Logo Goletty

Guest Editorial
Journal Title Journal of Networks
Journal Abbreviation jnw
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (319 kb)
   
Title Guest Editorial
Authors Lu, Keh-Ming; Wang, Shiuh-Jeng; Tsai, Yuh-Ren; Wen, Jyh-Horng; Chang, Chin-Chen; Chen, Yaw-Chung; Chou, Yung-Chen; Yuan, Shyan-Ming; Chen, Hsing-Chung; Ko, Franz I.S.
Abstract Networked Computing has been widely applied in many domains, which have been continuing to be an ever expanding area of importance in recent years. Different innovative technologies and services have contributed to several research fields of computer science. The special issue collects several excellent research results related to Networked Computing. All of papers are selected from the Fifth International Joint Conference on INC, IMS and IDC (NCM 2009) held on August 25-27, 2009, Seoul, Republic of Korea. NCM stands for International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies. The NCM conference is an annual international conference related to Theory, Development, Applications, Experiences, and Evaluation of Networked/Ubiquitous Computing and Advanced Information Management, Digital Content and Multimedia Technologies. The acceptance rate of the Proceedings of 5th International Joint Conference on INC, IMS and IDC (NCM 2009) is 29.6%. Totally 399 contributions accepted for publishing in the proceedings from 1348 submissions. There have 42 papers recommend by the session chairs or researchers. Finally, only fifteen contributions are selected as the contribution of the Special Issue of JNW. During the conference, over two hundred researchers came from 33 countries to attend NCM 2009. The paper entitled “The Analysis of a Self-stabilizing MAC Protocol for Multi-channel Ad Hoc Networks” presents an efficient multi-channel MAC protocol, named MAXM, for ad hoc networks. The idea of MAXM is to maximize utilization of bandwidth by adopting a distributed self-stabilizing maximal matching-transmission algorithm. Then the paper, entitled “A Model for Managing and Discovering Services Based on Dynamic Quality of Services” presents a model for managing and discovering services based on dynamic quality of services. The authors completely discuss the works related to the proposed model including Quality Measurement Center, QoS Spy, and Service Quality Calculator. Then the paper entitled “A Cluster-Based Collaboration Framework for SIP Conference Applications,” presents a cluster-based framework to provide a SIP-based multimedia conferencing service. In their framework, the cluster members are self-organizing and self-maintaining to share the resources of mixers within the cluster. Their proposed framework can not only be reducing the system loading of conference servers, but can also be reducing the cost of infrastructure. Furthermore, the paper entitled “Adaptive and Energy Efficient Clustering Algorithm for Event-Driven Application in Wireless Sensor Networks (AEEC),” describes a modified protocol of Low Energy Adaptive Clustering Hierarchy (LEACH), which is aimed at prolonging the lifetime of a sensor network by balancing energy usage of the nodes. AEEC makes the nodes with more residual energy have more chances to be selected as cluster head. Also, the authors use elector nodes which take the responsibility of collecting energy information of the nearest sensor nodes and selecting the cluster head, and compare the performance of the AEEC algorithm with the LEACH protocol using simulations. The paper entitled “A Generalized Temporal and Spatial Role-Based Access Control Model,” discusses securing access control, which was applied to mobile service applications with temporal and spatial controlling, requires constructing innovative definitions. The authors propose a generalized Temporal and Spatial RBAC (TSRBAC) model. Their proposed model is used to constrain the permissions of objects, user positions, and geographically bounded roles. Furthermore, the authors also present temporal and spatial relations of Temporal and Spatial Static Separation of Duties (TSSSD), Temporal and Spatial Dynamic Separation of Duties (TSDSD) constraints in the TSRBAC model. The sixth paper, titled “An ECC-Based Blind Signature Scheme,” investigates the digital signatures which are used in private communication under an agreement among all related networked computing parties. All messages are capable of being encrypted and decrypted so as to ensure the integrity and non-repudiation of them. Their scheme is compared to other blind signature schemes, which are based on either of the two other public-key cryptosystems. Therefore, there are less computational overheads in their scheme. The proposed scheme can be efficiently applied to electronic cash payment systems or anonymous voting systems. The seventh paper, titled “A FMIPv6 Based Handover Scheme for Real-Time Applications in Mobile WiMAX,” proposes a novel cross-layer IPv6 fast handover scheme which features integrated layer 2/layer 3 messages and fast network re-entry methods. Compared with the fast mobile IPv6 over 802.16e