“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial

Mobile Networks and Applications, Oct 2013

Joanna Kołodziej, Martin Gilje Jaatun, Samee Ullah Khan, Mario Koeppen

A PDF file should load here. If you do not see its contents the file may be temporarily unavailable at the journal website or you do not have a PDF plug-in installed and enabled in your browser.

Alternatively, you can download the file locally and open with any standalone PDF reader:

https://link.springer.com/content/pdf/10.1007%2Fs11036-013-0474-7.pdf

“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial

Joanna Koodziej 0 1 3 Martin Gilje Jaatun 0 1 3 Samee Ullah Khan 0 1 3 Mario Koeppen 0 1 3 0 S. U. Khan Electrical & Computer Engineering Department, North Dakota State University , 1411 Centennial Blvd, Fargo, ND 58102, USA 1 M. G. Jaatun Department of Software Engineering , Safety and Security, SINTEF ICT, 7465 Trondheim, Norway 2 ) Institute of Computer Science, Cracow University of Technology , Warszawska 24, 31-155 Cracow, Poland 3 M. Koeppen Network Design and Research Center, Kyushu Institute of Technology , 680-4, Kawazu, Iizuka, Fukuoka 820-8502, Japan We are witnessing a paradigm shift in the way mobile devices are being used and operated. What was once a voice network is now predominantly a data network. As a consequence, end-users are now using mobile systems for applications that fall under the data intensive paradigm, such as Skyline queries, streaming information relays, and crowd sourced disaster management. However, this paradigm shift has opened new research directions, such as: (a) Security, as the system now has numerous distributed entry points and the behavior of a malicious entity does not really correlate with any previously known phenomenon (e.g., Internet virus attacks, DOS attacks, etc.). (b) Data interoperability that must cater to the fundamental issue that mobile devices are required to work seamlessly with Internet data, thus requiring revision of protocols, data exchange frameworks to improve data sharing among mobile devices - and with the Internet. (c) Sustainable software development that entails the development of software models for mobile devices that have a longer life-cycle and require fewer updates. This also effectively translates into an economically viable mobile system. Privacy and security aspects need to be covered at all layers of mobile networks, from mobile users devices, to privacy-respecting credentials and mobile identity management. All of the above mentioned research domains are complex on their own, which makes it a very attractive research area for academia and industry. The eventual goal is to make the mobile systems seamless integrate with Inter and Intranet devices without a measurable performance degradation. Is is arguably required to investigate novel methods and techniques to enable secure access to data, network nodes and services, flexible communication, efficient scheduling, self-adaptation, decentralization, and self-organization. This special issue herewith presents six research papers with novel concepts in the analysis, implementation, and evaluation of the next generation of intelligent scalable techniques for data intensive processing and security related problems in modern mobile environments. The first three papers span the fields of key management, power modeling and mobility modeling, but all share a relevance to security aspects. Cryptographic and key management systems in mobile networks must be computationally low-cost because of the limitations of computational and data storage capacities and battery life of most of the network nodes. Wu and Lin present non-interactive authenticated key agreement (NIAKA) protocols based on the idea of bilinear pairingbased cryptosystem model and Elliptic Curve Encryption (ECE) scheme. The ECE allows the encryption of message multiple times with different keys that can be decrypted in a single run with a single key. During read operation, the owner of the file sends the credential to the network resource and service provider and requesting entity. Theoretical analysis of semantic security of the proposed methodology is provided through a verification of the Decisional Bilinear Diffie-Hellman (DBDH) assumption. The authors prove that the proposed NI-AKA scheme is computationally equivalent to the DBDH. The problem of optimal energy utilization in mobile networks is not limited to the energy-aware cryptographic schemes and is widely discussed over the last few years, especially in the context of green mobile clouds and Big Data systems. Nacci et al. present the MPower: power-sensing and adaptive power modeling platform for Android mobile devices. Their idea is based on using the mobile device clients for gathering a powerconsumption data from real-world users and devices. The functionality of the platform is justified in a comprehensive empirical analysis of 278 mobile devices and 22.5 million data records collected during one year. Their approach facilitates the building of device-centric power models that will allow users to craft better power-management strategies. Design of adaptive and computationally lightweight techniques for modelling the mobility of devices in wide area networks is one of the critical issues which may have a significant impact on the performance characteristics of the whole system. Niewiadomska-Szynkiewicz et al. address the problem of calculation of mobility trajectories of devices in fully connected cooperative ad-hoc networks. The presented model is based on (...truncated)


This is a preview of a remote PDF: https://link.springer.com/content/pdf/10.1007%2Fs11036-013-0474-7.pdf

Joanna Kołodziej, Martin Gilje Jaatun, Samee Ullah Khan, Mario Koeppen. “Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial, Mobile Networks and Applications, 2013, pp. 591-593, Volume 18, Issue 5, DOI: 10.1007/s11036-013-0474-7