sensors-logo

Journal Browser

Journal Browser

Security, Privacy and Trust in Wireless Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 30 June 2025 | Viewed by 1946

Special Issue Editors


E-Mail Website
Guest Editor
Science and Technology on Micro-System Laboratory, Shanghai Institute of Micro-System and Information Technology, Chinese Academy of Sciences, Shanghai 201800, China
Interests: clean energy; smart grid; Internet of Things; cyber security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
SUSTech Institute of Future Networks, Southern University of Science and Technology, Shenzhen 518055, China
Interests: Internet of Things; wireless sensor networks; cloud computing; big data; social networks and security
Special Issues, Collections and Topics in MDPI journals
Department of Supply Chain and Information Management, The Hang Seng University of Hong Kong, Hong Kong
Interests: IIoT; digital transformation; trust management; cloud security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless Sensor Network (WSN) serves as a pivotal component of the Internet of Things (IoT), extensively deploy across domains such as intelligent manufacturing, smart healthcare, and industrial automation. WSN typically consists of numerous low-power, resource-constrained sensor nodes that communicate wirelessly to sense and transmit real-time monitoring information. However, the distributed nature, resource limitations, and open wireless communication channels of WSN render them susceptible to a variety of security threats, including unauthorized access, data leakage, and malicious attacks. As WSN become increasingly integrated with IoT and edge computing technologies, ensuring data privacy, network trust, and system security becomes more important and complex. This special issue aims to solicit the latest research results and innovative solutions related to the security, privacy, and trust of WSN. We invite researchers to submit original research articles and reviews that explore various mechanisms and methods for ensuring security, privacy, and trust in WSN environments.

  • Distributed Authentication and Key Management in WSNs
  • Decentralized Access Control in WSNs
  • Lightweight Cryptographicand Privacy-Enhancing Technologies
  • Privacy and Trust-Aware Collaborative Computingin WSNs
  • End-to-End Trust Management Mechanisms in WSNs
  • Security and Trust Assurance Strategies for Real-Time Data Transmission
  • Real-Time Malware and Intrusion Detection in Dynamic Node Networks
  • Blockchain-Based Solutions for Data Integrity and Privacy Protection
  • Security and Trust Optimization in Resource-Constrained Environments
  • Applications and Researchesof Distributed Artificial Intelligence for Privacy, Security, and Trust in WSNs

Submission Guidelines: Authors are invited to submit original research papers, review articles, or case studies that are not currently under review elsewhere. All submissions will undergo rigorous peer review to ensure high academic standards and relevance to the special issue theme.

Dr. Weidong Fang
Dr. Chunsheng Zhu
Dr. C. H. Wu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • wireless sensor network
  • internet of things
  • edge computing
  • cyber security
  • privacy preservation
  • trust

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 1143 KiB  
Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by Muhammet A. Sen, Saba Al-Rubaye and Antonios Tsourdos
Sensors 2025, 25(4), 1194; https://doi.org/10.3390/s25041194 - 15 Feb 2025
Cited by 1 | Viewed by 700
Abstract
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication [...] Read more.
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication against cyber threats, considering both intra-UAV and UAV–ground station interactions in the scope of the Flying Ad Hoc Networks (FANETs). To leverage the advancements in security methodologies, particularly focusing on Physical Unclonable Functions (PUFs), this paper proposes a novel authentication framework tailored for UAV networking systems. Investigating the existing literature, we categorize related studies into authentication strategies, illuminating the evolving landscape of UAV security. The proposed framework demonstrated a high level of security with lower communication and computation costs in comparison with selected studies with similar types of attacks. This paper highlights the urgent need for strong security measures to mitigate the increasing threats that UAVs encounter and ensure their sustained effectiveness in a variety of applications. The results indicate that the proposed protocol is sufficiently secure and, in terms of communication cost, achieves an 18% improvement compared to the best protocol in the referenced studies. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)
Show Figures

Figure 1

25 pages, 14623 KiB  
Article
Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks
by Ching-Nung Yang, Ting-Song Gu, Jhou-Cian You and Chang-Ji Wang
Sensors 2025, 25(1), 86; https://doi.org/10.3390/s25010086 - 26 Dec 2024
Viewed by 789
Abstract
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like [...] Read more.
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime. For large-scale wireless sensor networks, a more common approach is to use a multiple-sink WSN (MWSN) to support a large number of sensor nodes. In MWSNs, there are different clusters (referred to as groups). We took the lead in studying KP in the MWSN environment. Based on the new MWSN environment, we present intragroup and intergroup KP (I2KP) to fulfill both requirements of security and energy efficiency when gathering data via various sink nodes in a large-scale WSN. Three types of I2KP with respective pros and cons are proposed. Theoretical analysis and numerical simulation demonstrate their effectiveness. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)
Show Figures

Figure 1

Back to TopTop