Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2013, Article ID 565076, 3 pageshttp://dx.doi.org/10.1155/2013/565076
EditorialSecure and Energy-Efficient Data Collection inWireless Sensor Networks
Anfeng Liu,1 Laurence T. Yang,2 Motoki Sakai,3 and Mianxiong Dong4
1 School of Information Science and Engineering, Central South University, Changsha 410083, China2Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada B2G 2W53 School of Symbiotic Systems Science and Technology, Fukushima University, Fukushima 960-1296, Japan4 School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu 965-8580, Japan
Correspondence should be addressed to Anfeng Liu; [email protected]
Received 12 August 2013; Accepted 12 August 2013
Copyright © 2013 Anfeng Liu et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless sensor networks (WSNs) are a kind of multihopand self-organizing networks formed by the way of wirelesscommunication and composed by a large number of low-cost microsensor nodes deployed in the monitoring area.The sensor nodes cooperate to perceive and acquire theprocess and transmit the perceived object information in thenetwork covering within the geographical area and finallysend the information to the sink. In the recent decade, withthe rapid development of various kinds of key technologyin WSNs, they are widely applied to many especial envi-ronments, such as, military defense, environment detection,biological health, and disaster-relief work. Due to the limitedcomputing ability, battery capacity, and storage capacity ofsensor nodes, energy-efficient data collection became a non-negligible research issue inWSNs. Also the open architecturein receiving data and transmitting data ofWSNs is vulnerableto various security attacks during the data collection process.These two fundamental issues motivate us to have this specialissue addressing the recent advances which are mentionedin Table 1 on security and energy-efficient data collection inWSNs.
In response to this call for papers, we have received atotal of 36 high-quality submissions, and 13 papers have beenselected for publication after a rigorous review process dueto the space limit. The papers in this special issue are dividedinto three thematic groups as follows.
The first set of the seven papers emphasizes the secu-rity technology with a series of key agreement protocol,encryption, authentication, and trust scheme to solve thespecial security issues. According to the current researches in
security technology inTable 1, the seven papers are significantfor the improvement of the security of the network. “A hybridauthenticated group key agreement protocol in wireless sensornetworks” by Y. Li et al. proposed an AGKA protocol whichreduced the high cost public-key operations at the sensorside and replaced them with efficient symmetric-key basedoperations. In “Efficient and secure routing protocol based onencryption and authentication for wireless sensor networks”by J. Zhou, the author aimed to perform a secure routingprotocol based on encryption and authentication whichencrypted all communication packets and authenticated thesource nodes and the BS. “Trust management scheme basedon D-S evidence theory for wireless sensor network” by R.Feng et al. proposed a trust management scheme basedon revised Dempster-Shafer (D-S) evidence theory. “Animproved trust model based on interactive ant algorithmsand its applications in wireless sensor networks” by Y. Panet al. improved the Marmol et al.’s ant algorithm basedtrust model. “Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network” by Y.Wu et al. introduces the security on the body area networkwith lightweight symmetric cryptography. “Noncommutativelightweight signcryption for wireless sensor networks” by L. Guet al. has proposed a braid-based signcryption scheme anddeveloped a key establishment protocol for wireless sensornetworks. “A cross-layer security scheme of web services-basedcommunications for IEEE 1451 sensor and actuator networks”by J. Wu et al. dealt with the requirements, of authentication,integrity, confidentiality and availability.
2 International Journal of Distributed Sensor Networks
Table 1: The main content of secure and energy-efficient data collection researches in WSNs.
The main research fields The main content in current yearskey management, encryption,and authentication
Hierarchical key management of sensor network [1], lightweight, and strong security key agreement[2].
Secure routing Multipath security routing protocol [3], hierarchical sensor network security routing protocol [4].
Secure data aggregation Syntactic aggregation and cryptographic aggregation [5]; use the watermark rather than PH datafusion technology to achieve security [6].
Secure localization Hierarchical sensor network security positioning [7], lightweight security localization method [8].
Privacy protection Data oriented privacy protection, contextual privacy [9], source-location privacy, footprint privacy,and communication privacy [10].
Energy-efficiency routing Hierarchy and clustering routing [11].Energy-efficiency MAC protocol The MAC protocol based on CSMA/FDMA/CSMA [12].
The second set of the three papers focuses on howto improve the network’s energy efficiency and prolongthe lifetime of the network within the security assurance.“An energy-efficient key predistribution scheme for securewireless sensor networks using eigenvector” by S. J. Choiet al. proposes a new robust key predistribution schemereducing the overhead requirement of secure connectiv-ity and energy consumption. In “An energy-efficient cyclicdiversionary routing strategy against global eavesdroppers inwireless sensor networks” by J. Ren et al. proposed an energy-efficient cyclic diversionary routing (CDR) scheme againstglobal eavesdroppers for preserving location privacy andmaximizing lifetime of wireless sensor networks. “Energy-efficiency of cooperative communication with guaranteed E2Ereliability in WSNs” by D. Zhang and Z. Chen addressed theenergy efficiency of cooperative communication in WSNs.
