Special Issue "Advances and Innovations in Cloud Computing Technologies and Applications (CloudTech 2018)"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (15 April 2019)

Special Issue Editors

Guest Editor
Prof. Dr. Abdellah Touhafi

Vrije Universiteit Brussel, Brussels, Belgium
Website | E-Mail
Interests: security; wireless sensor network; network; sensors; computer engineering; FPGA; reconfigurable computing; hardware
Guest Editor
Prof. Dr. An Breaken

Vrije Universiteit Brussel, Brussels, Belgium
Website | E-Mail
Interests: network security; algorithms; security; information security; wireless sensor network; cryptography; algebra; encryption; authentication; embedded systems; cryptology; smart card
Guest Editor
Prof. Dr. Olivier Debeir

Université Libre de Bruxelles, Brussels, Belgium
Website | E-Mail
Interests: deep convolutional networks; machine learning; thermal image superresolution; people detection in video images; microscopy image analysis; automatic document analysis; augmented reality applied to neuropathic pain treatment
Guest Editor
Prof. Dr. Mostapha Zbakh

National College of IT (ENSIAS), Rabat, Morocco
Website | E-Mail
Interests: security; cloud computing; GPU-computing; parallel computing
Guest Editor
Prof. Dr. Mohamed Essaaidi

Abdelmalek Essaaidi University—Electronics & Micro Group, P.O. Box 2121, Tetuan, Morocco
Website | E-Mail
Interests: cloud computing; IoT; WiMax

Special Issue Information

Dear Colleagues,

Cloud computing is becoming mainstream and has proven its ability to solve many challenges related to service-centered computing approaches. New techniques and methods for advanced scheduling, real time behavior, big data-based machine learning, and IoT-related cloud services are new trends.

CloudTech will address a rich selection of topics such as cloud computing technologies, mobile cloud computing, cloud security, big data, IoT, distributed and parallel computing techniques, HPC, end-user services, and much more.

Selected papers presented at the CloudTech 2018 (http://www.cloudtechconference.org/) are invited to submit their extended versions to this Special Issue of the journal Computers. All submitted papers will undergo our standard peer-review procedure. Accepted papers will be published in open access format in Computers and collected together on the Special Issue website.

Conference papers should be cited and noted on the first page of the paper; authors are asked to disclose that it is a conference paper in their cover letter and include a statement on what has been changed compared to the original conference paper. Please note that the submitted extended paper should contain at least 50% new content (e.g., in the form of technical extensions, more in-depth evaluations, or additional use cases) and not exceed 30% copy/paste from the conference paper.

Prof. Dr. Abdellah Touhafi
Prof. An Breaken
Prof. Olivier Debeir
Prof. Mostapha Zbakh
Prof. Mohamed Essaaidi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

View options order results:
result details:
Displaying articles 1-1
Export citation of selected articles as:

Research

Open AccessArticle Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks
Received: 21 February 2019 / Revised: 12 March 2019 / Accepted: 12 March 2019 / Published: 19 March 2019
PDF Full-text (786 KB) | HTML Full-text | XML Full-text
Abstract
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager [...] Read more.
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code. Full article
Figures

Figure 1

Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top