Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 15 / Issue 5

available in:   PDF (26 kB) PS (20 kB)
Similar Docs BibTeX   Write a comment
Links into Future

Data Security and Privacy Protection in Pervasive Computing Environments

J.UCS Special Issue

Byoung-Soo Koh
DigiCAPS Co., Ltd, Soul, Korea

Mieso Denko
(University of Guelph, Guelph, Canada

Stefanos Gritzalis
(University of the Aegean, Mytilene, Greece

Ching-Hsien Hsu
(Chung Hua University, Hsinchu, Taiwan

The integration of advanced wireless technology and Internet tends to increase connections of computing devices. Because Pervasive Computing environments make people get accustomed to computing, they naturally forget the fact that they are using computers. Furthermore, smart devices around offer them services such as user location information, user situation, and user data maintenance/management. In order to achieve these purposes, various aspects should be integrated from hardware and networks to operating systems, middleware, user interfaces, and applications.

However, in Pervasive Computing, data security and privacy concerns, such as personal information outflows, has not been considered in depth. Therefore, in Pervasive Computing, data security management and diverse security technologies should be considered. This special issue solicits state-of-the-art approaches and solutions in the area of data security and privacy protection in modern Pervasive Computing environments.

We received twenty-three manuscripts. After the pre-review process, twenty-two manuscripts were selected for the first review. Nine manuscripts (one invited) were finally selected for this Special Issue after the first, second, and third review processes. Each manuscript selected from the pre-review was blindly reviewed by at least three reviewers consisting of guest editors and external reviewers.

The invited paper in this special issue is on Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents, by Pablo Najera, Francisco Moyano, and Javier Lopez. This work presents the concept and security requirements of general-use e-documents, analyze the most comprehensive security solution and its suitability for general-purpose e-documentation. This work finally proposes alternatives for the weakest and less suitable protocol from ePassports.

Page 967

The first paper in this special issue is on Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols, by Peter Pecho, Frantisek Zboril jr., Martin Drahansky, and Petr Hanacek. This work outlines the possible usage of cryptographic protocols for securing of a wireless sensor network and present how to make applications for the MICAz devices which uses agent based principles together with some cryptographic protocols.

The second paper in this special issue is on Security Analysis of the CHESS-64 Suitable for Pervasive Computing Environments, by Changhoon Lee, Jongsung Kim, Seokhie Hong, and Yang-Sun Lee. They show CHESS-64 does not have a high security level, more precisely, they present two related-key differential attacks on CHESS-64, which are the first known cryptanalytic results on CHESS-64 so far.

The third paper in this special issue is on Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks, by Shiguo Lian and Yan Zhang. They study the architecture, protocol, user identification and digital right management (DRM) for protecting mobile TV multimedia content. The result indicates that the DVB/GPRS heterogeneous networks integration is able to make full use of the two networks advantages with respect to bandwidth, data rate and implementation complexity.

The fourth paper in this special issue is on Light-Weight Key Exchange with Different Passwords in the Standard Model, by Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee. They propose a light-weight password-based authenticated key exchange protocol with different passwords. It requires only 2 rounds and 4 modular exponentiations per user. The protocol provides forward secrecy, known-key secrecy, key secrecy against the curious server, and security against undetectable online dictionary attacks without random oracles.

The fifth paper in this special issue is on USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework, by Jong Hyuk Park. He proposes privacy and access control scheme by surveillance which is one of core security technologies for ubiquitous hybrid intelligent security framework. In this scheme, the device information and the signature information can be added to the image data obtained by the image capturing device to maintain security of the image data and use the image data as digital proof when a specific event is generated.

The sixth paper in this special issue is on Vascular Pattern Analysis towards Pervasive Palm Vein Authentication, by Debnath Bhattacharyya, Poulami Das, Tai-hoon Kim, and Samir Kumar Bandyopadhyay. They propose an Image Analysis technique for Vascular Pattern of Hand Palm, which in turn leads towards Palm Vein Authentication of an individual. The proposed three algorithms are proved to improve the recognition performance with different training samples.

The seventh paper in this special issue is on Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network, by Yao H. Ho, Ai Hua Ho, Kien A. Hua, and Fei Xie. This work investigates techniques to enforce collaboration among mobile devices by identify and punish misbehaving users in supporting the virtual router functionality. Simulation results based on various system configurations are given. They indicate that the proposed technique is effective.

The last paper in this special issue is on A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security, by Naixue Xiong, Jing He, Jong Hyuk, Park, Donald Cooley, and Yingshu Li.

Page 968

The goal of this work is to normalize the image of a vehicle so that regardless of its lane or position in a lane, the features will be approximately the same. They use a single camera system mounted on a pole to look down on the traffic scene, and detecting and classifying vehicles in multiple lanes are for any direction of traffic flow.

Finally, we would like to thank all authors for their contributions to this special issue. We also extend our thanks to the following external reviewers for their excellent job in reviewing the manuscripts: Antoine Bagula, A. Tsakountakis, Agustinus Borgy Waluyo, Bhabani Sinha, Bidyut Gupta, Binod Vaidya, C. Kolias, C. Lambrinoudakis, Charalampos Patrikakis, Chuan Lin, Damien Sauveron, Debnath Bhattacharyya, Deok Gyu Lee, Deqing Zou, Dieter Hutter, Dimitris Geneiatakis, Domenico Rosaci, Dongchan An, DongHoon Lee, Dong Seong Kim, Martin Drahansky, E. Konstantinou, E. Rekleitis, G. Karopoulos, Han-Chieh Chao, Henry Y.T. Ngan, Ik Rae Jeong, Jaechul Sung, Jeong Ok Kwon, Jiqiang Lu, Josef Skvarek, Jung-Shian Li, Massimo Esposito, P. Rizomiliotis, Shiguo Lian, T. Balopoulos, Xuefeng Liang, Yan Zhang, Yang Liu and Antoine Bagula.

Byoung-Soo Koh
Mieso Denko
Stefanos Gritzalis
Ching-Hsien Hsu
February 2009

Page 969