Security Issues in Sensor Networks

A special issue of Journal of Sensor and Actuator Networks (ISSN 2224-2708).

Deadline for manuscript submissions: closed (31 May 2015) | Viewed by 19850

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Telecommunications, Warsaw University of Technology, 15/19 Nowowiejska Str., 00-665 Warsaw, Poland
Interests: network security; mobile networks; cryptography; discrete chaotic cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Maria Curie-Skłodowska University, Institute of Computer Science, ul. Akademicka 9, 20-031 Lublin, Poland
Polish-Japanese Institute of Information Technology, ul.Koszykowa 86, 02-008 Warsaw, Poland
Interests: Information Security; Cryptology; Security Engineering; Cryptographic Protocols; Wireless Sensor Networks; Internet of Things; Security Economics; Security Metrics; Risk analysis

E-Mail Website
Guest Editor
LIMOS - UMR 6158, Campus des Cézeaux, Bâtiment ISIMA - Bureau F107 63173 Aubière cedex, France
Interests: security; cryptographic protocols; formal methods; verification; Wireless Sensor Networks; Privacy; e-voting; e-exam; e-auction

Special Issue Information

Dear Colleagues,

Wireless Sensor Networks that perform complicated data processing (collecting, storing, transforming and transmitting data) using hardware of constrained performance need specific protection methods that balance effectiveness of all functions of a sensor with the required security level. This special issue expects new results that improve different aspects of protection mechanisms for Sensor Networks in all spectra of their emerging applications. We especially encourage research papers in the following topics (other security-relevant topics are also invited):

  • Secure communication protocols for SN
  • Security of software-defined, cloud-based and other future sensor networks
  • Secure routing in WSN
  • Trust and reputation supporting SN security and reliability
  • Cryptography for SN (including lightweight cryptography), theoretical foundations, cryptographic primitives, and formal methods
  • Wireless and mobile privacy and anonymity; secure localization and location privacy
  • Secure applications of sensor networks (M2M, IoT, P2P, MANET, VANET, e-health, etc.)
  • Cryptographic protocols for SN (including RFID, NFC, etc.)
  • Entity authentication and key management in SN
  • Context-aware security solutions for SN
  • QoP models in SN, economics of security, green computing models
  • Attacks and defenses in SN: from formal models to practical solutions

Prof. Dr. Zbigniew Kotulski
Dr. Bogdan Ksiezopolski
Prof. Dr. Pascal Lafourcade
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

2964 KiB  
Article
Critical Infrastructure Surveillance Using Secure Wireless Sensor Networks
by Michael Niedermeier, Xiaobing He, Hermann De Meer, Carsten Buschmann, Klaus Hartmann, Benjamin Langmann, Michael Koch, Stefan Fischer and Dennis Pfisterer
J. Sens. Actuator Netw. 2015, 4(4), 336-370; https://doi.org/10.3390/jsan4040336 - 25 Nov 2015
Cited by 8 | Viewed by 10604
Abstract
In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on [...] Read more.
In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the communication level, as well as mechanisms that ensure the functional safety during its operation. While there are many theoretical approaches in various subdomains of WSNs—like network structures, communication protocols and security concepts—the construction, implementation and real-life application of these devices is still rare. This work deals with these aforementioned aspects, including all phases from concept-generation to operation of a secure wireless sensor network. While the key focus of this paper lies on the security and safety features of the WSN, the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described. Full article
(This article belongs to the Special Issue Security Issues in Sensor Networks)
Show Figures

Figure 1

226 KiB  
Article
Key Management in Wireless Sensor Networks
by Ismail Mansour, Gérard Chalhoub and Pascal Lafourcade
J. Sens. Actuator Netw. 2015, 4(3), 251-273; https://doi.org/10.3390/jsan4030251 - 7 Sep 2015
Cited by 17 | Viewed by 8277
Abstract
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on [...] Read more.
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances. Full article
(This article belongs to the Special Issue Security Issues in Sensor Networks)
Show Figures

Figure 1

Back to TopTop