4
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 565076, 3 pages http://dx.doi.org/10.1155/2013/565076 Editorial Secure and Energy-Efficient Data Collection in Wireless Sensor Networks Anfeng Liu, 1 Laurence T. Yang, 2 Motoki Sakai, 3 and Mianxiong Dong 4 1 School of Information Science and Engineering, Central South University, Changsha 410083, China 2 Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada B2G 2W5 3 School of Symbiotic Systems Science and Technology, Fukushima University, Fukushima 960-1296, Japan 4 School of Computer Science and Engineering, e University of Aizu, Aizuwakamatsu 965-8580, Japan Correspondence should be addressed to Anfeng Liu; [email protected] Received 12 August 2013; Accepted 12 August 2013 Copyright © 2013 Anfeng Liu et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Wireless sensor networks (WSNs) are a kind of multihop and self-organizing networks formed by the way of wireless communication and composed by a large number of low- cost microsensor nodes deployed in the monitoring area. e sensor nodes cooperate to perceive and acquire the process and transmit the perceived object information in the network covering within the geographical area and finally send the information to the sink. In the recent decade, with the rapid development of various kinds of key technology in WSNs, they are widely applied to many especial envi- ronments, such as, military defense, environment detection, biological health, and disaster-relief work. Due to the limited computing ability, battery capacity, and storage capacity of sensor nodes, energy-efficient data collection became a non- negligible research issue in WSNs. Also the open architecture in receiving data and transmitting data of WSNs is vulnerable to various security attacks during the data collection process. ese two fundamental issues motivate us to have this special issue addressing the recent advances which are mentioned in Table 1 on security and energy-efficient data collection in WSNs. In response to this call for papers, we have received a total of 36 high-quality submissions, and 13 papers have been selected for publication aſter a rigorous review process due to the space limit. e papers in this special issue are divided into three thematic groups as follows. e first set of the seven papers emphasizes the secu- rity technology with a series of key agreement protocol, encryption, authentication, and trust scheme to solve the special security issues. According to the current researches in security technology in Table 1, the seven papers are significant for the improvement of the security of the network. “A hybrid authenticated group key agreement protocol in wireless sensor networks” by Y. Li et al. proposed an AGKA protocol which reduced the high cost public-key operations at the sensor side and replaced them with efficient symmetric-key based operations. In “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networksby J. Zhou, the author aimed to perform a secure routing protocol based on encryption and authentication which encrypted all communication packets and authenticated the source nodes and the BS. “Trust management scheme based on D-S evidence theory for wireless sensor network” by R. Feng et al. proposed a trust management scheme based on revised Dempster-Shafer (D-S) evidence theory. “An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks” by Y. Pan et al. improved the Marmol et al.’s ant algorithm based trust model. “Low mismatch key agreement based on wavelet- transform trend and fuzzy vault in body area network” by Y. Wu et al. introduces the security on the body area network with lightweight symmetric cryptography. “Noncommutative lightweight signcryption for wireless sensor networks” by L. Gu et al. has proposed a braid-based signcryption scheme and developed a key establishment protocol for wireless sensor networks. “A cross-layer security scheme of web services-based communications for IEEE 1451 sensor and actuator networksby J. Wu et al. dealt with the requirements, of authentication, integrity, confidentiality and availability.

Editorial Secure and Energy-Efficient Data Collection …downloads.hindawi.com/journals/ijdsn/2013/565076.pdfInternationalJournalofDistributedSensorNetworks [] Z. Zhu and G. Cao, Toward

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Editorial Secure and Energy-Efficient Data Collection …downloads.hindawi.com/journals/ijdsn/2013/565076.pdfInternationalJournalofDistributedSensorNetworks [] Z. Zhu and G. Cao, Toward

Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2013, Article ID 565076, 3 pageshttp://dx.doi.org/10.1155/2013/565076

EditorialSecure and Energy-Efficient Data Collection inWireless Sensor Networks

Anfeng Liu,1 Laurence T. Yang,2 Motoki Sakai,3 and Mianxiong Dong4

1 School of Information Science and Engineering, Central South University, Changsha 410083, China2Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada B2G 2W53 School of Symbiotic Systems Science and Technology, Fukushima University, Fukushima 960-1296, Japan4 School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu 965-8580, Japan

Correspondence should be addressed to Anfeng Liu; [email protected]

Received 12 August 2013; Accepted 12 August 2013

Copyright © 2013 Anfeng Liu et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Wireless sensor networks (WSNs) are a kind of multihopand self-organizing networks formed by the way of wirelesscommunication and composed by a large number of low-cost microsensor nodes deployed in the monitoring area.The sensor nodes cooperate to perceive and acquire theprocess and transmit the perceived object information in thenetwork covering within the geographical area and finallysend the information to the sink. In the recent decade, withthe rapid development of various kinds of key technologyin WSNs, they are widely applied to many especial envi-ronments, such as, military defense, environment detection,biological health, and disaster-relief work. Due to the limitedcomputing ability, battery capacity, and storage capacity ofsensor nodes, energy-efficient data collection became a non-negligible research issue inWSNs. Also the open architecturein receiving data and transmitting data ofWSNs is vulnerableto various security attacks during the data collection process.These two fundamental issues motivate us to have this specialissue addressing the recent advances which are mentionedin Table 1 on security and energy-efficient data collection inWSNs.

