- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 362385, 1 page
Wireless Sensor Network Security
1Intelligent Automation, Inc. Rockville, MP 20855, USA
2Hankyong National University, Anseong, Republic of Korea
3UFMG, Pampulha, MG, Brazil
4University of New South Wales, Kensington, NSW, Australia
Received 16 December 2012; Accepted 16 December 2012
Copyright © 2013 An Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless sensor networks consist of a large number of low-cost, low-power, and multifunctional sensor nodes that communicate over short distances through wireless links. Such sensor networks are ideal candidates for a wide range of applications such as monitoring of critical infrastructures, data acquisition in hazardous environments, industry control systems, vehicular networks, and military operations. Wireless sensor networks introduce new security challenges due to their dynamic topology, severe resource constraints, and absence of a trusted infrastructure.
The purpose of this special issue is to publish high-quality research papers as well as review articles addressing recent advances of wireless sensor network security.
In this special issue, we will explore the topic of security challenges and solutions for the wide application of wireless sensor networks in different areas, such as RFID and smart grid. RFID has been widely used in logistics and internet of things. Smart grid leverages sensor networks to better balance the load of the power grid. Both of them have great impact on the daily life and are weak points of the whole economy, which attract the attention of terrorists. The feasible attacks and defense solutions are still not clear. The papers in this volume also cover several important foundational security services for wireless sensor networks, such as key management, key distribution, secure cluster formation, secure architecture for multihop communication, intrusion prediction, and secure localization. All these foundational security services are critical bases for application of wireless sensor networks.
We hope that the papers in this volume engender further thinking about new security challenges for wireless sensor networks and even further “out-of-the-box” ideas about how to solve new security problems for wireless sensor networks.
Leonardo B. Oliveira