sensors-logo

Journal Browser

Journal Browser

Special Issue "Recent Trends in Wireless Sensor and Actuator Networks"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 30 March 2022.

Special Issue Editors

Dr. Mohammed Amin Almaiah
E-Mail Website
Guest Editor
Department of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi Arabia
Interests: mobile and wireless networks; cybersecurity and network security
Special Issues, Collections and Topics in MDPI journals
Dr. Omar Almomani
E-Mail Website
Guest Editor
Department of Computer Network and Information Systems, The World Islamic Sciences and Education University, 11947 Amman, Jordan
Interests: computer networks; network security; mobile learning
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Yassine Maleh
E-Mail Website
Guest Editor
Cybersecurity and IT Governance, Sultan Moulay Slimane University, Beni Mellal 23000, Morroco
Interests: information security and privacy; Internet of Things; network security
Prof. Dr. Ahmad Al-Khasawneh
E-Mail Website
Guest Editor
Department of Computer Information System, Hashemite University, Zarqa 13133, Jordan
Interests: data science; e-business, e-commerce, e-governments and service learning; IS and software development process; networking management and grid computing; resource utilization and performance management; decision support systems; AI

Special Issue Information

Dear Colleagues,

WSANs are considered one of the main building blocks of the Internet of Things (IoT) and Industry 4.0 to create smart environments, cities, healthcare, etc. However, there are several challenges that need to be tackled to effectively deploy WSANs and provide reliable services such as dynamic and intelligent management of sensors and actuators, resource constraint nature of the network nodes, and seamless, robust, and secure communication between devices. This Special Issue aims to bring together scholars to discuss and present their latest research and findings on all aspects of WSANs. Wireless sensor networks (WSNs) comprise a wireless network of tiny devices that are equipped with sensors to monitor physical and environmental conditions. Such devices could interact with different actuators such as servos, motors, and drones and form a wireless sensor and actuator network (WSAN). WSANs could be used to collect information from the region of interest (e.g., environment, building structures, farms, the human body) and autonomously control the required aspects of the target.

Dr. Mohammed Amin Almaiah
Dr. Omar Almomani
Prof. Dr. Yassine Maleh
Prof. Dr. Ahmad Al-Khasawneh
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless sensor networks
  • Cybersecurity
  • Internet of Things (IOT)
  • Sensors and actuators
  • Smart wireless networks
  • Industry 4.0

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network
Sensors 2022, 22(2), 572; https://doi.org/10.3390/s22020572 - 12 Jan 2022
Viewed by 154
Abstract
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as [...] Read more.
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system. Full article
(This article belongs to the Special Issue Recent Trends in Wireless Sensor and Actuator Networks)
Show Figures

Figure 1

Article
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold
Sensors 2022, 22(1), 334; https://doi.org/10.3390/s22010334 - 03 Jan 2022
Viewed by 135
Abstract
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an [...] Read more.
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it. Full article
(This article belongs to the Special Issue Recent Trends in Wireless Sensor and Actuator Networks)
Show Figures

Figure 1

Article
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Sensors 2021, 21(24), 8206; https://doi.org/10.3390/s21248206 - 08 Dec 2021
Viewed by 477
Abstract
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important. To address these issues, the existing Conditional [...] Read more.
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important. To address these issues, the existing Conditional Privacy-Preserving Authentication (CPPA) schemes based on either public key infrastructure, group signature, or identity have been proposed. However, an attacker could impersonate an authenticated node in these schemes for broadcasting fake messages. Besides, none of these schemes have satisfactorily addressed the performance efficiency related to signing and verifying safety traffic-related messages. For resisting impersonation attacks and achieving better performance efficiency, a Secure and Efficient Conditional Privacy-Preserving Authentication (SE-CPPA) scheme is proposed in this paper. The proposed SE-CPPA scheme is based on the cryptographic hash function and bilinear pair cryptography for the signing and verifying of messages. Through security analysis and comparison, the proposed SE-CPPA scheme can accomplish security goals in terms of formal and informal analysis. More precisely, to resist impersonation attacks, the true identity of the vehicle stored in the tamper-proof device (TPD) is frequently updated, having a short period of validity. Since the MapToPoint hash function and a large number of cryptography operations are not employed, simulation results show that the proposed SE-CPPA scheme outperforms the existing schemes in terms of computation and communication costs. Finally, the proposed SE-CPPA scheme reduces the computation costs of signing the message and verifying the message by 99.95% and 35.93%, respectively. Meanwhile, the proposed SE-CPPA scheme reduces the communication costs of the message size by 27.3%. Full article
(This article belongs to the Special Issue Recent Trends in Wireless Sensor and Actuator Networks)
Show Figures

Figure 1

Back to TopTop