1 Introduction

As we entered the 21st century, the rapid growth of information technology (IT) has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with IT resulting in a new paradigm, information convergence. In the process of information convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

In order to realize IT advantages, it requires the integration of security and data management to be suitable for convergence environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in convergence application, which could appear when devices interact with different kinds of applications. Therefore, we need to explore a security in convergence environments.

The goal of this issue is to discover a new progressive technology by upgrading the previous technologies and to solve the technical problems that may have occurred in the process of converging technology in various fields. It will reflect the state-of the-art of the computational methods, involving theory, algorithm, numerical simulation, error and uncertainty analysis and/or application of innovative processing techniques in engineering, science, and other disciplines related to IT convergence and security.

The topics of papers submitted in this SI included the following topics:

  • Security model for convergence environments

  • Security for open convergence system

  • Smartphone security Issue

  • Embedded security in cars

  • Security issues in WSN/RFID

  • IPTV security services in the BcN

  • Security and privacy for intelligent vehicular systems

  • Security for Broadband convergence Network

  • Commercial or industrial Issue in convergence environments

  • Information security in convergence environments

  • Cryptographic technologies for IT convergence and security

  • Digital forensics and anti-forensics

  • Security applications and services for convergence environments

  • Service managements and policies for convergence environments

Each manuscript was blindly reviewed by at least three reviewers consisting of guest editors and external reviewers. After the review process, 10 manuscripts were finally selected for this SI. The titles of selected papers are shown in following.

  1. 1.

    Threat Modeling of a Mobile Device Management System for Secure Smart Work

  2. 2.

    Enhanced security in internet voting protocol using blind signature and dynamic ballots

  3. 3.

    The RBAC Model and Supporting Implementation Technologies in Multi-Domain environment

  4. 4.

    The Effects of Relationship Benefit on relationship Quality and Store Loyalty from Convergence Environments

  5. 5.

    The Security Service Rating Design for IT Convergence Services

  6. 6.

    A Countermeasure against Wormhole Attacks in MANETs using Analytical Hierarchy Process Methodology

  7. 7.

    The Prediction of Network Efficiency in the Smart Grid

  8. 8.

    An Efficient Model of Korean Graphemes Based on a Smartphone Keyboard

  9. 9.

    A Framework for Unified Digital Evidence Management in Security Convergence

  10. 10.

    The Disclosure of an Android Smartphone’s Digital Footprint respecting the Instant Messaging utilizing Skype and MSN

2 The papers in this special issue

The first paper, “Threat Modeling of a Mobile Device Management System for Secure Smart Work” by K. Rhee et al., establishes a threat model for an MDM system by characterizing the system, identifying threat agents, assets, and adverse actions, and defining the threats and their effects. This work will be used to develop security requirements and design a secure system.

The second paper, “Enhanced security in internet voting protocol using blind signature and dynamic ballots” by A. Thi and D. Khanh, allows, in the newly proposed protocol, the adversaries to get more power than in any previous works. They can be coercers or vote buyers outside, and corrupted parties inside our system. The main contribution of this paper is to design an internet voting protocol which is not only satisfies desired security requirements but also unsusceptible to most of sophisticated attacks. The authors employ the blind signature technique and the dynamic ballots instead of complex cryptographic techniques to preserve privacy in electronic voting. Moreover, the authors also aim at the practical system by improving the blind signature scheme and removing physical assumptions which have often been used in the previous works.

The third paper, “The RBAC Model and Implementation Architecture in Multi-Domain Environment” by Z. Yang et al., discusses the domain concept and domain model in order to more adaptively apply the RBAC in multi-domain service oriented environments. Then the authors propose a domain-based RBAC model and give a formal description. Faced to the potential barriers to realize the D-RBAC, the authors also propose the implementation architectures for the individual and composite services respectively, which can efficiently control the service permissions and have a reasonable performance.

