-
EditorialRecent Advances in Security and Privacy forWireless
Sensor Networks
Fei Yu,1 Chin-Chen Chang,2 Jian Shu,3 Iftikhar Ahmad,4
Jun Zhang,5 and Jose Maria de Fuentes6
1Peoples’ Friendship University of Russia, Moscow 117198,
Russia2Feng Chia University, Taichung 40724, Taiwan3Nanchang
Hangkong University, Nanchang 330000, China4King Saud University,
Riyadh 92144, Saudi Arabia5Deakin University, Burwood, VIC 3125,
Australia6Universidad Carlos III de Madrid, Madrid 28036, Spain
Correspondence should be addressed to Fei Yu;
[email protected]
Received 20 May 2015; Accepted 27 May 2015
Copyright © 2015 Fei Yu et al. This is an open access article
distributed under the Creative Commons Attribution License,
whichpermits unrestricted use, distribution, and reproduction in
any medium, provided the original work is properly cited.
Wireless networks have experienced explosive growth duringthe
last few years. Nowadays, there are a large variety ofnetworks
spanning from the well-known cellular networks tononinfrastructure
wireless networks such as mobile ad hocnetworks and sensor
networks. Communication security isessential to the success of
wireless sensor network applica-tions, especially for those
mission-critical applications work-ing in unattended and even
hostile environments. However,providing satisfactory security
protection in wireless sensornetworks has ever been a challenging
task due to variousnetwork and resource constraints and malicious
attacks.
In this special issue, we concentrate mainly on securityand
privacy as well as the emerging applications of wirelesssensor
network. It aims to bring together researchers andpractitioners
from wireless and sensor networking, security,cryptography, and
distributed computing communities, withthe goal of promoting
discussions and collaborations. Weare interested in novel research
on all aspects of securityin wireless sensor networks and tradeoff
between securityand performance such as QoS, dependability, and
scalability.The special issue covers industrial issues/applications
andacademic research into security and privacy for wirelesssensor
networks.
This special issue includes a collection of 14 papersselected
from 74 submissions to 9 countries or districts
(China, India, South Korea, Chennai, USA, Pakistan,
SaudiArabia,Malaysia, and Taiwan). All submitted papers followedthe
same standard (peer-reviewed by at least three indepen-dent
reviewers) as applied to regular submissions.
In the paper entitled “Accurately Identifying New QoSViolation
Driven by High-Distributed Low-Rate Denial ofService Attacks Based
on Multiple Observed Features,” J.Kang et al. propose using
multiple observed features ofnetwork traffic to identify new
high-distributed low-rateQuality of Services (QoS) violation so
that detection accuracymay be further improved.
In the paper entitled “A Self-Adaptive Wireless SensorNetwork
Coverage Method for Intrusion Tolerance Basedon Trust Value” Z.
Chen et al. propose a network coveragemethod for invasive tolerance
based on trust value of nodesby combining the trust valuemodel with
the reliable coverageoptimization.
The paper entitled “Trust-Aware and Low Energy Con-sumption
Security Topology Protocol of Wireless SensorNetwork” by Z. Chen et
al. tries to take node trust into consid-eration when building a
network topology, so as to ensure thesecurity of the network
communication.The TLES algorithmis based on the analysis of node
behavior. It develops a varietyof trust factors and then performs
comprehensive analysiswith direct information and recommended
information.
Hindawi Publishing CorporationJournal of SensorsVolume 2015,
Article ID 169305, 2 pageshttp://dx.doi.org/10.1155/2015/169305
-
2 Journal of Sensors
In the paper entitled “A Data Processing MiddlewareBased on SOA
for the Internet of Things” by F. Wang et al.,based on
characteristics of the architecture and challenges ofinformation
fusion in the IoT, the paper designs amiddlewareplatform based on
SOA architecture for the integration ofmultisource heterogeneous
information.
