Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (380)

Search Parameters:
Keywords = WSNs security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 1535 KB  
Article
Probabilistic Bit-Similarity-Based Key Agreement Protocol Employing Fuzzy Extraction for Secure and Lightweight Wireless Sensor Networks
by Sofia Sakka, Vasiliki Liagkou, Yannis Stamatiou and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 22; https://doi.org/10.3390/jcp6010022 - 22 Jan 2026
Abstract
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless [...] Read more.
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless network for further delivery to external users. Due to wireless communication, the transmitted messages may be intercepted, rerouted, or even modified by an attacker. Consequently, security and privacy issues are of utmost importance, and the nodes must be protected against unauthorized access during transmission over a public wireless channel. To address these issues, we propose the Probabilistic Bit-Similarity-Based Key Agreement Protocol (PBS-KAP). This novel method enables two nodes to iteratively converge on a shared secret key without transmitting it or relying on pre-installed keys. PBS-KAP enables two nodes to agree on a symmetric session key using probabilistic similarity alignment with explicit key confirmation (MAC). Optimized Garbled Circuits facilitate secure computation with minimal computational and communication overhead, while Secure Sketches combined with Fuzzy Extractors correct residual errors and amplify entropy  producing reliable and uniformly random session keys. The resulting protocol provides a balance between security, privacy, and usability, standing as a practical solution for real-world WSN and IoT applications without imposing excessive computational or communication burdens. Security relies on standard computational assumptions via a one-time elliptic–curve–based base Oblivious Transfer, followed by an IKNP Oblivious Transfer extension and a small garbled threshold circuit. No pre-deployed long-term keys are required. After the bootstrap, only symmetric operations are used. We analyze confidentiality in the semi-honest model. However, entity authentication, though feasible, requires an additional Authenticated Key Exchange step or malicious-secure OT/GC. Under the semi-honest OT/GC assumption, we prove session-key secrecy/indistinguishability; full entity authentication requires an additional AKE binding step or malicious-secure OT/GC.  Full article
(This article belongs to the Special Issue Data Protection and Privacy)
23 pages, 3750 KB  
Article
Lightweight Frame Format for Interoperability in Wireless Sensor Networks of IoT-Based Smart Systems
by Samer Jaloudi
Future Internet 2026, 18(1), 33; https://doi.org/10.3390/fi18010033 - 7 Jan 2026
Viewed by 201
Abstract
Applications of smart cities, smart buildings, smart agriculture systems, smart grids, and other smart systems benefit from Internet of Things (IoT) protocols, networks, and architecture. Wireless Sensor Networks (WSNs) in smart systems that employ IoT use wireless communication technologies between sensors in the [...] Read more.
Applications of smart cities, smart buildings, smart agriculture systems, smart grids, and other smart systems benefit from Internet of Things (IoT) protocols, networks, and architecture. Wireless Sensor Networks (WSNs) in smart systems that employ IoT use wireless communication technologies between sensors in the Things layer and the Fog layer hub. Such wireless protocols and networks include WiFi, Bluetooth, and Zigbee, among others. However, the payload formats of these protocols are heterogeneous, and thus, they lack a unified frame format that ensures interoperability. In this paper, a lightweight, interoperable frame format for low-rate, small-size Wireless Sensor Networks (WSNs) in IoT-based systems is designed, implemented, and tested. The practicality of this system is underscored by the development of a gateway that transfers collected data from sensors that use the unified frame to online servers via message queuing and telemetry transport (MQTT) secured with transport layer security (TLS), ensuring interoperability using the JavaScript Object Notation (JSON) format. The proposed frame is tested using market-available technologies such as Bluetooth and Zigbee, and then applied to smart home applications. The smart home scenario is chosen because it encompasses various smart subsystems, such as healthcare monitoring systems, energy monitoring systems, and entertainment systems, among others. The proposed system offers several advantages, including a low-cost architecture, ease of setup, improved interoperability, high flexibility, and a lightweight frame that can be applied to other wireless-based smart systems and applications. Full article
(This article belongs to the Special Issue Wireless Sensor Networks and Internet of Things)
Show Figures

