“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial
Joanna Koodziej
0
1
3
Martin Gilje Jaatun
0
1
3
Samee Ullah Khan
0
1
3
Mario Koeppen
0
1
3
0
S. U. Khan Electrical & Computer Engineering Department, North Dakota State University
, 1411 Centennial Blvd, Fargo,
ND 58102, USA
1
M. G. Jaatun Department of Software Engineering
, Safety and Security, SINTEF ICT, 7465 Trondheim,
Norway
2
) Institute of Computer Science, Cracow University of Technology
, Warszawska 24, 31-155 Cracow,
Poland
3
M. Koeppen Network Design and Research Center, Kyushu Institute of Technology
, 680-4, Kawazu, Iizuka, Fukuoka 820-8502,
Japan
We are witnessing a paradigm shift in the way mobile devices are being used and operated. What was once a voice network is now predominantly a data network. As a consequence, end-users are now using mobile systems for applications that fall under the data intensive paradigm, such as Skyline queries, streaming information relays, and crowd sourced disaster management. However, this paradigm shift has opened new research directions, such as: (a) Security, as the system now has numerous distributed entry points and the behavior of a malicious entity does not really correlate with any previously known phenomenon (e.g., Internet virus attacks, DOS attacks, etc.). (b) Data interoperability that must cater to the fundamental issue that mobile devices are required to work seamlessly with Internet data, thus requiring revision of protocols, data exchange frameworks to improve data sharing among mobile devices
-
and with the Internet. (c) Sustainable software development
that entails the development of software models for mobile
devices that have a longer life-cycle and require fewer updates.
This also effectively translates into an economically viable
mobile system. Privacy and security aspects need to be covered
at all layers of mobile networks, from mobile users
devices, to privacy-respecting credentials and mobile identity
management.
All of the above mentioned research domains are
complex on their own, which makes it a very attractive research
area for academia and industry. The eventual goal is to
make the mobile systems seamless integrate with Inter
and Intranet devices without a measurable performance
degradation. Is is arguably required to investigate novel
methods and techniques to enable secure access to data,
network nodes and services, flexible communication,
efficient scheduling, self-adaptation, decentralization, and
self-organization.
This special issue herewith presents six research papers with
novel concepts in the analysis, implementation, and evaluation
of the next generation of intelligent scalable techniques for data
intensive processing and security related problems in modern
mobile environments. The first three papers span the fields of
key management, power modeling and mobility modeling, but
all share a relevance to security aspects.
Cryptographic and key management systems in mobile
networks must be computationally low-cost because of the
limitations of computational and data storage capacities and
battery life of most of the network nodes. Wu and Lin
present non-interactive authenticated key agreement
(NIAKA) protocols based on the idea of bilinear
pairingbased cryptosystem model and Elliptic Curve Encryption
(ECE) scheme. The ECE allows the encryption of message
multiple times with different keys that can be decrypted in
a single run with a single key. During read operation, the
owner of the file sends the credential to the network
resource and service provider and requesting entity.
Theoretical analysis of semantic security of the proposed
methodology is provided through a verification of the
Decisional Bilinear Diffie-Hellman (DBDH) assumption.
The authors prove that the proposed NI-AKA scheme is
computationally equivalent to the DBDH.
The problem of optimal energy utilization in mobile
networks is not limited to the energy-aware cryptographic
schemes and is widely discussed over the last few years,
especially in the context of green mobile clouds and
Big Data systems. Nacci et al. present the MPower:
power-sensing and adaptive power modeling platform
for Android mobile devices. Their idea is based on
using the mobile device clients for gathering a
powerconsumption data from real-world users and devices.
The functionality of the platform is justified in a
comprehensive empirical analysis of 278 mobile devices and
22.5 million data records collected during one year.
Their approach facilitates the building of device-centric power
models that will allow users to craft better power-management
strategies.
Design of adaptive and computationally lightweight
techniques for modelling the mobility of devices in wide area
networks is one of the critical issues which may have a
significant impact on the performance characteristics of the
whole system. Niewiadomska-Szynkiewicz et al. address the
problem of calculation of mobility trajectories of devices in
fully connected cooperative ad-hoc networks. The presented
model is based on (...truncated)