Recent Advances in Security and Privacy for Wireless Sensor Networks 2016
Guest Editors: Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, and Jose M. De Fuentes- Recent Advances in Security and Privacy for Wireless Sensor Networks 2016, Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, and Jose Maria de Fuentes
Editorial (3 pages), Article ID 3057534, Volume 2017 (2017) - An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing, Jin-Xin Hu, Chin-Ling Chen, Chun-Long Fan, and Kun-hao Wang
Research Article (11 pages), Article ID 3734764, Volume 2017 (2017) - Identity Recognition Using Biological Electroencephalogram Sensors, Wei Liang, Liang Cheng, and Mingdong Tang
Research Article (9 pages), Article ID 1831742, Volume 2016 (2016) - Privacy Models in Wireless Sensor Networks: A Survey, J. M. de Fuentes, L. González-Manzano, and O. Mirzaei
Review Article (18 pages), Article ID 4082084, Volume 2016 (2016) - A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks, Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, and Qun Ding
Research Article (9 pages), Article ID 1547963, Volume 2016 (2016) - WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks, Iman Almomani, Bassam Al-Kasasbeh, and Mousa AL-Akhras
Research Article (16 pages), Article ID 4731953, Volume 2016 (2016) - Supporting Business Privacy Protection in Wireless Sensor Networks, Nan Feng, Zhiqi Hao, Sibo Yang, and Harris Wu
Research Article (11 pages), Article ID 7638149, Volume 2016 (2016) - WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs, Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Ammar Abu Znaid, Yusor Rafid Bahar Al-Mayouf, and Suleman Khan
Research Article (12 pages), Article ID 3428730, Volume 2016 (2016) - R-bUCRP: A Novel Reputation-Based Uneven Clustering Routing Protocol for Cognitive Wireless Sensor Networks, Mingchuan Zhang, Ruijuan Zheng, Ying Li, Qingtao Wu, and Liang Song
Research Article (9 pages), Article ID 5986265, Volume 2016 (2016) - A Passenger Flow Risk Forecasting Algorithm for High-Speed Railway Transport Hub Based on Surveillance Sensor Networks, Zhengyu Xie and Yong Qin
Research Article (6 pages), Article ID 5647909, Volume 2016 (2016) - Routing Algorithm with Uneven Clustering for Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, and Jun Wang
Research Article (9 pages), Article ID 7542907, Volume 2016 (2016) - Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks, M. Saud Khan and Noor M. Khan
Research Article (9 pages), Article ID 9783072, Volume 2016 (2016) - A Novel Nonlinear Multitarget -Degree Coverage Preservation Protocol in Wireless Sensor Networks, Zeyu Sun, Xiaofei Xing, Chuanfeng Li, Yalin Nie, and Yangjie Cao
Research Article (13 pages), Article ID 3434961, Volume 2016 (2016) - AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks, Farzad Kiani
Research Article (10 pages), Article ID 8743927, Volume 2016 (2016) - An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs, Haiping Huang, Tianhe Gong, Tao Chen, Mingliang Xiong, Xinxing Pan, and Ting Dai
Research Article (13 pages), Article ID 9021650, Volume 2016 (2016) - Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks, AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, and Imran Baig
Research Article (15 pages), Article ID 5071617, Volume 2016 (2016) - System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks, Kresimir Grgic, Drago Zagar, and Visnja Krizanovic Cik
Research Article (20 pages), Article ID 6206353, Volume 2016 (2016) - Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks, Zeeshan Iqbal, S. Khan, Amjad Mehmood, Jaime Lloret, and Nabil Ali Alrajeh
Research Article (18 pages), Article ID 5486437, Volume 2016 (2016) - Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks, Jiye Kim, Jongho Moon, Jaewook Jung, and Dongho Won
Research Article (17 pages), Article ID 4393721, Volume 2016 (2016) - RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN, Wei Liang, Zhiqiang Ruan, Yuntao Wang, and Xiaoyan Chen
Research Article (11 pages), Article ID 2098680, Volume 2016 (2016) - Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks, Katarzyna Mazur, Bogdan Ksiezopolski, and Radoslaw Nielek
Research Article (13 pages), Article ID 5017248, Volume 2016 (2016) - Study of Wireless Authentication Center with Mixed Encryption in WSN, Yiqin Lu, Jing Zhai, Ronghuan Zhu, and Jiancheng Qin
Research Article (7 pages), Article ID 9297562, Volume 2016 (2016) - Enhancing Energy Efficiency of Wireless Sensor Network through the Design of Energy Efficient Routing Protocol, Noor Zaman, Low Tang Jung, and Muhammad Mehboob Yasin
Research Article (16 pages), Article ID 9278701, Volume 2016 (2016) - Information Security of PHY Layer in Wireless Networks, Weidong Fang, Fengrong Li, Yanzan Sun, Lianhai Shan, Shanji Chen, Chao Chen, and Meiju Li
Review Article (10 pages), Article ID 1230387, Volume 2016 (2016) - Prediction Approach of Critical Node Based on Multiple Attribute Decision Making for Opportunistic Sensor Networks, Qifan Chen, Linlan Liu, Zhiyong Yang, and Kai Guo
Research Article (8 pages), Article ID 8246030, Volume 2016 (2016) - Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks, Hui He, Dongyan Zhang, Xing Wang, Min Liu, Weizhe Zhang, and Junxi Guo
Research Article (11 pages), Article ID 6047023, Volume 2016 (2016)