Graphical abstract

12 pages, 1642 KB  
Article
Polarization-Shift Backscatter Identification for SWIPT-Based Battery-Free Sensor Nodes
by Taki E. Djidjekh and Alexandru Takacs
Electronics 2026, 15(1), 186; https://doi.org/10.3390/electronics15010186 - 31 Dec 2025
Viewed by 245
Abstract
Battery-Free Sensor Nodes (BFSNs) used in Simultaneous Wireless Information and Power Transfer (SWIPT) systems often rely on lightweight communication protocols with minimal security overhead due to strict energy constraints. As a result, conventional protocol-dependent security mechanisms cannot be employed, leaving BFSNs vulnerable to [...] Read more.
Battery-Free Sensor Nodes (BFSNs) used in Simultaneous Wireless Information and Power Transfer (SWIPT) systems often rely on lightweight communication protocols with minimal security overhead due to strict energy constraints. As a result, conventional protocol-dependent security mechanisms cannot be employed, leaving BFSNs vulnerable to replay, spoofing, and other security threats. This paper explores a protocol-independent security mechanism that enhances BFSN security by exploiting the power wave for controlled backscattering. The method introduces a Manchester-encoded digital private key generated by the BFSN’s low-power microcontroller and backscattered through a polarization-shifting module enabled by a fail-safe RF switch, thereby avoiding the need for a dedicated backscattering rectifier. A LoRaWAN-based BFSN integrating this add-on module was implemented to experimentally validate the approach. Results show successful extraction of the backscattered key with minimal energy overhead (approximately 95 µJ for a 3 ms identification sequence), while the original high-efficiency RF rectifier used for harvesting remains unmodified. The orthogonal polarization between the incoming and backscattered waves additionally reduces clutter and cross-jamming effects. These findings demonstrate that secure identification can be seamlessly incorporated into existing BFSNs without altering their core architecture, offering an easy-to-integrate and energy-efficient solution for improving security in SWIPT-based sensing systems. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

16 pages, 640 KB  
Systematic Review
A Systematic Review of Building Energy Management Systems (BEMSs): Sensors, IoT, and AI Integration
by Leyla Akbulut, Kubilay Taşdelen, Atılgan Atılgan, Mateusz Malinowski, Ahmet Coşgun, Ramazan Şenol, Adem Akbulut and Agnieszka Petryk
Energies 2025, 18(24), 6522; https://doi.org/10.3390/en18246522 - 12 Dec 2025
Viewed by 937
Abstract
The escalating global demand for energy-efficient and sustainable built environments has catalyzed the advancement of Building Energy Management Systems (BEMSs), particularly through their integration with cutting-edge technologies. This review presents a comprehensive and critical synthesis of the convergence between BEMSs and enabling tools [...] Read more.
The escalating global demand for energy-efficient and sustainable built environments has catalyzed the advancement of Building Energy Management Systems (BEMSs), particularly through their integration with cutting-edge technologies. This review presents a comprehensive and critical synthesis of the convergence between BEMSs and enabling tools such as the Internet of Things (IoT), wireless sensor networks (WSNs), and artificial intelligence (AI)-based decision-making architectures. Drawing upon 89 peer-reviewed publications spanning from 2019 to 2025, the study systematically categorizes recent developments in HVAC optimization, occupancy-driven lighting control, predictive maintenance, and fault detection systems. It further investigates the role of communication protocols (e.g., ZigBee, LoRaWAN), machine learning-based energy forecasting, and multi-agent control mechanisms within residential, commercial, and institutional building contexts. Findings across multiple case studies indicate that hybrid AI–IoT systems have achieved energy efficiency improvements ranging from 20% to 40%, depending on building typology and control granularity. Nevertheless, the widespread adoption of such intelligent BEMSs is hindered by critical challenges, including data security vulnerabilities, lack of standardized interoperability frameworks, and the complexity of integrating heterogeneous legacy infrastructure. Additionally, there remain pronounced gaps in the literature related to real-time adaptive control strategies, trust-aware federated learning, and seamless interoperability with smart grid platforms. By offering a rigorous and forward-looking review of current technologies and implementation barriers, this paper aims to serve as a strategic roadmap for researchers, system designers, and policymakers seeking to deploy the next generation of intelligent, sustainable, and scalable building energy management solutions. Full article
Show Figures

