Special Issue "Sensor Network"
A special issue of Algorithms (ISSN 1999-4893).
Deadline for manuscript submissions: closed (15 November 2012)
Dr. Pierre Leone
TCS - Sensor Lab, Centre Universitaire d'Informatique, Battelle batiment A, Route de Drize 7, CH-1227 Carouge, Geneva, Switzerland
Phone: +41 22 379 75 38
Fax: +41 22 379 00 79
Interests: sensor networks; energy balance mechanisms; dynamical analysis; geographic routing; optimal data propagation; networks lifetime
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Algorithms is an international peer-reviewed Open Access quarterly journal published by MDPI.
- local (distributed) algorithms
- localized algorithms
- localization systems
- tracking/exploration algorithms
- wireless medium access control
- routing and data propagation algorithms
- geographic routing
- virtual coordinates and networks
- energy-aware algorithms
- energy models
- data gathering
- mobility in wireless sensor networks
- dynamic networks
- roving agents
- distributed collaborative information processing
- computation and programming model
- fault tolerance and dependability
- scheduling and load balancing
- network deployment and topology control
Algorithms 2013, 6(1), 29-42; doi:10.3390/a6010029
Received: 14 September 2012; in revised form: 4 January 2013 / Accepted: 14 January 2013 / Published: 18 January 2013| Download PDF Full-text (250 KB)
Algorithms 2013, 6(2), 197-226; doi:10.3390/a6020197
Received: 6 December 2012; in revised form: 8 February 2013 / Accepted: 7 March 2013 / Published: 2 April 2013| Download PDF Full-text (442 KB)
The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.
Type of Paper: Article
Title: Enforcing Security Mechanisms in the IP-based Internet of Things
Authors: S. Cirani, L. Veltri and G. Ferrari
Affniation: Department of Information Engineering, University of Parma, Italy; E-Mail: email@example.com; firstname.lastname@example.org; email@example.com
Abstract: The Internet of Things (IoT) is an emerging concept which refers to billions of interconnected (non-human) information sources, also named smart objects, typically equipped with sensors or actuators, a tiny microprocessor, a communication interface, and a power source. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The IPSO Alliance promotes the use of IP as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart objects communication. The protocol stack that smart objects will implement will try to match classical Internet hosts in order to make it feasible to create the so-called Extended Internet, that is the aggregation of the Internet with the IoT. The latter faces many security issues coming from the very nature of smart objects and the use of standard protocols. This paper provides an overview of the security challenges at network, transport and application layers together with the proposed algorithms and solutions to cope with them.
Keywords: security; cryptography; Internet of Things; smart objects; secure communication protocols; secure data aggregation
Last update: 25 September 2012