Advances in Networks

Special Issue

Secure Networks and Communications

  • Submission Deadline: 30 September 2015
  • Status: Submission Closed
  • Lead Guest Editor: Domenico Cacciari
About This Special Issue
Internet and social networks have dramatically changed the way we communicate and interact in all areas. The need to ensure free access to information and at the same time to ensure the protection of data and privacy has created new challenges.

The violation of encryption protocols, the NSA-gate, terrorist online recruitment and massive hacker attacks have created the need for greater possibility of investigation over privacy but at the same time increased data protection and security.

The purpose of this special issue is to spread as much as possible studies and advanced researches regarding networks and secure communications while ensuring free access to information.

Aims and Scope:

1. cybersecurity
2. the internet of things
3. cryptography
4. encryption
5. network security
6. social media awareness and security
7. security awareness
8. hacking back in self defense
9. security for operational environments
10. exploit, mobile and cloud storage
11. security architecture
12. security management
13. physical security
Lead Guest Editor
  • Domenico Cacciari

    Clinical engineering and IT department, IRCCS Materno Infantile Burlo Garofolo, Trieste, Italy

Guest Editors
  • Daniel Zotti

    Clinical engineering and IT department, IRCCS Materno-Infantile “Burlo Garofolo”, Trieste, Italy

  • Michele Bava

    Clinical Engineering and IT Department, IRCCS Materno-Infantile “Burlo Garofolo”, Trieste, Italy

  • Chandan Koner

    Department of Computer Science and Engineering, Dr. B. C. Roy Engineering College, Durgapur, India

  • Rajdeep Chowdhury

    Department of Computer Application, JIS College of Engineering, Kolkata, India

Published Articles
  • Energy Conservation in Mobile Ad Hoc Network Using Energy Efficient Scheme and Magnetic Resonance

    Manish Bhardwaj , Ashish Bansal

    Issue: Volume 3, Issue 3-1, November 2015
    Pages: 34-39
    Received: 30 September 2015
    Accepted: 7 October 2015
    Published: 23 October 2015
    DOI: 10.11648/j.net.s.2015030301.15
    Downloads:
    Views:
    Abstract: A mobile ad hoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the energy management and energy conservation become very critical in mobile ad hoc network. The nodes in this network have limited battery power and limited comp... Show More
  • Power Management of Ad Hoc Routing Protocols Using Mobility Impact and Magnetic Resonance

    Manish Bhardwaj , Anshima Singh

    Issue: Volume 3, Issue 3-1, November 2015
    Pages: 27-33
    Received: 30 September 2015
    Accepted: 7 October 2015
    Published: 23 October 2015
    DOI: 10.11648/j.net.s.2015030301.14
    Downloads:
    Views:
    Abstract: The performance of an ad hoc routing protocol is highly dependent on the mobility model used in the ad hoc networks. Most of previous work used only Random Waypoint mobility model, which is unrealistic in many situations. The mobile nodes are often power constrained so that energy conservation is also an important issue on evaluating protocols perf... Show More
  • Infrastructure Security in a Paediatric Hospital: Architectural Evolution, Virtualization and Network Management Systems

    Domenico Cacciari , Daniel Zotti , Edoardo Sossa , Michele Bava

    Issue: Volume 3, Issue 3-1, November 2015
    Pages: 23-26
    Received: 21 August 2015
    Accepted: 22 August 2015
    Published: 17 September 2015
    DOI: 10.11648/j.net.s.2015030301.13
    Downloads:
    Views:
    Abstract: The match of research activity, paediatric healthcare services offered by the IRCCS Burlo and internet access of long-stay patients produces a complex situation regarding IT security, network architecture and management. Often at the most inopportune time computers and other electronic devices quit working so the IT Staff has to ensure the proper f... Show More
  • Implementation of Software-Efficient DES Algorithm

    Mohammad Taghipour , Arash Moghadami , Behbood Moghadam Naghdi Shekardasht

    Issue: Volume 3, Issue 3-1, November 2015
    Pages: 7-22
    Received: 19 August 2015
    Accepted: 29 August 2015
    Published: 17 September 2015
    DOI: 10.11648/j.net.s.2015030301.12
    Downloads:
    Views:
    Abstract: By increasing development of digital telecommunication and the increase of sending and receiving data of various network of data transfer, protection of the safety of data are the most important necessities of the current world. The increase of different bank trading, increasing use of smart cards, moving to electronic government, are the examples ... Show More
  • Mobile Radio Evolution

    M. Prasad , R. Manoharan

    Issue: Volume 3, Issue 3-1, November 2015
    Pages: 1-6
    Received: 2 July 2015
    Accepted: 13 July 2015
    Published: 17 September 2015
    DOI: 10.11648/j.net.s.2015030301.11
    Downloads:
    Views:
    Abstract: All over the world, wireless communication services have enjoyed dramatic growth over the past 25 years. Mobile communication is the booming field in the telecommunications industry. The cellular network is the most successful mobile communication system, used to transmit both voice and data. This paper provides a depth view about the technologies ... Show More