In the paper entitled “Survey of Security Technologieson
Wireless Sensor Networks” Q. Yang et al. summarizedresearch
progress of sensor network security issues in keymanagement,
authentication, and secure routing as three as-pects, by analyzing
and commenting on these results advan-tages and disadvantages, and
pointed out the future directionof the hot research field.
The paper entitled “Intrusion Detection Algorithm forMitigating
Sinkhole Attack on LEACH Protocol in WirelessSensor Networks” by R.
K. Sundararajan and U. Arumugamproposes an Intrusion Detection
System (IDS) mechanism todetect the intruder in the network which
uses Low EnergyAdaptive Clustering Hierarchy (LEACH) protocol for
itsrouting operation.
In the paper entitled “Parking Query in Vehicular Delay-Tolerant
Networks with Privacy Protection Based on SecureMultiparty
Computation” H. Huang et al. design the routingprotocol RPAD from
the direction and distribution densityof the vehicle and the base
station is considered to be a refer-ence.
In the paper entitled “A Novel Digital Certificate BasedRemote
Data Access Control Scheme in WSN” by W. Lianget al. a digital
certificate based remote data access controlscheme is proposed for
safe authentication of accessor inwireless sensor network
(WSN).
The paper entitled “Distributed Software-Attestation De-fense
against Sensor Worm Propagation” by J.-W. Ho pro-posed on-demand
software-attestation based scheme to stopworm propagation in sensor
network.
In the paper entitled “SensorNetworksHierarchicalOpti-mization
Model for Security Monitoring in High-SpeedRailway TransportHub” Z.
Xie andY.Qin consider the sensornetworks hierarchical optimization
problem in high-speedrailway transport hub (HRTH).
The paper entitled “B-iTRS: ABio-Inspired Trusted Rout-ing
Scheme forWireless Sensor Networks” byM. Zhang et al.presents a
novel bio-inspired trusted routing scheme (BiTRS)based on ant
colony optimization (ACO) and Physarumautonomic optimization
(PAO).
The paper entitled “Research on Handoff Delay andMobility
Management Cost of Mobility Protocols inWirelessSensor Networks” by
A. Q. Zhao and Y. Hu focused on theresearch of mobility management
cost of mobility supportprotocols and made analysis and comparison
of mobilitymanagement cost among various mobility support
proto-cols.
The paper entitled “Sequence Alignment with DynamicDivisor
Generation for Keystroke Dynamics Based UserAuthentication” by J.
Ho and D.-K. Kang proposed sequencealignment with dynamic divisor
generation (SADD) for userauthentication by using the keystroke
dynamics.
Acknowledgments
In particular, we would like to acknowledge the programcommittee
members of Seventh International Symposium onInformation Processing
(ISIP 2014). This issue contains mostof the revised and expanded
versions of the selected qualitypapers presented at the Seventh
International Symposiumon Information Processing (ISIP 2014). We
wish to expressour deepest thanks to the program committee members
fortheir help in selecting papers for this issue and especiallythe
referees of the extended versions of the selected papersfor their
thorough reviews under a tight time schedule.ISIP 2014 took place
on October 25-26, 2014, in Changsha,China, and was cosponsored by
Jiangxi University of Scienceand Technology, China; Peoples’
Friendship University ofRussia, Russia; South China University of
Technology, China;Feng Chia University, Taiwan; Henan Polytechnic
University,China; Nanchang Hangkong University, China; and
JiangxiUniversity of Science and Technology, China. In closing,
wewould like to take this opportunity to thank the authors forthe
efforts they put in the preparation of the manuscripts andin
keeping the deadlines set by editorial requirements. Wehope that
you will enjoy reading this special issue as muchas we did putting
it together.
Fei YuChin-Chen Chang
Jian ShuIftikhar Ahmad
Jun ZhangJose Maria de Fuentes
-
International Journal of
AerospaceEngineeringHindawi Publishing
Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation
http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Modelling & Simulation in EngineeringHindawi Publishing
Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume
2014
DistributedSensor Networks
International Journal of