4
Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press Guest Editorial Emerging Wireless and Mobile Technologies Fang-Yie Leu a , Ilsun You b and Feilong Tang c a Department of Computer Science, TungHai University, Tunghai, Taiwan b School of Information Science, Korean Bible University, Nowon-gu, Seoul, South Korea c Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China Recent advances in wireless and mobile technologies have led to a new paradigm of the high-tech society and people’s daily life. Accordingly, wireless and mobile technologies have been gaining tremendous attentions from researchers all over the world in recent years. However, a lot of new challenges, which go much beyond conventional network systems, still need to be solved for advanced applications. To further improve the quality of the modern communication, new techniques need to be continuously explored and developed. This special issue looks for signicant contributions and high quality research results on wireless and mobile technologies in theoretical and practical aspects, especially on QoS routing, distributed authentication mechanism, automatic security assessment, fast handover security mechanism, enhancing MISP with Fast Mobile IPv6 and applications in wireless mobile networks, as well as ad-hoc networks. This special issue grew out of selected best papers from the Fifth International Conference on Broad- band and Wireless Computing, Communication and Applications (BWCCA 2010), held in Fukuoka, Japan, and the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), held in Krakow, Poland. This event was an effort to take up the challenges and to bring together an international community in the area. The rst paper [1], “QoS Routing in Ad-hoc Networks Using GA and Multi-Objective Optimization” from Admir Barolli, Evjola Spaho, Leonard Barolli, Fatos Xhafa and Makoto Takizawa, proposes a QoS routing in ad-hoc networks. Distinguishing from existing works related to routing in ad-hoc networks, this paper designs a QoS-guaranteed solution based on Genetic Algorithms (GAs) and multi-objective optimization. In particular, the authors implemented a search space reduction algorithm, which reduces the search space for GAMAN (GA-based routing algorithm for Mobile Ad-hoc Networks) to nd a new route. In the second paper [2], Inshil Doh, Jiyoung Lim and Kijoon Chae propose a “Distributed Authen- tication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks”, in which bio-data is collected and delivered to the server system through mobile devices or gateways. This scheme adopts candidate devices, which act as the intermediary when the original device cannot function properly. In this way, bio-data of patients can be sensed and collected to monitor their body status uninterruptedly. The next paper [3] entitled “Design of a secure RFID authentication scheme preceding market trans- actions” by Chin-Ling Chen, proposes a RFID mutual authentication protocol for market application 1574-017X/11/$27.50 2011 – IOS Press and the authors. All rights reserved

Emerging Wireless and Mobile Technologiesdownloads.hindawi.com/journals/misy/2011/690987.pdf · Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Emerging Wireless and Mobile Technologiesdownloads.hindawi.com/journals/misy/2011/690987.pdf · Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press

Mobile Information Systems 7 (2011) 165–167 165DOI 10.3233/MIS-2011-0122IOS Press

Guest Editorial

Emerging Wireless and Mobile Technologies

Fang-Yie Leua, Ilsun Youb and Feilong Tangc

aDepartment of Computer Science, TungHai University, Tunghai, TaiwanbSchool of Information Science, Korean Bible University, Nowon-gu, Seoul, South KoreacDepartment of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

Recent advances in wireless and mobile technologies have led to a new paradigm of the high-techsociety and people’s daily life. Accordingly, wireless and mobile technologies have been gainingtremendous attentions from researchers all over the world in recent years. However, a lot of newchallenges, which go much beyond conventional network systems, still need to be solved for advancedapplications. To further improve the quality of the modern communication, new techniques need tobe continuously explored and developed. This special issue looks for significant contributions andhigh quality research results on wireless and mobile technologies in theoretical and practical aspects,especially on QoS routing, distributed authentication mechanism, automatic security assessment, fasthandover security mechanism, enhancing MISP with Fast Mobile IPv6 and applications in wirelessmobile networks, as well as ad-hoc networks.

This special issue grew out of selected best papers from the Fifth International Conference on Broad-band and Wireless Computing, Communication and Applications (BWCCA 2010), held in Fukuoka,Japan, and the 4th International Workshop on Intelligent, Mobile and Internet Services in UbiquitousComputing (IMIS 2010), held in Krakow, Poland. This event was an effort to take up the challenges andto bring together an international community in the area.

The first paper [1], “QoS Routing in Ad-hoc Networks Using GA and Multi-Objective Optimization”from Admir Barolli, Evjola Spaho, Leonard Barolli, Fatos Xhafa and Makoto Takizawa, proposes a QoSrouting in ad-hoc networks. Distinguishing from existing works related to routing in ad-hoc networks,this paper designs a QoS-guaranteed solution based on Genetic Algorithms (GAs) and multi-objectiveoptimization. In particular, the authors implemented a search space reduction algorithm, which reducesthe search space for GAMAN (GA-based routing algorithm for Mobile Ad-hoc Networks) to find a newroute.

In the second paper [2], Inshil Doh, Jiyoung Lim and Kijoon Chae propose a “Distributed Authen-tication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks”, inwhich bio-data is collected and delivered to the server system through mobile devices or gateways. Thisscheme adopts candidate devices, which act as the intermediary when the original device cannot functionproperly. In this way, bio-data of patients can be sensed and collected to monitor their body statusuninterruptedly.