In response to this call for papers, we have received atotal of 36 high-quality submissions, and 13 papers have beenselected for publication after a rigorous review process dueto the space limit. The papers in this special issue are dividedinto three thematic groups as follows.

The first set of the seven papers emphasizes the secu-rity technology with a series of key agreement protocol,encryption, authentication, and trust scheme to solve thespecial security issues. According to the current researches in

security technology inTable 1, the seven papers are significantfor the improvement of the security of the network. “A hybridauthenticated group key agreement protocol in wireless sensornetworks” by Y. Li et al. proposed an AGKA protocol whichreduced the high cost public-key operations at the sensorside and replaced them with efficient symmetric-key basedoperations. In “Efficient and secure routing protocol based onencryption and authentication for wireless sensor networks”by J. Zhou, the author aimed to perform a secure routingprotocol based on encryption and authentication whichencrypted all communication packets and authenticated thesource nodes and the BS. “Trust management scheme basedon D-S evidence theory for wireless sensor network” by R.Feng et al. proposed a trust management scheme basedon revised Dempster-Shafer (D-S) evidence theory. “Animproved trust model based on interactive ant algorithmsand its applications in wireless sensor networks” by Y. Panet al. improved the Marmol et al.’s ant algorithm basedtrust model. “Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network” by Y.Wu et al. introduces the security on the body area networkwith lightweight symmetric cryptography. “Noncommutativelightweight signcryption for wireless sensor networks” by L. Guet al. has proposed a braid-based signcryption scheme anddeveloped a key establishment protocol for wireless sensornetworks. “A cross-layer security scheme of web services-basedcommunications for IEEE 1451 sensor and actuator networks”by J. Wu et al. dealt with the requirements, of authentication,integrity, confidentiality and availability.

Page 2: Editorial Secure and Energy-Efficient Data Collection …downloads.hindawi.com/journals/ijdsn/2013/565076.pdfInternationalJournalofDistributedSensorNetworks [] Z. Zhu and G. Cao, Toward

2 International Journal of Distributed Sensor Networks

Table 1: The main content of secure and energy-efficient data collection researches in WSNs.

The main research fields The main content in current yearskey management, encryption,and authentication

Hierarchical key management of sensor network [1], lightweight, and strong security key agreement[2].

Secure routing Multipath security routing protocol [3], hierarchical sensor network security routing protocol [4].

Secure data aggregation Syntactic aggregation and cryptographic aggregation [5]; use the watermark rather than PH datafusion technology to achieve security [6].

Secure localization Hierarchical sensor network security positioning [7], lightweight security localization method [8].

Privacy protection Data oriented privacy protection, contextual privacy [9], source-location privacy, footprint privacy,and communication privacy [10].

Energy-efficiency routing Hierarchy and clustering routing [11].Energy-efficiency MAC protocol The MAC protocol based on CSMA/FDMA/CSMA [12].

The second set of the three papers focuses on howto improve the network’s energy efficiency and prolongthe lifetime of the network within the security assurance.“An energy-efficient key predistribution scheme for securewireless sensor networks using eigenvector” by S. J. Choiet al. proposes a new robust key predistribution schemereducing the overhead requirement of secure connectiv-ity and energy consumption. In “An energy-efficient cyclicdiversionary routing strategy against global eavesdroppers inwireless sensor networks” by J. Ren et al. proposed an energy-efficient cyclic diversionary routing (CDR) scheme againstglobal eavesdroppers for preserving location privacy andmaximizing lifetime of wireless sensor networks. “Energy-efficiency of cooperative communication with guaranteed E2Ereliability in WSNs” by D. Zhang and Z. Chen addressed theenergy efficiency of cooperative communication in WSNs.

