About this Journal Submit a Manuscript Table of Contents

Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

Call for Papers

Wireless sensor networks (WSNs) have been widely recognized as a ubiquitous and general approach for extensive applications in unattended environment, such as habitat monitoring, surveillance, and tracking for military. It consists of a large number of low-cost and low-power sensor nodes, which collaborate with each other to collect data and disseminate them to sink through an established routing path. Such architecture makes WSNs vulnerable to various security attacks during the data collection process. The privacy is another important issue in WSNs, which can be embodied in contextual privacy, source-location privacy, footprint privacy, and communication privacy. Moreover, sensors are limited by the battery capacity, and the outage of sensors may lead to a cessation of WSNs. Therefore, it is of great significance to study the energy-efficient strategies for attack detection, defense, attacker localization, and privacy preservation.

The purpose of this special issue is to publish high-quality research papers as well as review articles addressing recent advances on secure and energy-efficient data collection in wireless sensor networks. Potential topics include, but are not limited to:

  • Available models for attack detection, defense, and attacker localization as well as methods for analysis and optimization
  • Data collection schemes with integrated consideration of energy efficiency and security in wireless sensor networks
  • Malicious behavior detection, prevention, localization, and fault tolerance for WSNs
  • Security as well as privacy performance modeling, analysis, and optimization for WSNs
  • Survivable and resilient attack defense techniques and issues
  • Applications of WSNs for privacy, security, energy efficiency, safety, and so forth
  • Experimental results on secure and energy-efficient data collection or on preserving privacy for WSNs
  • Energy-efficient countermeasure to various attacks for data gathering in WSNs such as selective forwarding attacks, wormholes attacks, sybil attacks´╝îsinkhole attacks, black hole attacks, clone attacks, injected false data attacks, jamming attacks, denial-of-sleep attacks, and denial-of-service attacks
  • Available privacy preserving model, policy, and optimization for WSNs
  • Source location or sink location privacy issue
  • Communication privacy, footprint privacy, and other privacy issues in wireless sensor networks
  • Other energy-efficient, security, and privacy issues in WSNs

Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://www.hindawi.com/journals/ijdsn/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/ijdsn/sedc/ according to the following timetable:

Manuscript DueFriday, 4 January 2013
First Round of ReviewsFriday, 29 March 2013
Publication DateFriday, 24 May 2013

Lead Guest Editor

  • Anfeng Liu, School of Information Science and Engineering, Central South University, Changsha, China

Guest Editors

  • Laurence T. Yang, Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada B2G 2W5
  • Motoki Sakai, School of Symbiotic Systems Science and Technology, Fukushima University, Fukushima 960-1296, Japan
  • Mianxiong Dong, School of Computer Science and Engineering, the University of Aizu, Japan