Convergence-based service environments are embedded in large-capacity servers and adopt client/server models. Applications, devices, networks, and infrastructure are converging and creating an immense amount of content, which poses complex challenges for organizations, developers and users. In the field of security, we are seeing the convergence of frameworks and paradigms like augmented reality, ubiquitous computing and pervasive computing; and we are seeing new kinds of content, much of it user-generated, that can be searched, organized and consumed on many devices and in many formats [1015]. The challenges of converged security, hacking, computer virology technologies and content require new algorithms, application paradigms, interaction methods, and services; the creation of expressive annotation frameworks, scalable algorithms, and new paradigms for information discovery; and ways of searching, organizing and delivering converged information for delivery at the right place, at the right time and at the right level of detail. This special focus issue on convergence security systems will address the need for novel services and reviews security vulnerabilities in recent years. Some of these research areas are listed below.

  • Privacy and authentication for wireless networks

  • Convergence security in ubiquitous computing

  • Algorithmic and computer virology

  • Innovative applications in ubiquitous computing

  • Intelligent applications for multimedia processing

  • Hacking; computer virology

  • User experience with convergence systems

  • Personalization, security and privacy

  • Information indexing, searching, and visualization

  • Intelligent information processing algorithms

  • Sensors, wireless technology and embedded systems

  • Applications in computer virology

This special issue is devoted to one of the hottest topics in convergence security systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques.

Lee et al. [1] present reconfigurable real number–field elliptic curve cryptography to improve security. They propose a method for configuring a cryptographic system using real number–field coordinates on an elliptic curve, as well as a finite field, through expansion of existing elliptic curve cryptography. They discuss a method for application of an elliptic curve defined on a real-number field for cryptographic systems and the advantages obtained from the use of a real-number field. Hong [2] introduces an efficient and secure domain name server (DNS) cyber shelter from distributed denial of service (DDoS) attacks. This study proposes a DNS cyber shelter that can detect DDoS attack packets and block their source. In computer security, a demilitarized zone (DMZ) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet.

Jeong et al. [3] present a token-based authentication security scheme for a Hadoop distributed file system using elliptic curve cryptography. They propose a token-based authentication scheme that protects sensitive data stored in a Hadoop distributed file system (HDFS) against replay and impersonation attacks. The proposed scheme allows HDFS clients to be authenticated by a data node via block access token. Unlike most HDFS authentication protocols adopting public key exchange approaches, the proposed scheme uses the hash chain of keys. The proposed scheme offers performance (communication power, computing power and area efficiency) as good as that of existing HDFS systems. Lee et al. [4] look at the vulnerabilities of intelligent automobiles using TPEG (Transport Protocol Expert Group) updates based on T-DMB and its countermeasures. They propose security countermeasures (after creating an attack scenario in order to transmit the update information) that are reliable by identifying the characteristics of the wireless update for navigation. In the scenarios proposed, they derive a navigation attack scenario through an analysis of T-DMB and TPEG and propose countermeasures to the derived security threats in order to propose a security system that can defend against the attack.

Lee [5] introduces a secure authentication scheme for a smart learning system in a cloud computing environment. The authentication scheme allows users to securely have access to a smart learning system in a cloud environment. The method he proposes is safe against user information leaks because it stores the user information through a hash-chain when a registered user’s USIM_ID is granted access to the proposed scheme. Im et al. [6] present banking behavior in security and multi-channel environments. They propose differences of factors affecting banking behavior in a multi-channel environment. This paper adopted multi-group structural equation modeling to compare the differences in causalities between internet and mobile banking. The result of causality supports the theory of the technology acceptance model, and the paths across the two groups are different.

Jo et al. [7] present an efficient thread partition policy for secure functional language. They propose an enhancing thread partition policy, which is the most significant part when a non-strict function program is translated in order to efficiently materialize function language in a multithread model. A thread partition policy algorithm is proposed in order to enhance the efficiency of an existing thread partition performing thread partition by analyzing the dependence relationship between operations in a non-strict function program. Shin et al. [8] present an association analysis of technology convergence based on information system utilization. They propose figuring out convergence technology fields using an analysis of utilization patterns in academic papers or patent information that is used together by researchers. This study deduces convergence utilization between technologies by analyzing the relationships between the fields of information utilized simultaneously through an analysis of the usage sessions of NDSL (National Digital Science Library of Korea). Choi [9] introduces a study on model fostering for a cloud service brokerage (CSB). This study proposes a brokerage CSB development model, and suggests policy measures that apply to co-operation in cloud service business models. Cloud service brokerage is a traditional service, and solutions produced by a variety of cloud services’ adoption of asset management, service level agreements (SLAs) interdependence management, compliance management, risk management and security solutions are presented for complex issues.

This fine collection of papers was accumulated by fruitful collaboration. We gratefully acknowledge and express our heartfelt appreciation to all the authors for their excellent contributions to this special issue. We would also like to thank all the members of the SDPM, ICDPM Program Committee and anonymous reviewers for their help in identifying novel papers and for their careful reading of earlier drafts to select 9 high-quality papers out of 25 papers submitted—a 36 % acceptance rate. Furthermore, we would like to thank Professor Eric Filiol, editor-in-chief of the International Journal of Computer Virology and Hacking Techniques, for his valuable remarks and help throughout the publication process of this special issue.