Logo Goletty

Guest Editorial
Journal Title Journal of Networks
Journal Abbreviation jnw
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (261 kb)
   
Title Guest Editorial
Authors Obaidat, Mohammad S.; Filipe, Joaquim
Abstract Welcome to this special issue of Journal of Networks (JNW) on “Performance Evaluation of Communication Networks.” The papers included in this special issue are based mainly on selected extended versions of best papers accepted in the 2008 International Conference on E-Business and Telecommunication, ICETE 2008. This means that these accepted papers have undergone a thorough and a critical review process by experts in the field. Xiong and Thuente proposed novel schemes for secure dynamic localization in sensor networks. These proposed schemes can tolerate up to 50% of beacon nodes being malicious, and they have linear computation time with respect to the number of reference nodes. The security analysis has shown that the schemes are applicable and resilient to attacks from adversaries. The authors further conducted simulations to analyze and compare the performance of these schemes, and to find out when each should be used. Lee, Narayan and Parampalli presented a provably secure efficient certificateless encryption scheme. The security of the method has been proven against adaptive-chosen ciphertext-attack in the random oracle model assuming k-BDHI holds. Moreover, the authors have shown that the proposed scheme is resistant to the malicious KGC attack. It was shown that the scheme is a god choice for key establishment in OLSR based MANET when coupled with Resurrecting Duckling idea. Pozo, Ceballos, and Gasca presented an analysis of the consistency diagnosis problem in firewall ACLs. Based on this analysis, the authors suggested to split the process in several parts that can be solved sequentially: inconsistency detection and isolation, inconsistent rules identification, and inconsistency characterization. The algorithms are considered the first ones which can solve the detection, isolation, and identification problems in quadratic time complexity, giving complete but not necessarily minimal results. In addition, the papers gave a theoretical complexity analysis as well as experimental results with real ACLs.Kuzuu, Hirano, Mase and Watanabe proposed the way to set up a roaming user profile without depending on Windows domain composition when building a shared terminal system for smart card users. This proposal aims at using a LDAP server as a data base of user information, and enabling each terminal user to construct his own work environment. In order to reach this aim, the authors related the user profile with the user ID extracted from smart card, and stored that profile on shared data storage. Moreover, they built a shared file system besides the data storage, and placed the user’s work space on that file system. In the actual proof experiments, applying the above system to the terminal on network, they confirmed that the user work environment was constructed on the shared terminal according to the smart card user.Finally, Vergara, Vázquez, Martin, Dubus and Lepareux proposed an approach to react to network attacks in which a set of alerts are used to automatically generate new security policies. For this, an ontology-based approach has been used, in which the alert and the policy information models can be combined to aid in the instantiation of the policies. The use of OWL and SWRL provides several advantages, including the availability of generic tools for parsing and reasoning. The nature of OWL as a Semantic Web component allows merging distributed ontologies. This approach has been validated in a VoIP use case scenario, defining as instances of the policy ontology the set of elements that are going to be used for the policy instantiation.We would like to thank all the authors and reviewers for their contributions and devoted efforts. A special thank goes the technical program committee of ICETE 2008 for their valuable time and superior work. Thanks are also due to the editors and editorial assistants for their fine support. I hope that the work reported here will be useful to your resercah endeavors.
Publisher ACADEMY PUBLISHER
Date 2009-10-01
Source Journal of Networks Vol 4, No 8 (2009): Special Issue: Performance Evaluation of Communication Networks
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024