sensors-logo

Journal Browser

Journal Browser

Special Issue "Cryptography and Information Security in Wireless Sensor Networks"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 31 January 2021.

Special Issue Editors

Dr. Alberto Peinado Domínguez
Website
Guest Editor
Department of Communications Engineering, University of Málaga, 29071 Málaga, Spain
Interests: cryptography; RFID security; wireless sensor networks and IoT Security; pseudo-random bit generators; lightweight cryptography
Dr. Angel Martín-del-Rey
Website
Guest Editor
Institute of Fundamental Physics and Mathematics, Department of Applied Mathematics, University of Salamanca, 37008 Salamanca, Spain
Interests: cryptography; mathematical modeling; wireless sensor network security
Special Issues and Collections in MDPI journals
Dr. Luis Hernández-Encinas
Website
Guest Editor
Institute of Physical and Information Technologies, Spanish National Research Council, C/ Serrano 144, 28006-Madrid, Spain
Interests: asymmetric cryptography; continuous authentication; lightweight cryptography; pseudo-random bit generators; sensor-based user profiling; security in IoT devices
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless sensor networks (WSN) traditionally refer to a set of hundreds or thousands of devices with the ability to monitor certain physical parameters and send them cooperatively to a main node, the sink, which acts as an interface with the rest of the world. The diversity of services, applications, and devices applied in WSN has increased considerably in recent times, resulting in an increase of security requirements, threats, and weaknesses. Cryptographic primitives and algorithms and information security protocols are being proposed as solutions in many different environments, from the most classical, such as stream ciphers, authentication mechanisms or key distribution schemes, to the most recent ones, such as critical infrastructure protection, epidemic models for malware, jamming, and cyber-attack propagation, the application of artificial intelligence, etc.

This Special Issue focuses on cryptographic applications and information security protocols, algorithms, and systems for wireless sensor networks. We welcome original research contributions and state-of-the-art reviews from academia and industry. The Special Issue topics include but are not limited to:

  • Symmetric-key systems (stream ciphers, block ciphers) in WSN;
  • Asymmetric-key systems in WSN;
  • Cryptanalysis in WSN;
  • Key distribution schemes and authentication in WSN;
  • Epidemic models applied to WSN (malware, jamming, cyber-attack propagation);
  • Physical-layer security in WSN;
  • Security in IoT devices;
  • Information security in WSN;
  • Lightweight cryptography;
  • Sensor-based user profiling and continuous authentication.
Dr. Alberto Peinado Domínguez
Dr. Angel Martín-del-Rey
Dr. Luis Hernández-Encinas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless sensor networks
  • Cryptography
  • Cryptanalysis
  • Key management and authentication
  • Cybersecurity
  • Propagation attacks
  • Physical-layer security
  • Security in IoT devices
  • Information security
  • Lightweight cryptography

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
Sensors 2020, 20(13), 3788; https://doi.org/10.3390/s20133788 - 06 Jul 2020
Abstract
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To achieve high-speed implementation, primitive operations, including rotation operation, a substitute layer, and a diffusion layer, are carefully optimized for [...] Read more.
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To achieve high-speed implementation, primitive operations, including rotation operation, a substitute layer, and a diffusion layer, are carefully optimized for the target low-end embedded processor. The proposed ARIA implementation supports the electronic codebook (ECB) and the counter (CTR) modes of operation. In particular, the CTR mode of operation is further optimized with the pre-computed table of two add-round-key, one substitute layer, and one diffusion layer operations. Finally, the proposed ARIA-CTR implementations on 8-bit AVR microcontrollers achieved 187.1, 216.8, and 246.6 clock cycles per byte for 128-bit, 192-bit, and 256-bit security levels, respectively. Compared with previous reference implementations, the execution timing is improved by 69.8%, 69.6%, and 69.5% for 128-bit, 192-bit, and 256-bit security levels, respectively. Full article
(This article belongs to the Special Issue Cryptography and Information Security in Wireless Sensor Networks)
Show Figures

Figure 1

Back to TopTop