network scheme in predictive mode, the proposed scheme can reduce the service disruption time by more than 90% and 85% for downlink and uplink, respectively so that the quality of service (QoS) for real-time applications can be improved significantly. The eighth paper, titled “A Novel User Authentication Scheme Based on QR-Code,” investigates secure communications and share system resources over an insecure public network channel based on QR-code application. The proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. The ninth paper, titled “A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks,” presents a secure destination-sequenced distance-vector (SDSDV) routing protocol for mobile ad hoc wireless networks. With proper use of the elements of the hash chains, the sequence number and the metric values on a route can be protected from being arbitrarily tampered. In comparison with the secure efficient ad hoc distance vector (SEAD) protocol previously proposed in the literature provides only a non-decreasing protection on the metrics, SDSDV can provide complete protection. The tenth paper, titled “Performance of an Energy Efficient Routing Scheme for Cluster-based Wireless Sensor Networks,” proposes a novel scheme, which can reduce the energy dissipation of transmitting sensing data at each sensor. The authors proposed an energy efficient energy efficient grid clustering (EEGC) scheme, for cluster-based Wireless Sensor Networks (WSNs), to perform uniformly clustering. Simulation results show that, it can prolong the lifetime of EEGC scheme to 1.5 times of LEACH for both LR=50% and 70%. Moreover, the total data transmission comparison for EEGC is more 60% than Low-Energy Adaptive Clustering Hierarchy (LEACH) schemes. The eleventh paper, titled “Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks,” proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual Access Points (APs). In this paper, the IEEE 802.11 WLAN simulation mode based on the Network Simulator 2 (NS-2) is used to evaluate the performance including the authentication session time, message transaction load and processing load for the proposed authentication schemes and the conventional EAP-SIM authentication schemes. The twelfth paper, titled “Efficient Cluster Head Selection Methods for Wireless Sensor Networks,” classifies the lifetime into different types and give the corresponding CH selection method to achieve the life-time extension objective. Simulation results demonstrate our study can enlarge the life-time for different requests of the sensor networks. The thirteenth paper, “Applications for IP Video Surveillance over the ITRI MTWAL,” introduces three IP video surveillance applications available at the ITRI (Industrial Technology Research Institute) MTWAL (M-Taiwan WiMAX Application Lab). In addition to the three video surveillance applications, WiMAX wireless broadband technology also can be applied in other security systems, home care in remote areas, handheld entertainment sharing, video conference, and so on. At present, ITRI in Taiwan establishes world-first WiMAX application Lab-MTWAL, which is approved by WiMAX Forum, and supporting an open space for world-wide WiMAX application developers and equipment testers. The fourteenth paper, titled “Performance of Adaptive Hysteresis Vertical Handoff Scheme for Heterogeneous Mobile Communication Networks,” investigates the performance of adaptive vertical handoff schemes for overlay WCDMA and wireless LAN (WLAN) heterogeneous networks. The final manuscript “Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6,” addresses the triangle routing problem, two different route optimization schemes proposed that exclude the inefficient routing paths by creating the shortest routing path. In this paper, the authors propose the Correspondent Information Route Optimization scheme solves the problem by inefficient signaling cost of Dutta’s route optimization. We sincerely hope that this Special Issue, which deals with innovative technologies of networked computing on Ad Hoc Networks, Traditional Networks, WiMAX, Wireless Sensor Networks, Wireless Access Database Systems and GSM-WLAN Heterogeneous Networks, will contribute to enhancing knowledge in the research areas of Networked Computing. Finally, the guest editors wish to acknowledge the great efforts of many people who helped with this Special Issue. We would like to thank all the authors for their interesting contributions and the quality of their work, as well as all the Program Committee members and Session Chairs of NCM2009, who also contributed significantly to improve the quality of this special issue. We also thank Mrs. George J. Sun, the Executive Editor-in-Chief of JNW as well as Prof. Franz I.S. KO, the General Chair of NCM2009, for their continued encouragement, guidance and support in the preparation of this Special Issue.
Publisher ACADEMY PUBLISHER
Date 2010-08-01
Source Journal of Networks Vol 5, No 8 (2010): Special Issue: Recent Advances in Networked Computing
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024