Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
EditorialRecent Advances in Security and Privacy forWireless Sensor Networks
Fei Yu,1 Chin-Chen Chang,2 Jian Shu,3 Iftikhar Ahmad,4
Jun Zhang,5 and Jose Maria de Fuentes6
1Peoples’ Friendship University of Russia, Moscow 117198, Russia2Feng Chia University, Taichung 40724, Taiwan3Nanchang Hangkong University, Nanchang 330000, China4King Saud University, Riyadh 92144, Saudi Arabia5Deakin University, Burwood, VIC 3125, Australia6Universidad Carlos III de Madrid, Madrid 28036, Spain
Correspondence should be addressed to Fei Yu; [email protected]
Received 20 May 2015; Accepted 27 May 2015
Copyright © 2015 Fei Yu et al. This is an open access article distributed under the Creative Commons Attribution License, whichpermits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless networks have experienced explosive growth duringthe last few years. Nowadays, there are a large variety ofnetworks spanning from the well-known cellular networks tononinfrastructure wireless networks such as mobile ad hocnetworks and sensor networks. Communication security isessential to the success of wireless sensor network applica-tions, especially for those mission-critical applications work-ing in unattended and even hostile environments. However,providing satisfactory security protection in wireless sensornetworks has ever been a challenging task due to variousnetwork and resource constraints and malicious attacks.
In this special issue, we concentrate mainly on securityand privacy as well as the emerging applications of wirelesssensor network. It aims to bring together researchers andpractitioners from wireless and sensor networking, security,cryptography, and distributed computing communities, withthe goal of promoting discussions and collaborations. Weare interested in novel research on all aspects of securityin wireless sensor networks and tradeoff between securityand performance such as QoS, dependability, and scalability.The special issue covers industrial issues/applications andacademic research into security and privacy for wirelesssensor networks.
This special issue includes a collection of 14 papersselected from 74 submissions to 9 countries or districts
(China, India, South Korea, Chennai, USA, Pakistan, SaudiArabia,Malaysia, and Taiwan). All submitted papers followedthe same standard (peer-reviewed by at least three indepen-dent reviewers) as applied to regular submissions.
In the paper entitled “Accurately Identifying New QoSViolation Driven by High-Distributed Low-Rate Denial ofService Attacks Based on Multiple Observed Features,” J.Kang et al. propose using multiple observed features ofnetwork traffic to identify new high-distributed low-rateQuality of Services (QoS) violation so that detection accuracymay be further improved.
In the paper entitled “A Self-Adaptive Wireless SensorNetwork Coverage Method for Intrusion Tolerance Basedon Trust Value” Z. Chen et al. propose a network coveragemethod for invasive tolerance based on trust value of nodesby combining the trust valuemodel with the reliable coverageoptimization.
The paper entitled “Trust-Aware and Low Energy Con-sumption Security Topology Protocol of Wireless SensorNetwork” by Z. Chen et al. tries to take node trust into consid-eration when building a network topology, so as to ensure thesecurity of the network communication.The TLES algorithmis based on the analysis of node behavior. It develops a varietyof trust factors and then performs comprehensive analysiswith direct information and recommended information.
Hindawi Publishing CorporationJournal of SensorsVolume 2015, Article ID 169305, 2 pageshttp://dx.doi.org/10.1155/2015/169305
2 Journal of Sensors
In the paper entitled “A Data Processing MiddlewareBased on SOA for the Internet of Things” by F. Wang et al.,based on characteristics of the architecture and challenges ofinformation fusion in the IoT, the paper designs amiddlewareplatform based on SOA architecture for the integration ofmultisource heterogeneous information.
In the paper entitled “Survey of Security Technologieson Wireless Sensor Networks” Q. Yang et al. summarizedresearch progress of sensor network security issues in keymanagement, authentication, and secure routing as three as-pects, by analyzing and commenting on these results advan-tages and disadvantages, and pointed out the future directionof the hot research field.
The paper entitled “Intrusion Detection Algorithm forMitigating Sinkhole Attack on LEACH Protocol in WirelessSensor Networks” by R. K. Sundararajan and U. Arumugamproposes an Intrusion Detection System (IDS) mechanism todetect the intruder in the network which uses Low EnergyAdaptive Clustering Hierarchy (LEACH) protocol for itsrouting operation.
In the paper entitled “Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on SecureMultiparty Computation” H. Huang et al. design the routingprotocol RPAD from the direction and distribution densityof the vehicle and the base station is considered to be a refer-ence.
In the paper entitled “A Novel Digital Certificate BasedRemote Data Access Control Scheme in WSN” by W. Lianget al. a digital certificate based remote data access controlscheme is proposed for safe authentication of accessor inwireless sensor network (WSN).
The paper entitled “Distributed Software-Attestation De-fense against Sensor Worm Propagation” by J.-W. Ho pro-posed on-demand software-attestation based scheme to stopworm propagation in sensor network.
In the paper entitled “SensorNetworksHierarchicalOpti-mization Model for Security Monitoring in High-SpeedRailway TransportHub” Z. Xie andY.Qin consider the sensornetworks hierarchical optimization problem in high-speedrailway transport hub (HRTH).
The paper entitled “B-iTRS: ABio-Inspired Trusted Rout-ing Scheme forWireless Sensor Networks” byM. Zhang et al.presents a novel bio-inspired trusted routing scheme (BiTRS)based on ant colony optimization (ACO) and Physarumautonomic optimization (PAO).
The paper entitled “Research on Handoff Delay andMobility Management Cost of Mobility Protocols inWirelessSensor Networks” by A. Q. Zhao and Y. Hu focused on theresearch of mobility management cost of mobility supportprotocols and made analysis and comparison of mobilitymanagement cost among various mobility support proto-cols.
The paper entitled “Sequence Alignment with DynamicDivisor Generation for Keystroke Dynamics Based UserAuthentication” by J. Ho and D.-K. Kang proposed sequencealignment with dynamic divisor generation (SADD) for userauthentication by using the keystroke dynamics.
Acknowledgments
In particular, we would like to acknowledge the programcommittee members of Seventh International Symposium onInformation Processing (ISIP 2014). This issue contains mostof the revised and expanded versions of the selected qualitypapers presented at the Seventh International Symposiumon Information Processing (ISIP 2014). We wish to expressour deepest thanks to the program committee members fortheir help in selecting papers for this issue and especiallythe referees of the extended versions of the selected papersfor their thorough reviews under a tight time schedule.ISIP 2014 took place on October 25-26, 2014, in Changsha,China, and was cosponsored by Jiangxi University of Scienceand Technology, China; Peoples’ Friendship University ofRussia, Russia; South China University of Technology, China;Feng Chia University, Taiwan; Henan Polytechnic University,China; Nanchang Hangkong University, China; and JiangxiUniversity of Science and Technology, China. In closing, wewould like to take this opportunity to thank the authors forthe efforts they put in the preparation of the manuscripts andin keeping the deadlines set by editorial requirements. Wehope that you will enjoy reading this special issue as muchas we did putting it together.
Fei YuChin-Chen Chang
Jian ShuIftikhar Ahmad
Jun ZhangJose Maria de Fuentes
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of