About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 565076, 3 pages

Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

1School of Information Science and Engineering, Central South University, Changsha 410083, China
2Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada B2G 2W5
3School of Symbiotic Systems Science and Technology, Fukushima University, Fukushima 960-1296, Japan
4School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu 965-8580, Japan

Received 12 August 2013; Accepted 12 August 2013

Copyright © 2013 Anfeng Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Wireless sensor networks (WSNs) are a kind of multihop and self-organizing networks formed by the way of wireless communication and composed by a large number of low-cost microsensor nodes deployed in the monitoring area. The sensor nodes cooperate to perceive and acquire the process and transmit the perceived object information in the network covering within the geographical area and finally send the information to the sink. In the recent decade, with the rapid development of various kinds of key technology in WSNs, they are widely applied to many especial environments, such as, military defense, environment detection, biological health, and disaster-relief work. Due to the limited computing ability, battery capacity, and storage capacity of sensor nodes, energy-efficient data collection became a nonnegligible research issue in WSNs. Also the open architecture in receiving data and transmitting data of WSNs is vulnerable to various security attacks during the data collection process. These two fundamental issues motivate us to have this special issue addressing the recent advances which are mentioned in Table 1 on security and energy-efficient data collection in WSNs.

Table 1: The main content of secure and energy-efficient data collection researches in WSNs.

In response to this call for papers, we have received a total of 36 high-quality submissions, and 13 papers have been selected for publication after a rigorous review process due to the space limit. The papers in this special issue are divided into three thematic groups as follows.

The first set of the seven papers emphasizes the security technology with a series of key agreement protocol, encryption, authentication, and trust scheme to solve the special security issues. According to the current researches in security technology in Table 1, the seven papers are significant for the improvement of the security of the network. “A hybrid authenticated group key agreement protocol in wireless sensor networks” by Y. Li et al. proposed an AGKA protocol which reduced the high cost public-key operations at the sensor side and replaced them with efficient symmetric-key based operations. In “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks” by J. Zhou, the author aimed to perform a secure routing protocol based on encryption and authentication which encrypted all communication packets and authenticated the source nodes and the BS. “Trust management scheme based on D-S evidence theory for wireless sensor network” by R. Feng et al. proposed a trust management scheme based on revised Dempster-Shafer (D-S) evidence theory. “An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks” by Y. Pan et al. improved the Marmol et al.’s ant algorithm based trust model. “Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network” by Y. Wu et al. introduces the security on the body area network with lightweight symmetric cryptography. “Noncommutative lightweight signcryption for wireless sensor networks” by L. Gu et al. has proposed a braid-based signcryption scheme and developed a key establishment protocol for wireless sensor networks. “A cross-layer security scheme of web services-based communications for IEEE 1451 sensor and actuator networks” by J. Wu et al. dealt with the requirements, of authentication, integrity, confidentiality and availability.

The second set of the three papers focuses on how to improve the network’s energy efficiency and prolong the lifetime of the network within the security assurance. “An energy-efficient key predistribution scheme for secure wireless sensor networks using eigenvector” by S. J. Choi et al. proposes a new robust key predistribution scheme reducing the overhead requirement of secure connectivity and energy consumption. In “An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks” by J. Ren et al. proposed an energy-efficient cyclic diversionary routing (CDR) scheme against global eavesdroppers for preserving location privacy and maximizing lifetime of wireless sensor networks. “Energy-efficiency of cooperative communication with guaranteed E2E reliability in WSNs” by D. Zhang and Z. Chen addressed the energy efficiency of cooperative communication in WSNs.

The last set of the rest mainly aims at the issues or the way of data collection. According to Table 1, the researches about secure data aggregation start in “A secure and efficient data aggregation framework in vehicular sensing networks” by S. Du et al. which introduced a basic aggregation scheme which could aggregate the data and the message authentication codes by using syntactic aggregation and cryptographic aggregation. A work that used a low-cost, reliable, and microchip-based wireless transmission solution to real-time collect earthquake data across local and wide areas is in “Real-time seismic data acquisition via a paired ripple transmission protocol” by J.-L. Lin et al. Besides, “Constructing a CDS-based network backbone for data collection in wireless sensor networks” by X. Kui et al. investigates the problem of constructing an energy balanced CDS to effectively preserve the energy of nodes in order to extend the network lifetime in data collection.

Compared with the recent researches in Table 1, all 13 papers in this special issue represent the spirit of innovation and important leaps in this field. They improve the performance in security and energy efficiency in data collection in WSNs and could be a guide and cornerstone to the future work.


The guest editor thanks all the authors who have contributed their time and effort submitting their outstanding works in response to the call for papers, regardless of whether their works have been published in this special issue or not on account of the space limitations. The guest editors are also grateful to all the reviewers for their valuable suggestions to the authors on improving the issues and presentation of their papers.

Anfeng Liu
Laurence T. Yang
Motoki Sakai
Mianxiong Dong


  1. S. Guo, A.-N. Shen, and M. Guo, “A secure and scalable rekeying mechanism for hierarchical wireless sensor networks,” IEICE Transactions on Information and Systems, vol. 93, no. 3, pp. 421–429, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Ni, G. Chen, and J. Li, “Escrowable identity-based authenticated key agreement protocol with strong security,” Computers & Mathematics with Applications, vol. 65, no. 9, pp. 1339–1349, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Yin, Y. Wang, G. Min, S. Berton, R. Guo, and C. Lin, “A secure multipath routing protocol in mobile ad hoc networks,” Concurrency and Computation, vol. 22, no. 4, pp. 481–502, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169–183, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Rottondi, G. Verticale, and C. Krauss, “Distributed privacy-preserving aggregation of metering data in smart grids,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1342–1354, 2013. View at Publisher · View at Google Scholar
  6. S. Xi and X. Di, “A reversible watermarking authentication scheme for wireless sensor networks,” Information Sciences, vol. 240, pp. 173–183, 2013. View at Publisher · View at Google Scholar
  7. R. Garg, A. L. Varna, and M. Wu, “An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 717–730, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. K.-J. Kim and S.-P. Hong, “Privacy care architecture in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 369502, 7 pages, 2013. View at Publisher · View at Google Scholar
  9. H. J. G. Oberholzer and M. S. Olivier, “Privacy contracts incorporated in a privacy protection framework,” Computer Systems Science and Engineering, vol. 21, no. 1, pp. 5–16, 2006. View at Scopus
  10. Z. Zhu and G. Cao, “Toward privacy preserving and collusion resistance in a location proof updating system,” IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp. 51–64, 2013. View at Publisher · View at Google Scholar
  11. H. T. Xiao, X. Zhao, and H. Ogai, “A new clustering routing algorithm for wsn based on brief artificial fish-school optimization and ant colony optimization,” IEEE Transactions on Electronics, Information and Systems, vol. 133, no. 7, pp. 1339–1349, 2013.
  12. S. M. Kumar, N. Rajkumar, and W. C. C. Mary, “Dropping false packet to increase the network lifetime of wireless sensor network using EFDD protocol,” Wireless Personal Communications, vol. 70, no. 4, pp. 1697–1709, 2013. View at Publisher · View at Google Scholar