Research Papers On Wireless Security

  • 1.

    Juneja, D., Sharma, A., Kumar, A.: A Novel and Efficient Algorithm for Deploying Mobile Sensors in Subsurface. Computer and Information Science 3(2), 94–105 (2010); ISSN 1913-8989 (Print), ISSN 1913-8997 (Online)CrossRefGoogle Scholar

  • 2.

    Juneja, D., Sharma, A., Kumar, A.: A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface. International Journal of Engineering Science and Technology 2(6), 1836–1843; ISSN: 0975-5462Google Scholar

  • 3.

    Juneja, D., Sharma, A., Kumar, A.: A Novel Application Of Extended Kalman Filter For Efficient Information Processing In Subsurfaces. International Journal of Computer Applications 17(2), 28–32 (2011); Published By FCS (Foundation of Computer Science, USA). ISSN: 0975-8887CrossRefGoogle Scholar

  • 4.

    Al-Sakib, Pathan, K., Lee, W., Hyung, Hong, S., Choong.: Security in Wireless Sensor Networks: Issues and Challenges. In: ICACT 2006 (2006)Google Scholar

  • 5.

    Lu, B., Habetler, T.G., Harley, R.G., Gutiérrez, J.A.: Applying Wireless Sensor Networks in Industrial Plant Energy Management Systems – Part I: A Closed-Loop Scheme. In: Sensors, October 30 -November 3, pp. 145–150. IEEE, Los Alamitos (2005)Google Scholar

  • 6.

    Virone, G., Wood, A., Selavo, L., Cao, Q., Fang, L., Doan, T., He, Z., Stankovic, J.A.: An Advanced Wireless Sensor Network for Health Monitoring. In: Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), Arlington, VA, April 2-4 (2006)Google Scholar

  • 7.

    Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., Jha, S.: Wireless Sensor Networks for Battlefield Surveillance. In: Land Warfare Conference 2006, Brisbane, Australia (October 2006)Google Scholar

  • 8.

    Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: ACM WSNA 2002, Atlanta, Georgia, USA, September 28, pp. 88–97 (2002)Google Scholar

  • 9.

    Wireless Sensor Networks, http://en.wikipedia.org/wiki/Wireless_Sensor_Networks

  • 10.

    Tiny Operating System, http://en.wikipedia.org/wiki/TinyOS

  • 11.

    Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security. ACM Press, New York (2004)Google Scholar

  • 12.

    Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Sensor and Ad Hoc Communications and Networks (2004)Google Scholar

  • 13.

    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the Symposium Security and Privacy (2003)Google Scholar

  • 14.

    Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004: Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (2004)Google Scholar

  • 15.

    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press, New York (2002)Google Scholar

  • 16.

    Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004: Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)Google Scholar

  • 17.

    Du, W., Han, Y.S., Deng, J., Varshney, P.K.: A Pairwise key predistribution scheme for wireless sensor networks. In: Proceedings of the ACM Conference on Computer and Communications Security (2003)Google Scholar

  • 18.

    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in Sensor Networks. In: Proceedings - IEEE INFOCOM (2004)Google Scholar

  • 19.

    Hoger, K., Andreas, W.: Protocols and Architecture for Wireless Sensor Networks. John Wiley & Sons Ltd, Chichester (2005); ISBN: 0-470-09510-5Google Scholar

  • 20.

    Perrig, R., Szewczyk, V., Wen, D., Culler, J.D.: SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiCom 2001, Rome, Italy, pp. 189–199 (2001)Google Scholar

  • 21.

    Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)CrossRefGoogle Scholar

  • 22.

    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 48–56 (2002)CrossRefGoogle Scholar

  • 23.

    Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 356–364 (2005)Google Scholar

  • 24.

    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computers, 54–62 (October 2002)Google Scholar

  • 25.

    Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS) 4(1 & 2), 1–9 (2009)Google Scholar

  • 26.

    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)Google Scholar

  • 27.

    Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), pp. 1–8 (2006)Google Scholar

  • 28.

    Krontiris, I., Dimitriou, T.D., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150–161. Springer, Heidelberg (2008)CrossRefGoogle Scholar

  • 29.

    Newsome, E., Song, S.D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM Press, New York (2004)CrossRefGoogle Scholar

  • 30.

    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384 (June 2002)Google Scholar

  • 31.

    Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting Sinkhole Attacks In Wireless Sensor Networks. In: Proceedings of the IEEE ICROS-SICE International Joint Conference, pp. 1966–1971 (2009)Google Scholar

  • 32.

    Feng, Z., Leonidas, G.: Wireless Sensor Networks (An Information Processing Approach). Morgan Kaufmann Publisher under Elsevier; ISBN:1-55860-914-8Google Scholar

  • 33.

    Deepak, G., Alberto, C., Wei, Y., Yan, Y., Jerry, Z., Deborah, E.: Networking Issues in Wireless Sensor Networks. Elsevier Science, Amsterdam (2003)Google Scholar

  • 34.