Figure 1

24 pages, 2143 KB  
Article
Symmetry-Aided Active RIS for Physical Layer Security in WSN-Integrated Cognitive Radio Networks: Green Interference Regulation and Joint Beamforming Optimization
by Yixuan Wu
Symmetry 2025, 17(12), 2047; https://doi.org/10.3390/sym17122047 - 1 Dec 2025
Viewed by 288
Abstract
Driven by 5G/6G and the Internet of Things (IoT), wireless sensor networks (WSNs) are confronted with core challenges such as limited energy constraints, unbalanced resource allocation, and security vulnerabilities. To address these, WSNs are integrated with cognitive radio networks (CRNs) to alleviate spectrum [...] Read more.
Driven by 5G/6G and the Internet of Things (IoT), wireless sensor networks (WSNs) are confronted with core challenges such as limited energy constraints, unbalanced resource allocation, and security vulnerabilities. To address these, WSNs are integrated with cognitive radio networks (CRNs) to alleviate spectrum scarcity, and reconfigurable intelligent surfaces (RIS) are adopted to enhance performance, but traditional passive RIS suffers from “double fading” (signal path loss from transmitter to RIS and RIS to receiver), which undermines WSNs’ energy efficiency and the physical layer security (PLS) (e.g., secrecy rate, SR) of primary users (PUs) in CRNs. This study leverages symmetry to develop an active RIS framework for WSN-integrated CRNs, constructing a tripartite collaborative model where symmetric beamforming and resource allocation improve WSN connectivity, reduce energy consumption, and strengthen PLS. Specifically, three symmetry types—resource allocation symmetry, beamforming structure symmetry, and RIS reflection matrix symmetry—are formalized mathematically. These symmetries reduce the degrees of freedom in optimization (e.g., cutting precoding complexity by ~50%) and enhance the directionality of green interference, while ensuring balanced resource use for WSN nodes. The core objective is to minimize total transmit power while satisfying constraints of PU SR, secondary user (SU) quality-of-service (QoS), and PU interference temperature, achieved by converting non-convex SR constraints into solvable second-order cone (SOC) forms and using an alternating optimization algorithm to iteratively refine CBS/PBS precoding matrices and active RIS reflection matrices, with active RIS generating directional “green interference” to suppress eavesdroppers without artificial noise, avoiding redundant energy use. Simulations validate its adaptability to WSN scenarios: 50% lower transmit power than RIS-free schemes (with four CBS antennas), 37.5–40% power savings as active RIS elements increase to 60, and a 40% lower power growth slope in multi-user WSN scenarios, providing a symmetry-aided, low-power solution for secure and efficient WSN-integrated CRNs to advance intelligent WSNs. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Wireless Sensor Networks)
Show Figures

Figure 1

21 pages, 447 KB  
Article
Enhancing Intrusion Detection for IoT and Sensor Networks Through Semantic Analysis and Self-Supervised Embeddings
by Yanshen Liu and Yinfeng Guo
Sensors 2025, 25(22), 7074; https://doi.org/10.3390/s25227074 - 20 Nov 2025
Viewed by 930
Abstract
As cyber threats continue to grow in complexity and sophistication, the need for advanced network and sensor security solutions has never been more urgent. Traditional intrusion detection methods struggle to keep pace with the sheer volume of network traffic and the evolving nature [...] Read more.
As cyber threats continue to grow in complexity and sophistication, the need for advanced network and sensor security solutions has never been more urgent. Traditional intrusion detection methods struggle to keep pace with the sheer volume of network traffic and the evolving nature of attacks. In this paper, we propose a novel machine learning-driven Intrusion Detection System (IDS) that improves intrusion detection through a comprehensive analysis of multidimensional data. Transcending traditional feature extraction methods, the system introduces geospatial context features and self-supervised semantic features that provide rich contextual information for enhanced threat identification. The system’s performance is validated on a carefully curated dataset from China Mobile, containing over 100 K records, achieving an impressive 98.5% accuracy rate in detecting intrusions. The results highlight the effectiveness of ensemble learning methods and underscore the system’s potential for real-world deployment, offering a significant advancement in the development of intelligent cybersecurity tools that can adapt to the ever-changing landscape of cyber threats. Furthermore, the proposed framework is extensible to IoT and wireless sensor networks (WSNs), where resource constraints and new attack surfaces demand lightweight yet semantically enriched IDS solutions. Full article
(This article belongs to the Special Issue Sensor Networks and Communication with AI)
Show Figures

Figure 1

2 pages, 278 KB  
Correction
Correction: Osamy et al. Recent Advances and Future Prospects of Using AI Solutions for Security, Fault Tolerance, and QoS Challenges in WSNs. Electronics 2022, 11, 4122
by Walid Osamy, Ahmed M. Khedr, Ahmed Salim, Ahmed A. El-Sawy, Mohammed Alreshoodi and Ibrahim Alsukayti
Electronics 2025, 14(22), 4440; https://doi.org/10.3390/electronics14224440 - 14 Nov 2025
Viewed by 212
Abstract
In the original publication [...] Full article
Show Figures

Figure 3

37 pages, 4435 KB  
Article
Federated Reinforcement Learning with Hybrid Optimization for Secure and Reliable Data Transmission in Wireless Sensor Networks (WSNs)
by Seyed Salar Sefati, Seyedeh Tina Sefati, Saqib Nazir, Roya Zareh Farkhady and Serban Georgica Obreja
Mathematics 2025, 13(19), 3196; https://doi.org/10.3390/math13193196 - 6 Oct 2025
Viewed by 1120
Abstract
Wireless Sensor Networks (WSNs) consist of numerous battery-powered sensor nodes that operate with limited energy, computation, and communication capabilities. Designing routing strategies that are both energy-efficient and attack-resilient is essential for extending network lifetime and ensuring secure data delivery. This paper proposes Adaptive [...] Read more.
Wireless Sensor Networks (WSNs) consist of numerous battery-powered sensor nodes that operate with limited energy, computation, and communication capabilities. Designing routing strategies that are both energy-efficient and attack-resilient is essential for extending network lifetime and ensuring secure data delivery. This paper proposes Adaptive Federated Reinforcement Learning-Hunger Games Search (AFRL-HGS), a Hybrid Routing framework that integrates multiple advanced techniques. At the node level, tabular Q-learning enables each sensor node to act as a reinforcement learning agent, making next-hop decisions based on discretized state features such as residual energy, distance to sink, congestion, path quality, and security. At the network level, Federated Reinforcement Learning (FRL) allows the sink node to aggregate local Q-tables using adaptive, energy- and performance-weighted contributions, with Polyak-based blending to preserve stability. The binary Hunger Games Search (HGS) metaheuristic initializes Cluster Head (CH) selection and routing, providing a well-structured topology that accelerates convergence. Security is enforced as a constraint through a lightweight trust and anomaly detection module, which fuses reliability estimates with residual-based anomaly detection using Exponentially Weighted Moving Average (EWMA) on Round-Trip Time (RTT) and loss metrics. The framework further incorporates energy-accounted control plane operations with dual-format HELLO and hierarchical ADVERTISE/Service-ADVERTISE (SrvADVERTISE) messages to maintain the routing tables. Evaluation is performed in a hybrid testbed using the Graphical Network Simulator-3 (GNS3) for large-scale simulation and Kali Linux for live adversarial traffic injection, ensuring both reproducibility and realism. The proposed AFRL-HGS framework offers a scalable, secure, and energy-efficient routing solution for next-generation WSN deployments. Full article
Show Figures