The last set of the rest mainly aims at the issues or theway of data collection. According to Table 1, the researchesabout secure data aggregation start in “A secure and efficientdata aggregation framework in vehicular sensing networks” byS. Du et al. which introduced a basic aggregation schemewhich could aggregate the data and the message authen-tication codes by using syntactic aggregation and crypto-graphic aggregation. A work that used a low-cost, reliable,and microchip-based wireless transmission solution to real-time collect earthquake data across local and wide areasis in “Real-time seismic data acquisition via a paired rippletransmission protocol” by J.-L. Lin et al. Besides, “Constructinga CDS-based network backbone for data collection in wirelesssensor networks” by X. Kui et al. investigates the problem ofconstructing an energy balanced CDS to effectively preservethe energy of nodes in order to extend the network lifetimein data collection.
Compared with the recent researches in Table 1, all 13papers in this special issue represent the spirit of innovationand important leaps in this field. They improve the perfor-mance in security and energy efficiency in data collection inWSNs and could be a guide and cornerstone to the futurework.
Acknowledgments
The guest editor thanks all the authors who have contributedtheir time and effort submitting their outstanding works in
response to the call for papers, regardless of whether theirworks have been published in this special issue or not onaccount of the space limitations. The guest editors are alsograteful to all the reviewers for their valuable suggestions tothe authors on improving the issues and presentation of theirpapers.
Anfeng LiuLaurence T. Yang
Motoki SakaiMianxiong Dong
References
[1] S. Guo, A.-N. Shen, andM.Guo, “A secure and scalable rekeyingmechanism for hierarchical wireless sensor networks,” IEICETransactions on Information and Systems, vol. 93, no. 3, pp. 421–429, 2010.
[2] L. Ni, G. Chen, and J. Li, “Escrowable identity-based authenti-cated key agreement protocol with strong security,” Computers& Mathematics with Applications, vol. 65, no. 9, pp. 1339–1349,2013.
[3] H. Yin, Y. Wang, G. Min, S. Berton, R. Guo, and C. Lin, “Asecure multipath routing protocol in mobile ad hoc networks,”Concurrency and Computation, vol. 22, no. 4, pp. 481–502, 2010.
[4] F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical trustmanagement forwireless sensor networks and its applications totrust-based routing and intrusion detection,” IEEE Transactionson Network and Service Management, vol. 9, no. 2, pp. 169–183,2012.
[5] C. Rottondi, G. Verticale, and C. Krauss, “Distributed privacy-preserving aggregation of metering data in smart grids,” IEEEJournal on Selected Areas in Communications, vol. 31, no. 7, pp.1342–1354, 2013.
[6] S. Xi and X. Di, “A reversible watermarking authenticationscheme for wireless sensor networks,” Information Sciences, vol.240, pp. 173–183, 2013.
[7] R. Garg, A. L. Varna, and M.Wu, “An efficient gradient descentapproach to secure localization in resource constrained wirelesssensor networks,” IEEE Transactions on Information Forensicsand Security, vol. 7, no. 2, pp. 717–730, 2012.
[8] K.-J. Kim and S.-P. Hong, “Privacy care architecture in wirelesssensor networks,” International Journal of Distributed SensorNetworks, vol. 2013, Article ID 369502, 7 pages, 2013.
[9] H. J. G. Oberholzer and M. S. Olivier, “Privacy contracts incor-porated in a privacy protection framework,” Computer SystemsScience and Engineering, vol. 21, no. 1, pp. 5–16, 2006.
International Journal of Distributed Sensor Networks 3
[10] Z. Zhu and G. Cao, “Toward privacy preserving and collusionresistance in a location proof updating system,” IEEE Transac-tions on Mobile Computing, vol. 12, no. 1, pp. 51–64, 2013.
[11] H. T. Xiao, X. Zhao, andH.Ogai, “Anew clustering routing algo-rithm for wsn based on brief artificial fish-school optimizationand ant colony optimization,” IEEE Transactions on Electronics,Information and Systems, vol. 133, no. 7, pp. 1339–1349, 2013.
[12] S. M. Kumar, N. Rajkumar, and W. C. C. Mary, “Dropping falsepacket to increase the network lifetime of wireless sensor net-work using EFDDprotocol,”Wireless Personal Communications,vol. 70, no. 4, pp. 1697–1709, 2013.
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of