The last set of the rest mainly aims at the issues or theway of data collection. According to Table 1, the researchesabout secure data aggregation start in “A secure and efficientdata aggregation framework in vehicular sensing networks” byS. Du et al. which introduced a basic aggregation schemewhich could aggregate the data and the message authen-tication codes by using syntactic aggregation and crypto-graphic aggregation. A work that used a low-cost, reliable,and microchip-based wireless transmission solution to real-time collect earthquake data across local and wide areasis in “Real-time seismic data acquisition via a paired rippletransmission protocol” by J.-L. Lin et al. Besides, “Constructinga CDS-based network backbone for data collection in wirelesssensor networks” by X. Kui et al. investigates the problem ofconstructing an energy balanced CDS to effectively preservethe energy of nodes in order to extend the network lifetimein data collection.

Compared with the recent researches in Table 1, all 13papers in this special issue represent the spirit of innovationand important leaps in this field. They improve the perfor-mance in security and energy efficiency in data collection inWSNs and could be a guide and cornerstone to the futurework.

Acknowledgments

The guest editor thanks all the authors who have contributedtheir time and effort submitting their outstanding works in

response to the call for papers, regardless of whether theirworks have been published in this special issue or not onaccount of the space limitations. The guest editors are alsograteful to all the reviewers for their valuable suggestions tothe authors on improving the issues and presentation of theirpapers.

Anfeng LiuLaurence T. Yang

Motoki SakaiMianxiong Dong

References

[1] S. Guo, A.-N. Shen, andM.Guo, “A secure and scalable rekeyingmechanism for hierarchical wireless sensor networks,” IEICETransactions on Information and Systems, vol. 93, no. 3, pp. 421–429, 2010.

[2] L. Ni, G. Chen, and J. Li, “Escrowable identity-based authenti-cated key agreement protocol with strong security,” Computers& Mathematics with Applications, vol. 65, no. 9, pp. 1339–1349,2013.

[3] H. Yin, Y. Wang, G. Min, S. Berton, R. Guo, and C. Lin, “Asecure multipath routing protocol in mobile ad hoc networks,”Concurrency and Computation, vol. 22, no. 4, pp. 481–502, 2010.

[4] F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical trustmanagement forwireless sensor networks and its applications totrust-based routing and intrusion detection,” IEEE Transactionson Network and Service Management, vol. 9, no. 2, pp. 169–183,2012.

[5] C. Rottondi, G. Verticale, and C. Krauss, “Distributed privacy-preserving aggregation of metering data in smart grids,” IEEEJournal on Selected Areas in Communications, vol. 31, no. 7, pp.1342–1354, 2013.

[6] S. Xi and X. Di, “A reversible watermarking authenticationscheme for wireless sensor networks,” Information Sciences, vol.240, pp. 173–183, 2013.

[7] R. Garg, A. L. Varna, and M.Wu, “An efficient gradient descentapproach to secure localization in resource constrained wirelesssensor networks,” IEEE Transactions on Information Forensicsand Security, vol. 7, no. 2, pp. 717–730, 2012.

[8] K.-J. Kim and S.-P. Hong, “Privacy care architecture in wirelesssensor networks,” International Journal of Distributed SensorNetworks, vol. 2013, Article ID 369502, 7 pages, 2013.

[9] H. J. G. Oberholzer and M. S. Olivier, “Privacy contracts incor-porated in a privacy protection framework,” Computer SystemsScience and Engineering, vol. 21, no. 1, pp. 5–16, 2006.

Page 3: Editorial Secure and Energy-Efficient Data Collection …downloads.hindawi.com/journals/ijdsn/2013/565076.pdfInternationalJournalofDistributedSensorNetworks [] Z. Zhu and G. Cao, Toward

International Journal of Distributed Sensor Networks 3

[10] Z. Zhu and G. Cao, “Toward privacy preserving and collusionresistance in a location proof updating system,” IEEE Transac-tions on Mobile Computing, vol. 12, no. 1, pp. 51–64, 2013.

[11] H. T. Xiao, X. Zhao, andH.Ogai, “Anew clustering routing algo-rithm for wsn based on brief artificial fish-school optimizationand ant colony optimization,” IEEE Transactions on Electronics,Information and Systems, vol. 133, no. 7, pp. 1339–1349, 2013.

[12] S. M. Kumar, N. Rajkumar, and W. C. C. Mary, “Dropping falsepacket to increase the network lifetime of wireless sensor net-work using EFDDprotocol,”Wireless Personal Communications,vol. 70, no. 4, pp. 1697–1709, 2013.

Page 4: Editorial Secure and Energy-Efficient Data Collection …downloads.hindawi.com/journals/ijdsn/2013/565076.pdfInternationalJournalofDistributedSensorNetworks [] Z. Zhu and G. Cao, Toward

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal ofEngineeringVolume 2014

Submit your manuscripts athttp://www.hindawi.com

VLSI Design

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

DistributedSensor Networks

International Journal of