Avoid common mistakes on your manuscript.
1 Introduction
The advances in wireless communication technologies toward 4G networks and the wide use of mobile devices have enabled users to communicate with each other and receive a wide range of mobile wireless services through various types of access networks and systems everywhere and anytime. However, the always-connected mobile device usage model brings to the foreground new security and privacy issues for both the end-user and network/service provider. In this respect, secure, reliable, and privacy-preserving communications combined with constant network availability are essential factors for the adoption of any service or application that utilize wireless technologies. Also, the tight-coupling of these wireless network domains to the Internet makes them more susceptible to attacks. New security challenges emerge constantly due to the open nature of the wireless medium, the dynamic network topology, the lack of common security/privacy policy used by network operators, the resource constraints of the mobile devices and, in some cases, the lack of a pre-deployed infrastructure.
The objective of this special issue is to foster state-of-the-art contributions in the area of security, privacy, and its applications for future mobile communication networks. The special issue is composed of 5 rigorously peer-reviewed papers covering topics such as modeling and analysis of QoS and security tradeoff in mobile platforms, covert communication channels on Android platforms and reputation management for social participatory systems, amongst others. It is expected that the special issue will stimulate further related research and technology improvements in this significant research field.
2 Papers in this special issue
The first manuscript, “A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms”, co-authored by Ana Nieto and Javier Lopez, is based on the observation that mobile platforms are multimedia devices that provide different types of traffic and present different needs regarding security and privacy. Nevertheless, security and QoS requirements are often conflicting with each other. So, one of the main challenges lies in the identification of the reasons why security and QoS mechanisms are so related to each other. Compelled by this fact, authors present a Parametric Relationship Model (PRM) to identify the security and QoS dependencies, and to elaborate on the security and QoS tradeoff. More specifically, they perform an analysis that focuses on the mobile platform environment and also considers subjective parameters such as user’s experience, which is crucial for increasing the usability of new solutions in the Future Internet.
In the next contribution, entitled “Quantifying and Classifying Covert Communication on Android”, by Raquel Hill, Michael Hansen, and Veer Singh, authors are motivated by the fact that the exploitation of known covert channels allows modern Android applications to by-pass the built-in permission system and share data in a potentially untraceable manner. However, such hidden channels have sufficient bandwidth to transmit sensitive information (such as GPS locations) in real-time to collaborating applications with Internet access. Thus, authors elaborate on previous works involving an application layer covert communications detector. They measure the stability of the volume and vibration channels on the Android emulator, HTC G1, and Motorola Droid. Moreover, they quantify the effect their detector has on channel capacities for stealthy malicious applications using a theoretical model. A last contribution of the paper is the introduction of a new classification of covert communication for the Android platform.
The third paper, by Haleh Amintoosi and Salil S. Kanhere, entitled “A Reputation Framework for Social Participatory Sensing Systems”, highlights the fact that the success of social participatory sensing is heavily based on the trustworthiness of contributions provided by participants. In this direction, authors propose an application-agnostic reputation framework for social participatory sensing systems. The proposed framework considers both the quality of contribution and the trustworthiness level of participants within the social network. Moreover, these two aspects are further combined via a fuzzy inference system to arrive at a final trust rating for a contribution. For each participant, a reputation score is calculated as a resultant of the trust ratings assigned to them. The authors make use of the PageRank algorithm as the building block for their reputation module and present extensive simulations demonstrating the efficacy of their framework in achieving high overall trust and assigning accurate reputation scores.
The fourth contribution, “A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks”, co-authored by Anderson Morais and Ana Cavalli, proposes a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks in WMNs at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculates related Misbehaving Metrics; and iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results suggest that the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption.
In the fifth paper, “Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications”, by Yao-Hsin Chou, Guo-Jyun Zeng, Fang-Jhu Lin, Chi-Yuan Chen and Han-Chieh Chao, a communication protocol called Controlled Bidirectional Quantum Secret Direct Communication (CBQSDC) for mobile networks is proposed. This protocol is based on n-particle GHZ states (Greenberger-Horne-Zeilinger-states) which are transformed to Einstein-Podolsky-Rosen (EPR) pairs by entanglement swapping. GHZ states are used to carry both sides’ messages and entanglement swapping could reduce the number of transmissions, thus decreasing the probability of eavesdropping. This means that in case an eavesdropper tries to steal dealer’s messages, the lawful participants will perceive it and abort their transmissions.
Acknowledgments
The guest editors would like to express their gratitude to the Editor in Chief Prof. Imrich Chlamtac for giving the opportunity to edit this special issue on Developments in Security and Privacy-preserving mechanisms for Future Mobile Communication Networks, and Dr. Sara Fruner for making this issue published. Also, we wish to thank all the authors for submitting their work as well as the tireless reviewers who have constructively evaluated the papers within the stipulated time. Finally, we sincerely hope the reader will share our view and find this special issue very useful.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kambourakis, G., Martinez, G. & Gomez Marmol, F. Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks. Mobile Netw Appl 19, 61–63 (2014). https://doi.org/10.1007/s11036-013-0487-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-013-0487-2