Journal of Sensors

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016


Status
Published

Lead Editor

1Peoples' Friendship University of Russia, Moscow, Russia

2Feng Chia University, Taichung, Taiwan

3Nanchang Hangkong University, Nanchang, China

4King Saud University, Riyadh, Saudi Arabia

5Deakin University, Melbourne, Australia

6Universidad Carlos III de Madrid, Madrid, Spain


Recent Advances in Security and Privacy for Wireless Sensor Networks 2016

Description

Wireless networks have experienced explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to noninfrastructure wireless networks such as mobile ad hoc networks and sensor networks. Communication security is essential to the success of wireless sensor network applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks.

In this special issue, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network. It aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goal of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless sensor networks and tradeoff between security and performance such as QoS, dependability, and scalability. The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.

Potential topics include, but are not limited to:

  • Attacks and countermeasures
  • Authentication and access control
  • Computer-aided tool for security
  • Cross-layer design for security
  • Cryptographic protocol
  • Denial of service (DoS)
  • Key management
  • Information hiding
  • Intrusion detection and response
  • Malicious behavior detection and analysis
  • Privacy and anonymity
  • Secure localization and synchronization
  • Security and performance tradeoff
  • Security policy and enforcement issues
  • Security protocols analysis, design, and proof
  • Secure routing/MAC
  • Surveillance and monitoring
  • Trust establishment and management

Articles

  • Special Issue
  • - Volume 2016
  • - Article ID 7542907
  • - Research Article

Routing Algorithm with Uneven Clustering for Energy Heterogeneous Wireless Sensor Networks

Ying Zhang | Wei Xiong | ... | Jun Wang
  • Special Issue
  • - Volume 2016
  • - Article ID 9783072
  • - Research Article

Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks

M. Saud Khan | Noor M. Khan
  • Special Issue
  • - Volume 2016
  • - Article ID 3434961
  • - Research Article

A Novel Nonlinear Multitarget -Degree Coverage Preservation Protocol in Wireless Sensor Networks

Zeyu Sun | Xiaofei Xing | ... | Yangjie Cao
  • Special Issue
  • - Volume 2016
  • - Article ID 8743927
  • - Research Article

AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

Farzad Kiani
  • Special Issue
  • - Volume 2016
  • - Article ID 9021650
  • - Research Article

An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

Haiping Huang | Tianhe Gong | ... | Ting Dai
  • Special Issue
  • - Volume 2016
  • - Article ID 5071617
  • - Research Article

Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks

AtaUllah Ghafoor | Muhammad Sher | ... | Imran Baig
  • Special Issue
  • - Volume 2016
  • - Article ID 6206353
  • - Research Article

System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

Kresimir Grgic | Drago Zagar | Visnja Krizanovic Cik
  • Special Issue
  • - Volume 2016
  • - Article ID 5486437
  • - Research Article

Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks

Zeeshan Iqbal | S. Khan | ... | Nabil Ali Alrajeh
  • Special Issue
  • - Volume 2016
  • - Article ID 4393721
  • - Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Jiye Kim | Jongho Moon | ... | Dongho Won
  • Special Issue
  • - Volume 2016
  • - Article ID 2098680
  • - Research Article

RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

Wei Liang | Zhiqiang Ruan | ... | Xiaoyan Chen
Journal of Sensors
 Journal metrics
Acceptance rate30%
Submission to final decision78 days
Acceptance to publication38 days
CiteScore3.900
Impact Factor1.595
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.