ISSN : 1796-2021
Volume : 3    Issue : 7    Date : December 2008

Special Issue: Recent Advances in Information Technology and Security - Track on
Guest Editors: Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, and Guangxue Yue

Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, and Guangxue Yue
Page(s): 1-2
Full Text:
PDF (266 KB)

This special issue comprises six selected papers from the International Symposium on Information
Science and Engineering 2008 (ISISE 2008) and International Symposium on Computer Sciences
and Computational Technology 2008 (ISCSCT 2008), held in Shanghai, China, 20-22 December
2008. A total of more than 2000 contributions were submitted to the two Conferences, of which 600
were selected for presentation after a rigorous review process. From these 600 research papers,
the guest editors selected six as the best papers on the communications track of the Conferences.
The authors of these selected papers produced extended versions of their conference papers,
which were further developed through two rounds of reviewing.

“TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks”, by Jianli Hu,
Quanyuan Wu, and Bin Zhou, presents a feedback credibility based global trust model, and based
on the trust model, proposes an adaptive topology evolution mechanism for unstructured P2P
networks. Through this mechanism, trusted peers can migrate to the centric position, while
untrusted peers to the edge of the topology, guaranteeing fairness during topology evolution. The
mechanism can suppress the malicious behaviors of peers effectively, and also has the incentive
effect on all peers.

In “SimANet – A Large Scalable, Distributed Simulation Framework for Ambient Networks”, Matthias
Vodel, Matthias Sauppe, Mirko Caspar, and Wolfram Hardt present a new simulation platform for
complex, radio standard spanning mobile Ad Hoc networks. The presented SimANet - Simulation
Platform for Ambient Networks - allows the coexistence of multiple radio modules with different
communication technologies and protocol stacks within one node, which can be used concurrently.

“Cryptanalysis of Some RFID Authentication Protocols”, by Tianjie Cao, Peng Shen, and Elisa
Bertino, identifies two effective attacks, namely impersonation attack and de-synchronization attack,
against the LCSS protocol and the Song-Mitchell RFID authentication protocol. The authors also
identify an impersonation attack against another newly proposed RFID authentication scheme. It is
recommended that these attacks should be considered in the designing the new RFID
authentication protocol.

In “How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted
Signature Schemes Using Bellare-Miner Scheme”, Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang,
and Guowen Li address the problem of how to construct forward secure single-server, multi-server
and threshold-server assisted signature schemes using Bellare-Miner Scheme, and propose three
corresponding signature schemes. It has been proved in the paper that, these three schemes
maintain the forward secure property.

“Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures”, by Jia Yu, Fanyu
Kong, Rong Hao, Xuliang Li, and Guowen Li, proposes a publicly verifiable member-join protocol for
threshold signatures, in which, a new member can join a PVSS scheme to share the secret only
with the help of old shareholders. Moreover, everyone besides the new member can verify the
validity of the new member’s share, while only the new member knows his share. The proposed
protocol can tolerate a mobile adversary and adapts to many electronic applications.

In the last paper “Secure and Distributed P2P Reputation Management”, Jianli Hu, Quanyuan Wu,
and Bin Zhou proposes a reputation based secure and distributed P2P global trust management
model (DSRM), and presents its corresponding distributed storage mechanism and security
protection protocol. Theoretical analysis and simulation experiments show that, DSRM has
advantages in combating various malicious behaviors such as ordinary malicious behaviors and
collusions, and suppressing the sybil attackers and trust information tamper peers in transmission
over the current global trust management models, and demonstrates more robustness and

In closing, we would like to take this opportunity to thank the authors for the efforts they put in the
preparation of the manuscripts and in keeping the deadlines set by editorial requirements. We wish
to express our deepest thanks to the program committee members for their help in selecting
papers for this issue and especially the referees of the extended versions of the selected papers for
their thorough reviews under a tight time schedule. We also acknowledge the exceptional effort by
the Editorial Board of the Journal of Communications throughout this process. We hope that you will
enjoy reading this special issue as much as we did putting it together.

Index Terms
Special Issue, Information Technology, Security, Communications