submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 2   Issue: 2

Published In:   April 2013

Publication Frequency: Quarterly

Articles in 2020

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Welcome to the special issue of the Journal of Cyber Security and Mobility. This issue brings together cutting edge research in mobility and enterprise security to celebrate the revolutionary “Mobility Age”. Millions of smart devices (smartphones, tablets, Internet of Things, networked vehicles, sensors and countless other low profile, low powered entities) interact with the virtual world to fetch content, perform computation and report the parameters of the physical world. In the future, this suite of devices and applications is set to grow and the ideas will be limited only by imagination.

The Mobility Age comes with its own problems and challenges. First, there are concerns for self-organization of small devices in emerging networks such as vehicular ad-hoc networks (VANET), Internet of Things (IoT) and mobile ad-hoc networks (MANET). The size and dynamics of these networks makes centralized control, communication and computationally extensive, which is why distributed solutions are explored. Second, power and network contention needs to be managed to enable longer network lifetime and efficient operation. Third, traditional networking principles that are based on network addresses and locations, need to be redesigned to fit the dynamics of mobile networking paradigm. Finally, mobility also challenges the security of fixed enterprise assets by launching distributed attacks from fleeting sources that can be hard to locate. Despite the challenges, the mobility age brings with itself the opportunity to implement new ideas that can often be expensive if traditional fixed infrastructure is used.

Since this issue is “celebrating” the Mobility Age, we will start with the positives. The first paper in this issue is by Amitabha Mishra et al., who present a refreshing idea that has the promise of bringing cloud computing “across the digital divide, to developing nations”. The authors show how millions of mobile phones can be federated to run micro computations, which when put together, can match the capacity of expensive and high profile data centers. The second paper by Tan Yan et al. presents a similarly revolutionary concept in which interest based information can be relayed to networked vehicles in a VANET, without a priori knowledge of their network address or identity. Novel networking principles are used to achieve the objective with low control messaging overhead and latency while ensuring high data delivery ratio. Next we dive into important issues in the mobility age, the first being the question of self-organization to improve the network lifetime. The third paper by Janusz Kusyk et al. shows how autonomous robots can use a bio inspired game to achieve just that in a mobile ad-hoc network (MANET). The objective is to achieve a uniformly distributed topology so that nodes can operate at low power levels while maintaining connectivity with neighbors and hence achieve longer network lifetime. The second important issue in the mobility age is of security. With millions of smart devices in the network, security becomes an important concern not only for the devices themselves, but also for fixed assets that are now vulnerable to attacks by millions of compromised and malicious smart phones and other such networked systems. The fourth paper by Wang et al. addresses the problem of detecting sophisticated targeted attacks on enterprise systems. The authors present a technique in which a smart attacker is deceived into honey assets, and eventually detected through multiple layers of deception.

We would like to thank the reviewers, editorial board members, advisory board members, steering committee members and the staff of River Publishers for their efforts in preparing the publication of this special issue of the journal. We hope our readers will continue to find the forthcoming issues of this journal useful in enriching their knowledge of cyber security and mobility.

Shweta Jain
York College CUNY, USA

River Publishers: Journal of Cyber Security and Mobility