Academic Journals Database
Disseminating quality controlled scientific knowledge

Guest Editorial

ADD TO MY LIST
 
Author(s): Min Young Chung | Jae-Hyun Kim | Masato Oguchi | Jeng-Shyang Pan

Journal: Journal of Networks
ISSN 1796-2056

Volume: 5;
Issue: 3;
Start page: 265;
Date: 2010;
Original page

Keywords: Special Issue | Recent Trends | Wireless Communications and Networking

ABSTRACT
This special issue comprises of 10 selected papers from the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009). From 358 papers submitted in the conference, 106 papers were selected for presentation. Among them, ten qualified papers have been selected as the papers for this special issue, which deal with state-of-the-art communication technology. Sensor network is vulnerable to hostile environments. Thus, 3 papers focus on security issues in wireless sensor network. Also, energy consumption is an important problem in sensor network, which is considered in this issue: "Environment-based selection method for en-route filtering scheme using fuzzy logic" by Sang Jin Lee, Hae Young Lee, Tae Ho Cho, adopts the fuzzy logic to determine the threshold to filter false reports in wireless sensor networks. "Light weight key renewals for clustered sensor networks" by Gicheol Wang, Seunghae Kim, Daewook Kang, Deokjai Choi and Gihwan Cho, proposed a lightweight key renewal scheme, which removes the compromised nodes by reforming clusters. In a cluster, each member uses a pair-wise key to communicate with its cluster head. "An isolation intrusion detection system for hierarchical wireless sensor networks" by Rung-Ching Chen, Chia-Fen Hsieh and Yung-Fa Huang, discusses types of attacks on wireless sensor networks and how to prevent them, and proposes an isolation table to detect intrusions. "An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks" by Riaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee, has presented a theoretical and simulation-based energy consumption analysis and evaluated three reputation-based trust management schemes of wireless sensor networks. Two security related papers are presented in application layer and physical layer: "The design of e-traveler’s check with efficiency and mutual authentication" by Chin-Chen Chang and Shih-Chang Chang, proposes the e-traveler's check to preserve the rights of holders of e-traveler’s check and to prevent the check-issuing banks from being damaged. "Error-resilient triple-watermarking with multiple description coding" by Shu-Chuan Chu, Lakhmi C. Jain, Hsiang-Cheh Huang, Jeng-Shyang Pan, proposes an algorithm on vector quantization (VQ) based image watermarking for error-resilient transmission, which incorporates watermarking with MDC to overcome channel impairments while retaining the capability for ownership protection.Two papers are related to resource managements, where scheduling and load-balancing problems are considered in content addressable network and multi-channel broadcast environment, respectively: "Efficient load balancing techniques for self-organizing content addressable networks" by Djelloul Boukhelef and Hiroyuki Kitagawa, addresses the problem of load balancing in large scale and self organizing P2P systems and proposes decentralized mechanisms to evenly distribute the data load among the participating nodes in Content Addressable Networks. "A conflict avoidance data allocation algorithm in a multi-channel broadcast environment" by Kai Liu, Victor C. S. Lee, analyzes the bandwidth utilization problem in multichannel on-demand broadcast environment and proposes an on-line scheduling algorithm to avoid the conflict in data allocation.Finally, this special issue also includes wireless mesh network and OFDM related papers: "A simple yet effective scheme for the maintenance of proxy information in IEEE 802.11s wireless mesh networks" by Shih-Tsung Liang, proposes a scheme to maintain the proxy information, which can be applied to mesh networks and IEEE 802 LANs. "Sampling frequency offset estimation methods for DVB-T/H systems" by Kyung Hoon Won, Jung Su Han, and Hyung-Jin Choi, proposes two SFO estimation methods to achieve stable operation in low SNR and large Doppler frequency environment.We wish to thank Sungkyunkwan University, Korea for providing the venue to host the conference. In particular, we would like to acknowledge School of Information and Communication Engineering, Sungkyunkwan University, Korea, who has worked throughout the year in preparation for this conference. We would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and for their valuable contributions. We wish to express our deepest gratitude to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough reviews under a tight time schedule. Last, but not least, our thanks go to the Editorial Board of the Journal of Networks for the exceptional effort they did throughout this process.In closing, we sincerely hope that you will enjoy reading this special issue.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions