recent advances in security and privacy for wireless sensor networks … · 2019. 7. 30. · are...
TRANSCRIPT
-
EditorialRecent Advances in Security and Privacy forWireless Sensor Networks 2016
Fei Yu,1 Chin-Chen Chang,2 Jian Shu,3 Iftikhar Ahmad,4
Jun Zhang,5 and Jose Maria de Fuentes6
1Peoples’ Friendship University of Russia, Moscow, Russia2Feng Chia University, Taichung, Taiwan3Nanchang Hangkong University, Nanchang, China4King Saud University, Riyadh, Saudi Arabia5Deakin University, Melbourne, Australia6Universidad Carlos III de Madrid, Madrid, Spain
Correspondence should be addressed to Fei Yu; [email protected]
Received 8 February 2017; Accepted 8 February 2017; Published 23 February 2017
Copyright © 2017 Fei Yu et al. This is an open access article distributed under the Creative Commons Attribution License, whichpermits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless networks have experienced explosive growth duringthe last few years. Nowadays, there are a large variety ofnetworks spanning from the well-known cellular networksto noninfrastructure wireless networks such as mobile adhoc networks and sensor networks. Communication secu-rity is essential to the success of wireless sensor networkapplications, especially for thosemission-critical applicationsworking in unattended and even hostile environments. How-ever, providing satisfactory security protection in wirelesssensor networks has ever been a challenging task due tovarious network and resource constraints and maliciousattacks.
In this special issue, we concentrate mainly on securityand privacy as well as the emerging applications of wirelesssensor network. It aims to bring together researchers andpractitioners from wireless and sensor networking, security,cryptography, and distributed computing communities, withthe goal of promoting discussions and collaborations. Weare interested in novel research on all aspects of securityin wireless sensor networks and tradeoff between securityand performance such as QoS, dependability, and scalability.The special issue covers industrial issues/applications andacademic research into security and privacy for wirelesssensor networks.
This special issue includes a collection of 25 papersselected from 97 submissions to 21 countries or districts
(Australia, China, Croatia, France, India, Iraq, Jordan, Korea,Malaysia, Morocco, Oman, Pakistan, Poland, Russia, SaudiArabia, Spain, Taiwan, Tunisia, Turkey, UK, and USA).
In the paper entitled “Multitask Learning-Based SecurityEvent Forecast Methods for Wireless Sensor Networks,” H.He et al. propose a sensor network security event forecastmethod named Prediction Network Security IncompleteUnmarkedData (PNSIUD)method to forecastmissing attackdata in the target region according to the known partial datain similar regions.
In the paper entitled “Prediction Approach of CriticalNode Based on Multiple Attribute Decision Making forOpportunistic Sensor Networks” by Q. Chen et al., theconceptions of critical nodes, region contribution, and cut-vertex in multiregion OSN are defined; then an approach topredict critical node for OSN is proposed, which is based onmultiple attribute decision making (MADM).
The paper entitled “Information Security of PHY Layerin Wireless Networks” by W. Fang et al. firstly identifies andsummarizes the threats and vulnerabilities in PHY layer ofwireless networks. Then, we give a holistic overview of PHYlayer secure schemes, which are divided into three categories:spatial domain-based, time domain-based, and frequencydomain-based.
The paper entitled “Enhancing Energy Efficiency ofWire-less Sensor Network through the Design of Energy Efficient
HindawiJournal of SensorsVolume 2017, Article ID 3057534, 3 pageshttps://doi.org/10.1155/2017/3057534
https://doi.org/10.1155/2017/3057534
-
2 Journal of Sensors
Routing Protocol” by N. Zaman et al. proposes a new rout-ing protocol entitled “Position Responsive Routing Protocol(PRRP)” and compares its performance with the well-knownLEACH and CELRP protocols.The simulation results show asignificant improvement over the aforementioned protocolsin terms of energy efficiency and the overall performance ofthe WSN.
In the paper entitled “Study of Wireless AuthenticationCenter with Mixed Encryption in WSN,” Y. Lu et al. pro-pose a wireless authentication center with mixed encryptionnamed “MEWAC” according to shortcomings of the currentschemes. MEWAC has the advantages of low cost, low powerconsumption, good performance, and stability; moreover, theauthentication protocol improves the security of sensor nodesand reduces the overhead in node authentication.
The paper entitled “Multilevel Modeling of DistributedDenial of Service Attacks in Wireless Sensor Networks” byK. Mazur et al. proposes a model of a structural healthmonitoring network, being disturbed by one of the mostcommon types of DDoS attacks, the flooding attack.
The paper entitled “RESH: A Secure AuthenticationAlgorithm Based on Regeneration Encoding Self-HealingTechnology in WSN” by W. Liang et al. considers theregeneration encoding self-healing and secret sharing tech-niques and proposes an effective scheme to authenticate datain WSN. The data is encoded by regeneration codes andthen distributed to other redundant nodes in the form offragments.
In the paper entitled “Security Analysis and Improve-ments of Session Key Establishment for Clustered SensorNetworks” J. Kim et al. propose a session key establishmentscheme for clustered sensor networks that is based on ellipticcurve Diffie-Hellman (ECDH) key exchange and hash chain.The proposed scheme eliminates vulnerabilities of existingschemes for WSN and has improved security.
The paper entitled “Adaptive Cross-Layer MultipathRouting Protocol for Mobile Ad Hoc Networks” by Z. Iqbalet al. proposes a cross-layer multipath routing protocol forMANET. The proposed protocol has two important features,that is, security and adaptive nature.These important featuresare achieved by multipath framework using cross-layer inter-face.
The paper entitled “System forMalicious Node Detectionin IPv6-Based Wireless Sensor Networks” by K. Grgic et al.proposes a system for detecting malicious nodes in an IPv6-based WSN. The proposed system is designed for the IPv6environment and it supports the IPv6 stack in a WSN. Itis implemented into the sensor network that uses the IEEE802.15.4 standard and the 6LoWPAN adaptation layer.
The paper entitled “Disjoint Key Establishment ProtocolforWireless Sensor and Actor Networks” by A. Ghafoor et al.presents a Disjoint Key Establishment Protocol (DKEP) thatdoes not require transmitting keys across the nodes. InDKEP,each node is preloaded with one row and one column from amatrix.
The paper entitled “An Improved 𝜇TESLA ProtocolBased on Queuing Theory and Benaloh-Leichter SSS inWSNs” by H. Huang et al. proposes a novel secret key releasescheme based on the data flow, which addresses some
problems of traditional key release schemes based on thefixed time interval, effectively improves the efficiency of theutilization of keys, prolongs the life cycle of hash chain, andreduces the network communication overhead and computa-tional cost.
The paper entitled “AR-RBFS: Aware-Routing ProtocolBased on Recursive Best-First Search Algorithm for WirelessSensor Networks” by F. Kiani proposes the design of an AR-RBFS based routing protocol in two different scenarios onWSN. It is used to evaluate the power consumption andpacket delivery rate of wireless sensor nodes. The algorithmcomputes an optimized path to route the packets from thesink to the destination node.
In the paper entitled “A Novel Nonlinear Multitarget k-Degree Coverage Preservation Protocol in Wireless SensorNetworks” by Z. Sun et al., due to the existence of a largenumber of redundant data in the process of coveringmultipletargets, the effective coverage of monitored region decreases,causing the network to consume more energy. To solve thisproblem, this paper proposes a multitarget k-degree coveragepreservation protocol.
The paper entitled “Low Complexity Signed ResponseBased Sybil Attack Detection Mechanism in Wireless SensorNetworks” by M. S. and N. M. Khan proposes a low com-plexity sybil attack detection scheme that is based on signedresponse (SRES) authentication mechanism developed forGlobal System for Mobile (GSM) communications. A prob-abilistic model is presented which analyzes the proposedauthentication mechanism for its probability of sybil attack.
In the paper entitled “Routing Algorithm with UnevenClustering for Energy Heterogeneous Wireless Sensor Net-works” by Y. Zhang et al. in order to solve the problem of“hotspots” in sensor networks, a kind of routing algorithmnamed EDEUC based on energies and distances was pro-posed by using the idea of uneven clustering. This methodadopts double selection mechanism for cluster-heads andoptimizes the competition radius of cluster-heads.
The paper entitled “A Passenger Flow Risk ForecastingAlgorithm for High-Speed Railway Transport Hub Basedon Surveillance Sensor Networks” by Z. Xie and Y. Qinconsidered the passenger flow risk forecasting problem inhigh-speed railway transport hub. Based on the surveillancesensor networks, a passenger flow risk forecasting algorithmwas developed based on spatial correlation.
Thepaper entitled “R-bUCRP:ANovel Reputation-BasedUneven Clustering Routing Protocol for Cognitive WirelessSensor Networks” by M. Zhang et al. proposes a reputation-based uneven clustering routing protocol (R-bUCRP) consid-ering both energy saving and reputation assessment.
In the paper entitled “WDARS: A Weighted Data Aggre-gation Routing Strategy with Minimum Link Cost in Event-DrivenWSNs” by O. A. Mahdi et al., a comprehensive weightfor tradeoff between different objectives has been employed,the so-called weighted data aggregation routing strategy(WDARS) which aims to maximize the overlap routes forefficient data aggregation and link cost issues in cluster-basedWSNs simultaneously.
The paper entitled “Supporting Business Privacy Protec-tion inWireless SensorNetworks” byN. Feng et al. proposes a
-
Journal of Sensors 3
business privacy-protection system (BPS) that is modeled asa hierarchical profile in order to filter sensitive informationwith respect to enterprise-specified privacy requirements.The BPS is aimed at solving a tradeoff between metrics thatare defined to estimate the utility of information and thebusiness privacy risk.
The aim of the paper entitled “WSN-DS: A Dataset forIntrusionDetection Systems inWireless SensorNetworks” byI. Almomani et al. is to design an intelligent intrusion detec-tion and preventionmechanism that could work efficiently tolimit DoS attacks with reasonable cost in terms of processingand energy. To achieve this aim, a specialized dataset forWSNwas constructed to classify four types of DoS attacks.
In the paper entitled “A Lightweight Authentication andKey Management Scheme for Wireless Sensor Networks” byD. Qin et al., a lightweight authentication and key man-agement protocol AKMS have been proposed for wirelesssensor networks. It uses the symmetric cryptographic prim-itives with keyed-hash functions (HMAC) and bidirectionalencryption algorithm to provide message confidentiality andauthenticity for WSN and reduces the encryption overheadto the minimum as well with just a few bytes to be performedfor once per authentication attempt.
The paper entitled “Privacy Models in Wireless SensorNetworks: A Survey” by J. M. de Fuentes et al. proposes a setof guidelines to build comprehensive privacy models so as tofoster their comparability and suitability analysis for differentscenarios.
The paper entitled “Identity RecognitionUsing BiologicalElectroencephalogram Sensors” by W. Liang et al. proposesseveral brain wave-based identity recognition techniques forfurther studies.
The paper entitled “An Intelligent and Secure HealthMonitoring Scheme Using IoT Sensor Based on CloudComputing” by J.-X. Hu et al. proposes a scheme with IoTsensor based on cloud computing tomake the elder safely andconveniently monitored.
Acknowledgments
In particular, we would like to acknowledge the programcommittee members of Ninth International Symposium onInformation Processing (ISIP 2016). This issue containsrevised and expanded versions of selected quality paperspresented at theNinth International Symposium on Informa-tion Processing (ISIP 2016). ISIP 2016 took place on August20-21, 2016, in Changsha, China, and was cosponsored byJishou University, China; Peoples’ Friendship University ofRussia, Russia; South China University of Technology, China;Feng Chia University, Taiwan; Henan Polytechnic University,China; Nanchang Hangkong University, China; and JiangxiUniversity of Science and Technology, China. We wishto express our deepest thanks to the program committeemembers for their help in selecting papers for this issue andespecially the referees of the extended versions of the selectedpapers for their thorough reviews under a tight time schedule.In closing, we would like to take this opportunity to thankthe authors for the efforts they put in the preparation of the
manuscripts and in keeping the deadlines set by editorialrequirements.Wehope that youwill enjoy reading this specialissue as much as we did putting it together.
Fei YuChin-Chen Chang
Jian ShuIftikhar Ahmad
Jun ZhangJose Maria de Fuentes
-
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttps://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of