Wireless Network Security

  • PDF / 889,017 Bytes
  • 2 Pages / 600.03 x 792 pts Page_size
  • 51 Downloads / 180 Views

DOWNLOAD

REPORT


Editorial Wireless Network Security Yang Xiao,1 Yi-Bing Lin,2 and Ding-Zhu Du3 1 Department

of Computer Science, The University of Alabama, B.O. Box 870290, Tuscaloosa, AL 35487-0290, USA of Computer Science and Information Engineering, National Chiao Tung University, Hsinchu 300, Taiwan 3 Department of Computer Science, University of Texas at Dallas, Richardson, TX 75083, USA 2 Department

Received 10 December 2006; Accepted 10 December 2006

Copyright © 2006 Yang Xiao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Recent advances in wireless network technologies are growing fast, evidenced by wireless location area networks (WLANs), wireless personal area network (WPANs), wireless metropolitan area networks (WMANs), and wireless wide area networks (WWANs), that is, cellular networks. However, wireless network security is a major obstacle to successfully deploy these wireless networks. The effort to improve wireless network security is linked with many technical challenges including compatibility with legacy wireless networks, complexity in implementation, and practical values in real market. The need to address wireless network security and to provide timely, solid technical contributions establishes the motivation behind this special issue. This special issue focuses on the novel and practical ways, but solid contributions, to improve the wireless network security. Specific areas of interest in WLANs, WPANs, WMANs, and WWANs include attacks, security mechanisms, security services, authentication, access control, data confidentiality, data integrity, nonrepudiation, encryption and decryption, key management, fraudulent usage, wireless network security performance evaluation, wireless link layer security, tradeoff analysis between performance and security, authentication and authorization for mobile service network, and wireless security standards (IEEE 802.11, IEEE 802.15, IEEE 802.16, 3GPP, 3GPP2). Call-for-papers of this special issue received an overwhelming response from the research community. There were many paper submissions to this special issue. The submissions covered most aspects of areas of interest. Unfortunately, due to limited space and volume, only eleven papers were selected and included in this special issue. Let us briefly introduce the eleven accepted papers as follows.

The first paper entitled “A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks,” authored by Guanfeng Li et al., is about key management for wireless sensor networks using a ring of keys is randomly drawn from a large key pool. The second paper entitled “SeGrid: a secure grid framework for sensor networks,” authored by Xiuzhen Cheng et al., proposes a secure framework for establishing grid keys in low duty cycle sensor networks, computing a shared key for two grids. The third paper entitled “On opti