Security of e-systems

In recent years, the dependence of people on electronic syslarge amounts of data collected by honeypots. Via tems (e-systems) has increased tremendously. Examples of e-systems widely used in everyday life include stand-alone computers, wired and wireless networks, cellular telephony networks, corporateWeb sites, electronic service, e-commerce and e-payment systems, and e-government systems. Because of the aforementioned spread of e-systems, many corporations and businesses rely heavily on the effective, proper, and secure operation of them. In most cases, such systems are used for storing, transmitting, and exchanging sensitive and confidential information, unauthorized access of which entails loss of money and credibility as well as the release of confidential information to competitors or enemies. This security is a crucial factor for these systems; however, its implementation must be cost-efficient so as to enable their widespread use. The aim of this special issue of the Journal of Security and Communication Networks is to highlight recent research in the broad area of e-systems security. We hope that this issue will be a useful reference for current and future trends in the very active area of wireless sensor networking. We received 10 papers from all over the world. Each paper was reviewed by at least two qualified reviewers. We have accepted six papers; thus, the acceptance rate for this issue is 60%. The articles in this special issue are organized as follows. The first article is entitled “A Hybrid NFC– Bluetooth Secure Protocol for Credit Transfer Among Mobile Phones” and is authored by David M. Monteiro, Joel J. P. C. Rodrigues, Jaime Lloret, and Sandra Sendra. The article proposes a mobile peer-to-peer communication system that can be used for money transfers. The proposed system is based on near field communication and Bluetooth technology and thus utilizes a hybrid communication protocol that combines the security characteristics of near field communication and the relatively high Bluetooth data transfer rates. The proposed system was deployed and evaluated in real environments with good results. The second article is in the area of Web service security is entitled “Characterization of Attacks Collected from the Deployment of Web Service Honeypot” and is authored by Abdallah Ghourabi, Tarek Abbes, and Adel Bouhoula. It proposes a honeypot implementation for Web services. The proposed system addresses the problem of the very