3
Editorial Recent Advances in Security and Privacy for Wireless Sensor Networks Fei Yu, 1 Chin-Chen Chang, 2 Jian Shu, 3 Iftikhar Ahmad, 4 Jun Zhang, 5 and Jose Maria de Fuentes 6 1 Peoples’ Friendship University of Russia, Moscow 117198, Russia 2 Feng Chia University, Taichung 40724, Taiwan 3 Nanchang Hangkong University, Nanchang 330000, China 4 King Saud University, Riyadh 92144, Saudi Arabia 5 Deakin University, Burwood, VIC 3125, Australia 6 Universidad Carlos III de Madrid, Madrid 28036, Spain Correspondence should be addressed to Fei Yu; [email protected] Received 20 May 2015; Accepted 27 May 2015 Copyright © 2015 Fei Yu et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Wireless networks have experienced explosive growth during the last few years. Nowadays, there are a large variety of networks spanning from the well-known cellular networks to noninfrastructure wireless networks such as mobile ad hoc networks and sensor networks. Communication security is essential to the success of wireless sensor network applica- tions, especially for those mission-critical applications work- ing in unattended and even hostile environments. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks. In this special issue, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network. It aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goal of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless sensor networks and tradeoff between security and performance such as QoS, dependability, and scalability. e special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks. is special issue includes a collection of 14 papers selected from 74 submissions to 9 countries or districts (China, India, South Korea, Chennai, USA, Pakistan, Saudi Arabia, Malaysia, and Taiwan). All submitted papers followed the same standard (peer-reviewed by at least three indepen- dent reviewers) as applied to regular submissions. In the paper entitled “Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features,” J. Kang et al. propose using multiple observed features of network traffic to identify new high-distributed low-rate Quality of Services (QoS) violation so that detection accuracy may be further improved. In the paper entitled “A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value” Z. Chen et al. propose a network coverage method for invasive tolerance based on trust value of nodes by combining the trust value model with the reliable coverage optimization. e paper entitled “Trust-Aware and Low Energy Con- sumption Security Topology Protocol of Wireless Sensor Network” by Z. Chen et al. tries to take node trust into consid- eration when building a network topology, so as to ensure the security of the network communication. e TLES algorithm is based on the analysis of node behavior. It develops a variety of trust factors and then performs comprehensive analysis with direct information and recommended information. Hindawi Publishing Corporation Journal of Sensors Volume 2015, Article ID 169305, 2 pages http://dx.doi.org/10.1155/2015/169305

Editorial Recent Advances in Security and Privacy for Wireless Sensor Networks · 2019. 7. 31. · noninfrastructure wireless networks such as mobile ad hoc networks and sensor networks

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

  • EditorialRecent Advances in Security and Privacy forWireless Sensor Networks

    Fei Yu,1 Chin-Chen Chang,2 Jian Shu,3 Iftikhar Ahmad,4

    Jun Zhang,5 and Jose Maria de Fuentes6

    1Peoples’ Friendship University of Russia, Moscow 117198, Russia2Feng Chia University, Taichung 40724, Taiwan3Nanchang Hangkong University, Nanchang 330000, China4King Saud University, Riyadh 92144, Saudi Arabia5Deakin University, Burwood, VIC 3125, Australia6Universidad Carlos III de Madrid, Madrid 28036, Spain

    Correspondence should be addressed to Fei Yu; [email protected]

    Received 20 May 2015; Accepted 27 May 2015

    Copyright © 2015 Fei Yu et al. This is an open access article distributed under the Creative Commons Attribution License, whichpermits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

    Wireless networks have experienced explosive growth duringthe last few years. Nowadays, there are a large variety ofnetworks spanning from the well-known cellular networks tononinfrastructure wireless networks such as mobile ad hocnetworks and sensor networks. Communication security isessential to the success of wireless sensor network applica-tions, especially for those mission-critical applications work-ing in unattended and even hostile environments. However,providing satisfactory security protection in wireless sensornetworks has ever been a challenging task due to variousnetwork and resource constraints and malicious attacks.

    In this special issue, we concentrate mainly on securityand privacy as well as the emerging applications of wirelesssensor network. It aims to bring together researchers andpractitioners from wireless and sensor networking, security,cryptography, and distributed computing communities, withthe goal of promoting discussions and collaborations. Weare interested in novel research on all aspects of securityin wireless sensor networks and tradeoff between securityand performance such as QoS, dependability, and scalability.The special issue covers industrial issues/applications andacademic research into security and privacy for wirelesssensor networks.

    This special issue includes a collection of 14 papersselected from 74 submissions to 9 countries or districts

    (China, India, South Korea, Chennai, USA, Pakistan, SaudiArabia,Malaysia, and Taiwan). All submitted papers followedthe same standard (peer-reviewed by at least three indepen-dent reviewers) as applied to regular submissions.

    In the paper entitled “Accurately Identifying New QoSViolation Driven by High-Distributed Low-Rate Denial ofService Attacks Based on Multiple Observed Features,” J.Kang et al. propose using multiple observed features ofnetwork traffic to identify new high-distributed low-rateQuality of Services (QoS) violation so that detection accuracymay be further improved.

    In the paper entitled “A Self-Adaptive Wireless SensorNetwork Coverage Method for Intrusion Tolerance Basedon Trust Value” Z. Chen et al. propose a network coveragemethod for invasive tolerance based on trust value of nodesby combining the trust valuemodel with the reliable coverageoptimization.