Figure 1

20 pages, 1176 KB  
Article
QSEER-Quantum-Enhanced Secure and Energy-Efficient Routing Protocol for Wireless Sensor Networks (WSNs)
by Chindiyababy Uthayakumar, Ramkumar Jayaraman, Hadi A. Raja and Noman Shabbir
Sensors 2025, 25(18), 5924; https://doi.org/10.3390/s25185924 - 22 Sep 2025
Cited by 1 | Viewed by 1004
Abstract
Wireless sensor networks (WSNs) play a major role in various applications, but the main challenge is to maintain security and balanced energy efficiency. Classical routing protocols struggle to achieve both energy efficiency and security because they are more vulnerable to security risks and [...] Read more.
Wireless sensor networks (WSNs) play a major role in various applications, but the main challenge is to maintain security and balanced energy efficiency. Classical routing protocols struggle to achieve both energy efficiency and security because they are more vulnerable to security risks and resource limitations. This paper introduces QSEER, a novel approach that uses quantum technologies to overcome these limitations. QSEER employs quantum-inspired optimization algorithms that leverage superposition and entanglement principles to efficiently explore multiple routing possibilities, thereby identifying energy-efficient paths and reducing redundant transmissions. The proposed protocol enhances the security of data transmission against eavesdropping and tampering by using the principles of quantum mechanics, thus mitigating potential security vulnerabilities. Through extensive simulations, we demonstrated the effectiveness of QSEER in achieving both security and energy efficiency objectives, which achieves 15.1% lower energy consumption compared to state-of-the-art protocols while maintaining 99.8% data integrity under various attack scenarios, extending network lifetime by an average of 42%. These results position QSEER as a significant advancement for next-generation WSN deployments in critical applications such as environmental monitoring, smart infrastructure, and healthcare systems. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

30 pages, 5146 KB  
Article
A Routing Method for Extending Network Lifetime in Wireless Sensor Networks Using Improved PSO
by Zhila Mohammadian, Seyyed Hossein Hosseini Nejad, Asghar Charmin, Saeed Barghandan and Mohsen Ebadpour
Appl. Sci. 2025, 15(18), 10236; https://doi.org/10.3390/app151810236 - 19 Sep 2025
Viewed by 962
Abstract
WSNs consist of numerous energy-constrained Sensor Nodes (SNs), making energy efficiency a critical challenge. This paper presents a novel multipath routing model designed to enhance network lifetime by simultaneously optimizing energy consumption, node connectivity, and transmission distance. The model employs an Improved Particle [...] Read more.
WSNs consist of numerous energy-constrained Sensor Nodes (SNs), making energy efficiency a critical challenge. This paper presents a novel multipath routing model designed to enhance network lifetime by simultaneously optimizing energy consumption, node connectivity, and transmission distance. The model employs an Improved Particle Swarm Optimization (IPSO) algorithm to dynamically determine the optimal weight coefficients of a cost function that integrates three parameters: residual energy, link reliability, and buffer capacity. A compressed Bloom filter is incorporated to improve packet transmission efficiency and reduce error rates. Simulation experiments conducted in the NS2 environment show that the proposed approach significantly outperforms existing protocols, including Reinforcement Learning Q-Routing Protocol (RL-QRP), Low Energy Adaptive Clustering Hierarchical (LEACH), On-Demand Distance Vector (AODV), Secure and Energy-Efficient Multipath (SEEM), and Energy Density On-demand Cluster Routing (EDOCR), achieving a 7.45% reduction in energy consumption and maintaining a higher number of active nodes over time. Notably, the model sustains 19 live nodes at round 800, whereas LEACH and APTEEN experience complete node depletion by that point. This adaptive, energy-aware routing strategy improves reliability, prolongs operational lifespan, and enhances load balancing, making it a promising solution for real-world WSN applications. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

