Next Article in Journal
Evaluation of a Commercial Device Based on Reflection Spectroscopy as an Alternative to Resonance Raman Spectroscopy in Measuring Skin Carotenoid Levels: Randomized Controlled Trial
Next Article in Special Issue
DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output
Previous Article in Journal
A Robot-Assisted Framework for Rehabilitation Practices: Implementation and Experimental Results
Previous Article in Special Issue
Evaluation of Correlation between Temperature of IoT Microcontroller Devices and Blockchain Energy Consumption in Wireless Sensor Networks
 
 
Article
Peer-Review Record

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks†

Sensors 2023, 23(17), 7653; https://doi.org/10.3390/s23177653
by Yosefine Triwidyastuti 1, Ridho Hendra Yoga Perdana 1, Kyusung Shim 2 and Beongku An 3,*
Reviewer 1:
Reviewer 2:
Reviewer 3: Anonymous
Sensors 2023, 23(17), 7653; https://doi.org/10.3390/s23177653
Submission received: 4 August 2023 / Revised: 29 August 2023 / Accepted: 30 August 2023 / Published: 4 September 2023

Round 1

Reviewer 1 Report

Please see the attached comments.

Comments for author File: Comments.pdf

Minor editing of English language is needed.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

In this paper, the authors explore eavesdropping vulnerabilities in wireless sensor networks. They introduced the Opportunistic Node Selection (ONS) scheme, to optimizes selection of nodes to minimize eavesdropping risks. They show the efficiency of ONS against both passive and active eavesdroppers, through an analysis of secrecy performance metrics, even though ONS comes with higher complexity.

I would give the following suggestion to the authors:

Expand on the real-world implications and applications of the research. Why is eavesdropping a concern in sensor networks? In which scenarios or industries is this most relevant? Given that the ONS scheme has higher complexity, it would be beneficial to provide a clearer breakdown or visualization of the trade-offs. For instance, how does the increased security weigh against the increased computational burden in real-world scenarios?

 I would also suggest the authors to clearly outline avenues for future research. This could be in the form of expanding the network size, considering different types of eavesdropping attacks, or integrating with other security mechanisms.

There are some inconsistencies with the references. Some references for conference papers include the phrase "In Proceedings of", while others just mention the conference. 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

In this paper, the authors aim to address the security problems of wireless sensor networks. The topic selected in this work is both interesting and of significant importance. While the academic writing meets expectations, the technical writing requires further refinement. During the review process, I have identified several points, which are detailed in the 'Points to the Authors' section.

·        The author is advised to manage the contribution points in the introduction section. Generally, they are mentioned in this part. So, this will improve the structure of the paper.

·        Why this work is important in presence of “DOI: 10.1109/ACCESS.2020.2978303”,  and doi.org/10.1016/j.adhoc.2016.10.007. In the revised paper, add these references and claim your contribution.

·        In figure 1, some of nodes are without their description. Please check for this, and explain in the paper, this will increase the reader interest in this work

·        Some of the notations are used without their description. At first use, define every symbol and notation.

·        What are the other possible applications where the proposed model can be implemented. If any is there update it in the paper.

 

English is fine and understandable 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The authors have well addressed all my concerns, no further comments.

Reviewer 3 Report

Thanks for addressing my previous round comments. At this point, I do not have further suggestion for the authors 

Back to TopTop