Special Issue "Security Issues in Sensor Networks"

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708).

Deadline for manuscript submissions: closed (31 May 2015)

Special Issue Editors

Guest Editor
Prof. Dr. Zbigniew Kotulski

Warsaw University of Technology, Institute of Telecommunications, 15/19 Nowowiejska Str., 00-665 Warsaw, Poland
Website | E-Mail
Fax: +48 22 234 7564
Interests: cryptography; cryptographic protocols; information security; Wireless Sensor Networks; statistical methods in information security
Guest Editor
Dr. Bogdan Ksiezopolski

Maria Curie-Skłodowska University, Institute of Computer Science, ul. Akademicka 9, 20-031 Lublin, Poland
Polish-Japanese Institute of Information Technology, ul.Koszykowa 86, 02-008 Warsaw, Poland
Website | E-Mail
Fax: +48 82 537 62 62
Interests: Information Security; Cryptology; Security Engineering; Cryptographic Protocols; Wireless Sensor Networks; Internet of Things; Security Economics; Security Metrics; Risk analysis
Guest Editor
Prof. Dr. Pascal Lafourcade

LIMOS - UMR 6158, Campus des Cézeaux, Bâtiment ISIMA - Bureau F107 63173 Aubière cedex, France
Website | E-Mail
Fax: +33 4 73 17 71 11
Interests: security; cryptographic protocols; formal methods; verification; Wireless Sensor Networks; Privacy; e-voting; e-exam; e-auction

Special Issue Information

Dear Colleagues,

Wireless Sensor Networks that perform complicated data processing (collecting, storing, transforming and transmitting data) using hardware of constrained performance need specific protection methods that balance effectiveness of all functions of a sensor with the required security level. This special issue expects new results that improve different aspects of protection mechanisms for Sensor Networks in all spectra of their emerging applications. We especially encourage research papers in the following topics (other security-relevant topics are also invited):

  • Secure communication protocols for SN
  • Security of software-defined, cloud-based and other future sensor networks
  • Secure routing in WSN
  • Trust and reputation supporting SN security and reliability
  • Cryptography for SN (including lightweight cryptography), theoretical foundations, cryptographic primitives, and formal methods
  • Wireless and mobile privacy and anonymity; secure localization and location privacy
  • Secure applications of sensor networks (M2M, IoT, P2P, MANET, VANET, e-health, etc.)
  • Cryptographic protocols for SN (including RFID, NFC, etc.)
  • Entity authentication and key management in SN
  • Context-aware security solutions for SN
  • QoP models in SN, economics of security, green computing models
  • Attacks and defenses in SN: from formal models to practical solutions

Prof. Dr. Zbigniew Kotulski
Dr. Bogdan Ksiezopolski
Prof. Dr. Pascal Lafourcade
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

View options order results:
result details:
Displaying articles 1-2
Export citation of selected articles as:

Research

Open AccessArticle Critical Infrastructure Surveillance Using SecureWireless Sensor Networks
J. Sens. Actuator Netw. 2015, 4(4), 336-370; doi:10.3390/jsan4040336
Received: 8 June 2015 / Revised: 21 October 2015 / Accepted: 9 November 2015 / Published: 25 November 2015
PDF Full-text (2964 KB) | HTML Full-text | XML Full-text
Abstract
In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on
[...] Read more.
In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the communication level, as well as mechanisms that ensure the functional safety during its operation. While there are many theoretical approaches in various subdomains of WSNs—like network structures, communication protocols and security concepts—the construction, implementation and real-life application of these devices is still rare. This work deals with these aforementioned aspects, including all phases from concept-generation to operation of a secure wireless sensor network. While the key focus of this paper lies on the security and safety features of the WSN, the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described. Full article
(This article belongs to the Special Issue Security Issues in Sensor Networks)
Open AccessArticle Key Management in Wireless Sensor Networks
J. Sens. Actuator Netw. 2015, 4(3), 251-273; doi:10.3390/jsan4030251
Received: 17 April 2015 / Accepted: 14 August 2015 / Published: 7 September 2015
Cited by 2 | PDF Full-text (226 KB) | HTML Full-text | XML Full-text
Abstract
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on
[...] Read more.
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances. Full article
(This article belongs to the Special Issue Security Issues in Sensor Networks)
Back to Top