11 pages, 651 KB  
Article
Efficient and Low-Cost Modular Polynomial Multiplier for WSN Security
by Fariha Haroon and Hua Li
J. Sens. Actuator Netw. 2025, 14(5), 86; https://doi.org/10.3390/jsan14050086 - 25 Aug 2025
Viewed by 1180
Abstract
Wireless Sensor Network (WSN) technology has constrained computing resources that require efficient and low-cost cryptographic hardware to provide security services, particularly when dealing with large modular polynomial multiplication in cryptography. In this paper, a cost-efficient reconfigurable Karatsuba modular polynomial multiplier is proposed for [...] Read more.
Wireless Sensor Network (WSN) technology has constrained computing resources that require efficient and low-cost cryptographic hardware to provide security services, particularly when dealing with large modular polynomial multiplication in cryptography. In this paper, a cost-efficient reconfigurable Karatsuba modular polynomial multiplier is proposed for general modulus polynomials. The modulus polynomial can be changed easily depending on the application. The proposed modular polynomial multiplier is synthesized and simulated by the AMD Vivado Design Tool. The design’s performance on ADP (Area Delay Product) has been improved compared to previous designs. It can be applied in ECC encryption to speed up the security services in WSN. Full article
Show Figures

Figure 1

21 pages, 5386 KB  
Article
Performance Evaluation of ChaosFortress Lightweight Cryptographic Algorithm for Data Security in Water and Other Utility Management
by Rohit Raphael, Ranjan Sarukkalige, Sridharakumar Narasimhan and Himanshu Agrawal
Sensors 2025, 25(16), 5103; https://doi.org/10.3390/s25165103 - 17 Aug 2025
Cited by 1 | Viewed by 1542
Abstract
The Internet of Things (IoT) has become an integral part of today’s smart and digitally connected world. IoT devices and technologies now connect almost every aspect of daily life, generating, storing, and analysing vast amounts of data. One important use of IoT is [...] Read more.
The Internet of Things (IoT) has become an integral part of today’s smart and digitally connected world. IoT devices and technologies now connect almost every aspect of daily life, generating, storing, and analysing vast amounts of data. One important use of IoT is in utility management, where essential services such as water are supplied through IoT-enabled infrastructure to ensure fair, efficient, and sustainable delivery. The large volumes of data produced by water distribution networks must be safeguarded against manipulation, theft, and other malicious activities. Incidents such as the Queensland user data breach (2020–21), the Oldsmar water treatment plant attack (2021), and the Texas water system overflow (2024) show that attacks on water treatment plants, distribution networks, and supply infrastructure are common in Australia and worldwide, often due to inadequate security measures and limited technical resources. Lightweight cryptographic algorithms are particularly valuable in this context, as they are well-suited for resource-constrained hardware commonly used in IoT systems. This study focuses on the in-house developed ChaosFortress lightweight cryptographic algorithm, comparing its performance with other widely used lightweight cryptographic algorithms. The evaluation and comparative testing used an Arduino and a LoRa-based transmitter/receiver pair, along with the NIST Statistical Test Suite (STS). These tests assessed the performance of ChaosFortress against popular lightweight cryptographic algorithms, including ACORN, Ascon, ChaChaPoly, Speck, tinyAES, and tinyECC. ChaosFortress was equal in performance to the other algorithms in overall memory management but outperformed five of the six in execution speed. ChaosFortress achieved the quickest transmission time and topped the NIST STS results, highlighting its strong suitability for IoT applications. Full article
Show Figures

