells of the same access technology will have an impact on the overall capacity of the network. This not only will improve the capacity of these networks but may also enhance the quality of experience for users.

Keywords: 3GPP, LTE, data offload,WiFi,WLAN,femto, pico, small cells, smart phones, local breakout, multi access connectivity, IP flow mobility.

Non-Interactive Detection of Malicious Vehicular Network Data

G. Di Crescenzo, Y. Ling, T. Zhang and S. Pietrowicz

Telcordia Technologies, Piscataway, NJ, USA

Abstract: [+]    |    Download File [ 977KB ]

Abstract: Vehicular networks might be deployed in the near future, and as a consequence a potentially large number of exciting applications are expected to enhance the human driving experience. Unless the security of such applications is guaranteed, however, such enhancements may be accompanied by similarly powerful and yet undesired consequences in malicious behaviour. While current research in the vehicular networks security area has recognized conventional security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. We study the problem of modeling traffic-related attacks in these networks and present automatic and efficient (i.e., no human intervention and no expensive cryptographic protocols) yet general solutions to prevent or tolerate a number of these attacks. Specifically, we propose techniques based on the capability of implementing simple and non-interactive voting algorithms that use the mere participations of vehicles to the network and, while doing that, attempt to maximize use of already exchanged and relevant network data. We validate our techniques by providing analysis results based on both simulated and real-life mobility data in typical urban environments. Previous work required interactive protocols to implement voting or consensus techniques, and implicitly left open the question we solve in this paper.

Keywords: vehicular networks, security, malicious data detection, voting protocols

River Publishers: Journal of Cyber Security and Mobility