You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Editorial
  • Open Access

4 August 2017

Trusted and Secure Wireless Sensor Network Designs and Deployments

,
,
and
1
Department of Electronics, University of Alcala, Alcalá de Henares, 28871 Madrid, Spain
2
School of Computing and Digital Technology Birmingham City University, Birmingham B4 7XG, UK
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Trusted and Secure Wireless Sensor Network Designs and Deployments
The deployment of wireless sensor networks (WSNs) is a realistic solution for many markets, such as manufacturing and environment monitoring, military and critical infrastructure monitoring, and, more recently, in energy-efficiency and healthcare sectors, due to their great capabilities in acquiring and transmitting data and processing them for different purposes. Current designs and architectures use radio channel(s) to share information between nodes and a gateway/hub, and implement embedded sensors with autonomous battery or low power microprocessors. Standard platforms, such as Telos B, and operating systems, such as TinyOS or Contiki, are used by a majority of stakeholders.
Security, network topology, and communication protocol are critical issues in the current deployment of WSN applications. Different strategies should be developed according to the application requirements, such as distance, number of transmissions during a period of time, authentication needs, and rate of the frequency band, to name a few.
This Special Issue is aimed at fostering the latest developments in the design, implementation, and evaluation in the field of WSN deployments.

Summary of the Special Issue

This Special Issue has focused attention on the research lines related to wireless sensor network (WSN) deployment, such as new contributions to better sensor nodes placement, enhanced routing algorithms, and alternatives to obtaining increased security.
Sensor placement is an important task not fully studied in WSN applications. The number of sensors and their location will affect the performance, accuracy, and cost of the deployment. Thus, different relevant papers have been published in this particular topic, specifically WSN setups for indoor positioning. Routing is another one of the most noticeable research challenges in WSNs. Large WSNs depend on routing protocol to perform correctly. This Special Issue focuses on papers describing how the path is built by selecting appropriate nodes that are traversed along the network while maintaining a safe/secure communication. Finally, security and authentication in WSNs represent another challenging topic. Nodes in a WSNs can dynamically enter or leave a network, which leads to a variable network topology. Moreover, there are legitimate and eavesdropper nodes operating at the same time in a WSN. The published papers present contributions to balance the different tradeoffs for security and WSN shortcuts providing closed-form equations to quantify and compare the different scenarios, allowing the designer to choose the best alternative.

Acknowledgments

We would like to thank all authors who have submitted their manuscripts to this Special Issue for considering Sensors-MDPI journal and the reviewers for their hard work during the review process.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Domingo-Perez, F.; Lazaro-Galilea, J.L.; Bravo, I.; Gardel, A.; Rodriguez, D. Optimization of the Coverage and Accuracy of an Indoor Positioning System with a Variable Number of Sensors. Sensors 2016, 16, 934. [Google Scholar] [CrossRef] [PubMed]
  2. Umar, I.A.; Mohd Hanapi, Z.; Sali, A.; Zulkarnain, Z.A. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks. Sensors 2016, 16, 943. [Google Scholar] [CrossRef] [PubMed]
  3. Estévez, F.J.; Glösekötter, P.; González, J. DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks. Sensors 2016, 16, 960. [Google Scholar]
  4. Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef] [PubMed]
  5. Diaz, A.; Sanchez, P. Simulation of Attacks for Security in Wireless Sensor Network. Sensors 2016, 16, 1932. [Google Scholar] [CrossRef] [PubMed]
  6. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef] [PubMed]
  7. Wang, D.; Ren, P.; Du, Q.; Sun, L.; Wang, Y. Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks. Sensors 2016, 16, 1998. [Google Scholar] [CrossRef] [PubMed]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.