Figure 1

26 pages, 571 KB  
Article
SHARP: Blockchain-Powered WSNs for Real-Time Student Health Monitoring and Personalized Learning
by Zeqiang Xie, Zijian Li and Xinbing Liu
Sensors 2025, 25(16), 4885; https://doi.org/10.3390/s25164885 - 8 Aug 2025
Cited by 3 | Viewed by 1415
Abstract
With the rapid advancement of the Internet of Things (IoT), artificial intelligence (AI), and blockchain technologies, educational research has increasingly explored smart and personalized learning systems. However, current approaches often suffer from fragmented integration of health monitoring and instructional adaptation, insufficient prediction accuracy [...] Read more.
With the rapid advancement of the Internet of Things (IoT), artificial intelligence (AI), and blockchain technologies, educational research has increasingly explored smart and personalized learning systems. However, current approaches often suffer from fragmented integration of health monitoring and instructional adaptation, insufficient prediction accuracy of physiological states, and unresolved concerns regarding data privacy and security. To address these challenges, this study introduces SHARP, a novel blockchain-enhanced wireless sensor networks (WSNs) framework designed for real-time student health monitoring and personalized learning in smart educational environments. Wearable sensors enable continuous collection of physiological data, including heart rate variability, body temperature, and stress indicators. A deep neural network (DNN) processes these inputs to detect students’ physical and affective states, while a reinforcement learning (RL) algorithm dynamically generates individualised educational recommendations. A Proof-of-Authority (PoA) blockchain ensures secure, immutable, and transparent data management. Preliminary evaluations in simulated smart classrooms demonstrate significant improvements: the DNN achieves a 94.2% F1-score in state recognition, the RL module reduces critical event response latency, and energy efficiency improves by 23.5% compared to conventional baselines. Notably, intervention groups exhibit a 156% improvement in quiz scores over control groups. Compared to existing solutions, SHARP uniquely integrates multi-sensor physiological monitoring, real-time AI-based personalization, and blockchain-secured data governance in a unified framework. This results in superior accuracy, higher energy efficiency, and enhanced data integrity compared to prior IoT-based educational platforms. By combining intelligent sensing, adaptive analytics, and secure storage, SHARP offers a scalable and privacy-preserving solution for next-generation smart education. Full article
(This article belongs to the Special Issue Sensor-Based Recommender System for Smart Education and Smart Living)
Show Figures

Figure 1

33 pages, 3472 KB  
Article
Real-Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks
by Tamara Zhukabayeva, Lazzat Zholshiyeva, Yerik Mardenov, Atdhe Buja, Shafiullah Khan and Noha Alnazzawi
Technologies 2025, 13(8), 348; https://doi.org/10.3390/technologies13080348 - 7 Aug 2025
Cited by 2 | Viewed by 1976
Abstract
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems. Security threats emerge in these systems through hidden routing-level attacks such [...] Read more.
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems. Security threats emerge in these systems through hidden routing-level attacks such as Wormhole and Sinkhole attacks. The aim of this research was to develop a methodology for detecting security incidents in WSNs by conducting real-time analysis of Wormhole and Sinkhole attacks. Furthermore, the paper proposes a novel detection methodology combined with architectural enhancements to improve network robustness, measured by hop counts, delays, false data ratios, and route integrity. A real-time WSN infrastructure was developed using ZigBee and Global System for Mobile Communications/General Packet Radio Service (GSM/GPRS) technologies. To realistically simulate Wormhole and Sinkhole attack scenarios and conduct evaluations, we developed a modular cyber–physical architecture that supports real-time monitoring, repeatability, and integration of ZigBee- and GSM/GPRS-based attacker nodes. During the experimentation, Wormhole attacks caused the hop count to decrease from 4 to 3, while the average delay increased by 40%, and false sensor readings were introduced in over 30% of cases. Additionally, Sinkhole attacks led to a 27% increase in traffic concentration at the malicious node, disrupting load balancing and route integrity. The proposed multi-stage methodology includes data collection, preprocessing, anomaly detection using the 3-sigma rule, and risk-based decision making. Simulation results demonstrated that the methodology successfully detected route shortening, packet loss, and data manipulation in real time. Thus, the integration of anomaly-based detection with ZigBee and GSM/GPRS enables a timely response to security threats in critical WSN deployments. Full article
(This article belongs to the Special Issue New Technologies for Sensors)
Show Figures

Figure 1

28 pages, 1328 KB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 - 1 Aug 2025
Cited by 1 | Viewed by 3184
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

Back to TopTop