The next paper [3] entitled “Design of a secure RFID authentication scheme preceding market trans-actions” by Chin-Ling Chen, proposes a RFID mutual authentication protocol for market application

1574-017X/11/$27.50 2011 – IOS Press and the authors. All rights reserved

Page 2: Emerging Wireless and Mobile Technologiesdownloads.hindawi.com/journals/misy/2011/690987.pdf · Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press

166 F.-Y. Leu et al. / Guest Editorial

systems. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biomet-rics, cryptology and a hash function mechanism to ensure the security of transmitted messages. Theproposed scheme can resist tag impersonation attack, replay attack, trace attack and forgery attack. Also,it maintains privacy protection and achieves mutual authentication, anonymity and forward secrecy.

In the fourth paper [4] entitled “Automatic Security Assessment for Next Generation Wireless MobileNetworks”, Francesco Palmieri, Ugo Fiore and Aniello Castiglione design an active third party authen-tication, authorization and security assessment strategy. In this strategy, the infrastructure automaticallydetects incoming devices and analyzes whether they are secure or not. If a device is found to be insecure,it is immediately taken out from the network and denied further access until its vulnerabilities have beenfixed. As the fundamental component of the security assessment strategy, the security assessmentmoduletakes advantage from a reliable knowledge base containing semantically-rich information about mobilenodes. Consequently, this scheme supports for the secure protection of wireless and mobile networksthrough automatic and real-time security/risk evaluation to some extend.

The fifth paper [5] with the title “A Handover Security Mechanism Employing Diffie-Hellman KeyExchange Approach for IEEE802.16E Wireless Networks” from Yi-Fu Cioua, Fang-Yie Leua, Yi-Li Huanga and Kangbin Yim, proposes a handover authentication mechanism, called handover keymanagement and authentication scheme (HaKMA) to protect sensitive information delivered throughwireless channels. The HaKMA provides a fast and secure key generation process for handover.The three-layer architecture in the HaKMA simplifies key generation flows compared to related work.Moreover, the authors also design two levels of handover mechanisms to minimize service disruptiontime (SDT), guaranteeing secure bidirectional connections between a mobile station and a base station.The analyses in this paper demonstrate that the HaKMA can effectively provide user authentication, andbalance data security and system performance during handover with a low cost.

In the last paper [6] “Enhancing MISP with Fast Mobile IPv6 Security”, Ilsun You, Jong-HyoukLee,Yoshiaki Hori and Kouichi Sakurai proposes a secure fast handover scheme that combines theadvantages of MISP and Fast Mobile IPv6 (FMIPv6). The MISP, a combination of MIS and MISAUTHprotocols developed by Mobile Broadband Association, provides secure and fast connection for wirelessaccess networks but suffers from denial-of-service attacks due to its weak session key. The proposedscheme in this paper improves the MISP through making full use of the fast handover approach ofFMIPv6 and minimizing an involvement of the authentication server. The formal analyses in this papershow that the proposed scheme is robust against session key, off-line dictionary, DoS attacks whilereducing handover latency compared with the existing schemes.

We would like to thank the authors of above papers published in this special issue, and regret thatmore papers could not be included. We appreciate all reviewers for their time and effort with reviewingassigned papers on time and providing invaluable comments and suggestions for authors for improvingtheir papers. We also want to thank Professor David Taniar, Editors-in-Chief of Mobile InformationSystem. His generous help and support have made this special issue a reality.

Hopefully, this special issue will bring forth advancements in science and technology as well asimprove practices and applications of wireless and mobile technologies.

References

[1] A. Barolli, E. Spaho, L. Barolli, F. Xhafa and M. Takizawa, QoS Routing in Ad-hoc Networks Using GA and Multi-Objective Optimization, Mobile Information System (MIS), 2011.

[2] I. Doh, J. Lim and K. Chae, Distributed Authentication Mechanism for Secure Channel Establishment in UbiquitousMedical Sensor Networks, Mobile Information System (MIS), 2011.

Page 3: Emerging Wireless and Mobile Technologiesdownloads.hindawi.com/journals/misy/2011/690987.pdf · Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press

F.-Y. Leu et al. / Guest Editorial 167

[3] C.-L. Chen, Design of a secure RFID authentication scheme preceding market transactions, Mobile Information System(MIS), 2011.

[4] F. Palmieri, U. Fiore and A. Castiglione, Automatic Security Assessment for Next Generation Wireless Mobile Networks,Mobile Information System (MIS), 2011.

[5] Y.-F. Cioua, F.-Y. Leua, Y.-L. Huanga and K. Yim, A Handover Security Mechanism Employing Diffie-Hellman KeyExchange Approach for IEEE802.16e Wireless Networks, Mobile Information System (MIS), 2011.

[6] I. You, J.-H. Lee, Y. Hori and K. Sakurai, Enhancing MISP with Fast Mobile IPv6 Security, Mobile Information System(MIS), 2011.

Page 4: Emerging Wireless and Mobile Technologiesdownloads.hindawi.com/journals/misy/2011/690987.pdf · Mobile Information Systems 7 (2011) 165–167 165 DOI 10.3233/MIS-2011-0122 IOS Press

Submit your manuscripts athttp://www.hindawi.com

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Applied Computational Intelligence and Soft Computing

 Advances in 

Artificial Intelligence

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014