Journal of Sensors

Recent Advances in Security and Privacy for Wireless Sensor Networks


Publishing date
10 Apr 2015
Status
Published
Submission deadline
21 Nov 2014

Lead Editor

1Peoples' Friendship University of Russia, Moscow, Russia

2Feng Chia University, Taichung, Taiwan

3Nanchang Hangkong University, Nanchang, China

4King Saud University, Riyadh, Saudi Arabia

5Deakin University, Melbourne, Australia

6Universidad Carlos III de Madrid, Madrid, Spain


Recent Advances in Security and Privacy for Wireless Sensor Networks

Description

Wireless networks have experienced explosive growth during the last few years. Nowadays, there are a large variety of networks spanning from the well-known cellular networks to noninfrastructure wireless networks such as mobile ad hoc networks and sensor networks. Communication security is essential to the success of wireless sensor network applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks.

In this special issue, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network. It aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goal of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless sensor networks and tradeoff between security and performance such as QoS, dependability, and scalability. The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.

Potential topics include, but are not limited to:

  • Attacks and countermeasures
  • Authentication and access control
  • Computer-aided tool for security
  • Cross-layer design for security
  • Cryptographic protocol
  • Denial of service (DoS)
  • Key management
  • Information hiding
  • Intrusion detection and response
  • Malicious behavior detection and analysis
  • Privacy and anonymity
  • Secure localization and synchronization
  • Security and performance tradeoff
  • Security policy and enforcement issues
  • Security protocols analysis, design, and proof
  • Secure routing/MAC
  • Surveillance and monitoring
  • Trust establishment and management

Articles

  • Special Issue
  • - Volume 2015
  • - Article ID 169305
  • - Editorial

Recent Advances in Security and Privacy for Wireless Sensor Networks

Fei Yu | Chin-Chen Chang | ... | Jose Maria de Fuentes
  • Special Issue
  • - Volume 2015
  • - Article ID 716468
  • - Research Article

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network

Zuo Chen | Min He | ... | Kai Chen
  • Special Issue
  • - Volume 2015
  • - Article ID 430456
  • - Research Article

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

Zuo Chen | Xue Li | ... | Qian Zhang
  • Special Issue
  • - Volume 2015
  • - Article ID 465402
  • - Research Article

Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

Jian Kang | Mei Yang | Junyao Zhang
  • Special Issue
  • - Volume 2015
  • - Article ID 140217
  • - Review Article

A Review on Sensor Network Issues and Robotics

Ji Hyoung Ryu | Muhammad Irfan | Aamir Reyaz
  • Special Issue
  • - Volume 2015
  • - Article ID 179520
  • - Research Article

Research on Handoff Delay and Mobility Management Cost of Mobility Protocols in Wireless Sensor Networks

A. Q. Zhao | Y. Hu
  • Special Issue
  • - Volume 2015
  • - Article ID 842392
  • - Review Article

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang | Xiaogang Zhu | ... | Xiqiang Che
  • Special Issue
  • - Volume 2015
  • - Article ID 203814
  • - Research Article

Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

Ranjeeth Kumar Sundararajan | Umamakeswari Arumugam
  • Special Issue
  • - Volume 2015
  • - Article ID 874782
  • - Research Article

Distributed Software-Attestation Defense against Sensor Worm Propagation

Jun-Won Ho
  • Special Issue
  • - Volume 2015
  • - Article ID 420912
  • - Research Article

Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation

Haiping Huang | Juan Feng | ... | Hua Dai
Journal of Sensors
 Journal metrics
Acceptance rate30%
Submission to final decision78 days
Acceptance to publication38 days
CiteScore3.900
Impact Factor1.595
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.