The primary concern of CRM is core customers from convergence environments. They show such passionate partnership with the company that they actively put forth their opinion to improve products and service through voluntary pro-company activities and participate in the development of new products through open innovation. Therefore, the top priority of a company should be given to defining its core customers and accurately understanding and managing them, which would contribute to the growth of the company. The fourth paper, “The Effects of Relationship Benefit on Relationship Quality and Store Loyalty from Convergence Environments—NPS Analysis and Moderating Effects—” by J. Jang et al., identifies net promoter score(NPS) of company by adopting index that evaluates the degree of customer loyalty to the company in judging the relationship of company and customer, and later on establishes strategy to increase the number of loyal customers by classifying customers by the score. In addition, as NPS serves as adjustment variable, net promoters are analyzed to contribute to store loyalty significantly.

The fifth paper, “The Security Service Rating Design for IT Convergence Services” by H. Chang, develops a damage compensation index for sustainable security service. In detail, by analyzing damage compensation criteria and cases for general information communication services, a damage compensation index on security services is developed for a goal of VoIP services. It can offer voluntary improvement of service quality for service providers, and simplicity of damage compensation for users. Additionally, it can socially give benefits of increasing the number of companies to apply the security SLA and mitigating legal disputes.

The sixth paper, “A Countermeasure against Wormhole Attacks in MANETs using Analytical Hierarchy Process Methodology” by F. Shi et al., proposes a countermeasure to prevent wormhole attacks in mobile ad hoc networks. The proposed scheme not only detects wormhole attacks but also locates wormhole nodes. To solve the colluding wormhole attack, the proposed scheme involves a countermeasure named bi-directional wormhole location mechanism.

AMI is core infrastructure of a smart grid and it is expected to be used for many industrial fields. The components of AMI generally include a smart meter, DCU, and MDMS. Since, there are too many devices such as smart meters and DCUs in AMI, it is important to maintain the suitable number of them. In particular, it is necessary to predict the proper number of DCUs for efficient management of AMI. The seventh paper, “The Prediction of Network Efficiency in the Smart Grid” by S. Jung et al., suggests a way to predict the suitable number of DCUs and the proposed method is useful to this heterogeneous AMI.

The eighth paper, “An Efficient Model of Korean Graphemes Based on a Smartphone Keyboard” by Y. Jeong et al., proposes a Korean grapheme model called ‘Auto Toggle’ by using auto switching between consonants and vowels of Hangul. In addition, Auto Toggle is designed and implemented based on the Android platform. The authors describe the results of a performance evaluation for the number of buttons pushed for each single syllable of Hangul compared with conventional methods. Additionally, Auto Toggle results in a rapid improvement on typing speed with respect to sentence generation. Specifically, the efficiency of Auto Toggle is determined to be high because it solves the problem related to button size that has been considered a source of great inconvenience in smartphone soft keyboards and reduced the number of button pushes.

Digital Forensics is being actively researched and performed in a various area against changing IT environment such as smart phone, cloud service and video surveillance. Moreover, it is necessary to research unified digital evidence management for correlation analysis from diverse sources. Meanwhile, various triage approaches have been developed to cope with the growing amount of digital evidence being encountered in criminal cases, enterprise investigations and military contexts. Despite of debating over whether triage inspection is necessary or not, it will be essential to develop a framework for managing scattered digital evidences. The ninth paper, “A Framework for Unified Digital Evidence Management in Security Convergence” by K. Lim and C. Lee, presents a framework with unified digital evidence management for appropriate security convergence, which is based on triage investigation. Moreover, this paper describes a framework in network video surveillance system to shows how XeBag works as unified evidence container for storing diverse digital evidences, which is a good example of security convergence.

Contemporary IM acts as a convenient tool to communicate with global users in real time because of its competitive rate, high availability, robust reliability, and agile mobility. There are some non-volatile data related to the RAM of the computing device in terms of cyber trails that were unknowingly left on the crime scenes. The tenth paper, “The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN” by H. Chu et al., provides a generic paradigm for the above cyber crime investigation.