    The paper entitled “Trust-Aware and Low Energy Con-sumption Security Topology Protocol of Wireless SensorNetwork” by Z. Chen et al. tries to take node trust into consid-eration when building a network topology, so as to ensure thesecurity of the network communication.The TLES algorithmis based on the analysis of node behavior. It develops a varietyof trust factors and then performs comprehensive analysiswith direct information and recommended information.

    Hindawi Publishing CorporationJournal of SensorsVolume 2015, Article ID 169305, 2 pageshttp://dx.doi.org/10.1155/2015/169305

  • 2 Journal of Sensors

    In the paper entitled “A Data Processing MiddlewareBased on SOA for the Internet of Things” by F. Wang et al.,based on characteristics of the architecture and challenges ofinformation fusion in the IoT, the paper designs amiddlewareplatform based on SOA architecture for the integration ofmultisource heterogeneous information.

    In the paper entitled “Survey of Security Technologieson Wireless Sensor Networks” Q. Yang et al. summarizedresearch progress of sensor network security issues in keymanagement, authentication, and secure routing as three as-pects, by analyzing and commenting on these results advan-tages and disadvantages, and pointed out the future directionof the hot research field.

    The paper entitled “Intrusion Detection Algorithm forMitigating Sinkhole Attack on LEACH Protocol in WirelessSensor Networks” by R. K. Sundararajan and U. Arumugamproposes an Intrusion Detection System (IDS) mechanism todetect the intruder in the network which uses Low EnergyAdaptive Clustering Hierarchy (LEACH) protocol for itsrouting operation.

    In the paper entitled “Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on SecureMultiparty Computation” H. Huang et al. design the routingprotocol RPAD from the direction and distribution densityof the vehicle and the base station is considered to be a refer-ence.

    In the paper entitled “A Novel Digital Certificate BasedRemote Data Access Control Scheme in WSN” by W. Lianget al. a digital certificate based remote data access controlscheme is proposed for safe authentication of accessor inwireless sensor network (WSN).

    The paper entitled “Distributed Software-Attestation De-fense against Sensor Worm Propagation” by J.-W. Ho pro-posed on-demand software-attestation based scheme to stopworm propagation in sensor network.

    In the paper entitled “SensorNetworksHierarchicalOpti-mization Model for Security Monitoring in High-SpeedRailway TransportHub” Z. Xie andY.Qin consider the sensornetworks hierarchical optimization problem in high-speedrailway transport hub (HRTH).

    The paper entitled “B-iTRS: ABio-Inspired Trusted Rout-ing Scheme forWireless Sensor Networks” byM. Zhang et al.presents a novel bio-inspired trusted routing scheme (BiTRS)based on ant colony optimization (ACO) and Physarumautonomic optimization (PAO).

    The paper entitled “Research on Handoff Delay andMobility Management Cost of Mobility Protocols inWirelessSensor Networks” by A. Q. Zhao and Y. Hu focused on theresearch of mobility management cost of mobility supportprotocols and made analysis and comparison of mobilitymanagement cost among various mobility support proto-cols.

    The paper entitled “Sequence Alignment with DynamicDivisor Generation for Keystroke Dynamics Based UserAuthentication” by J. Ho and D.-K. Kang proposed sequencealignment with dynamic divisor generation (SADD) for userauthentication by using the keystroke dynamics.

    Acknowledgments

    In particular, we would like to acknowledge the programcommittee members of Seventh International Symposium onInformation Processing (ISIP 2014). This issue contains mostof the revised and expanded versions of the selected qualitypapers presented at the Seventh International Symposiumon Information Processing (ISIP 2014). We wish to expressour deepest thanks to the program committee members fortheir help in selecting papers for this issue and especiallythe referees of the extended versions of the selected papersfor their thorough reviews under a tight time schedule.ISIP 2014 took place on October 25-26, 2014, in Changsha,China, and was cosponsored by Jiangxi University of Scienceand Technology, China; Peoples’ Friendship University ofRussia, Russia; South China University of Technology, China;Feng Chia University, Taiwan; Henan Polytechnic University,China; Nanchang Hangkong University, China; and JiangxiUniversity of Science and Technology, China. In closing, wewould like to take this opportunity to thank the authors forthe efforts they put in the preparation of the manuscripts andin keeping the deadlines set by editorial requirements. Wehope that you will enjoy reading this special issue as muchas we did putting it together.

    Fei YuChin-Chen Chang

    Jian ShuIftikhar Ahmad

    Jun ZhangJose Maria de Fuentes

  • International Journal of

    AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    RoboticsJournal of

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Active and Passive Electronic Components

    Control Scienceand Engineering

    Journal of

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    International Journal of

    RotatingMachinery

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Hindawi Publishing Corporation http://www.hindawi.com

    Journal ofEngineeringVolume 2014

    Submit your manuscripts athttp://www.hindawi.com

    VLSI Design

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Shock and Vibration

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Civil EngineeringAdvances in

    Acoustics and VibrationAdvances in

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Electrical and Computer Engineering

    Journal of

    Advances inOptoElectronics

    Hindawi Publishing Corporation http://www.hindawi.com

    Volume 2014

    The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

    SensorsJournal of

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Chemical EngineeringInternational Journal of Antennas and

    Propagation

    International Journal of

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    Navigation and Observation

    International Journal of

    Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

    DistributedSensor Networks

    International Journal of