    CrossBow Technology Inc., www.xbow.com/

  • 1Peoples’ Friendship University of Russia, Moscow 117198, Russia
    2Feng Chia University, Taichung 40724, Taiwan
    3Nanchang Hangkong University, Nanchang 330000, China
    4King Saud University, Riyadh 92144, Saudi Arabia
    5Deakin University, Burwood, VIC 3125, Australia
    6Universidad Carlos III de Madrid, Madrid 28036, Spain

    Copyright © 2015 Fei Yu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


    Wireless networks have experienced explosive growth during the last few years. Nowadays, there are a large variety of networks spanning from the well-known cellular networks to noninfrastructure wireless networks such as mobile ad hoc networks and sensor networks. Communication security is essential to the success of wireless sensor network applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks.

    In this special issue, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network. It aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goal of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless sensor networks and tradeoff between security and performance such as QoS, dependability, and scalability. The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.

    This special issue includes a collection of 14 papers selected from 74 submissions to 9 countries or districts (China, India, South Korea, Chennai, USA, Pakistan, Saudi Arabia, Malaysia, and Taiwan). All submitted papers followed the same standard (peer-reviewed by at least three independent reviewers) as applied to regular submissions.

    In the paper entitled “Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features,” J. Kang et al. propose using multiple observed features of network traffic to identify new high-distributed low-rate Quality of Services (QoS) violation so that detection accuracy may be further improved.

    In the paper entitled “A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value” Z. Chen et al. propose a network coverage method for invasive tolerance based on trust value of nodes by combining the trust value model with the reliable coverage optimization.

    The paper entitled “Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network” by Z. Chen et al. tries to take node trust into consideration when building a network topology, so as to ensure the security of the network communication. The TLES algorithm is based on the analysis of node behavior. It develops a variety of trust factors and then performs comprehensive analysis with direct information and recommended information.

    In the paper entitled “A Data Processing Middleware Based on SOA for the Internet of Things” by F. Wang et al., based on characteristics of the architecture and challenges of information fusion in the IoT, the paper designs a middleware platform based on SOA architecture for the integration of multisource heterogeneous information.

    In the paper entitled “Survey of Security Technologies on Wireless Sensor Networks” Q. Yang et al. summarized research progress of sensor network security issues in key management, authentication, and secure routing as three aspects, by analyzing and commenting on these results advantages and disadvantages, and pointed out the future direction of the hot research field.

    The paper entitled “Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks” by R. K. Sundararajan and U. Arumugam proposes an Intrusion Detection System (IDS) mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for its routing operation.

    In the paper entitled “Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation” H. Huang et al. design the routing protocol RPAD from the direction and distribution density of the vehicle and the base station is considered to be a reference.

    In the paper entitled “A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN” by W. Liang et al. a digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN).

    The paper entitled “Distributed Software-Attestation Defense against Sensor Worm Propagation” by J.-W. Ho proposed on-demand software-attestation based scheme to stop worm propagation in sensor network.

    In the paper entitled “Sensor Networks Hierarchical Optimization Model for Security Monitoring in High-Speed Railway Transport Hub” Z. Xie and Y. Qin consider the sensor networks hierarchical optimization problem in high-speed railway transport hub (HRTH).

    The paper entitled “B-iTRS: A Bio-Inspired Trusted Routing Scheme for Wireless Sensor Networks” by M. Zhang et al. presents a novel bio-inspired trusted routing scheme (BiTRS) based on ant colony optimization (ACO) and Physarum autonomic optimization (PAO).

    The paper entitled “Research on Handoff Delay and Mobility Management Cost of Mobility Protocols in Wireless Sensor Networks” by A. Q. Zhao and Y. Hu focused on the research of mobility management cost of mobility support protocols and made analysis and comparison of mobility management cost among various mobility support protocols.

    The paper entitled “Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication” by J. Ho and D.-K. Kang proposed sequence alignment with dynamic divisor generation (SADD) for user authentication by using the keystroke dynamics.

    Acknowledgments

    In particular, we would like to acknowledge the program committee members of Seventh International Symposium on Information Processing (ISIP 2014). This issue contains most of the revised and expanded versions of the selected quality papers presented at the Seventh International Symposium on Information Processing (ISIP 2014). We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough reviews under a tight time schedule. ISIP 2014 took place on October 25-26, 2014, in Changsha, China, and was cosponsored by Jiangxi University of Science and Technology, China; Peoples’ Friendship University of Russia, Russia; South China University of Technology, China; Feng Chia University, Taiwan; Henan Polytechnic University, China; Nanchang Hangkong University, China; and Jiangxi University of Science and Technology, China. In closing, we would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and in keeping the deadlines set by editorial requirements. We hope that you will enjoy reading this special issue as much as we did putting it together.

    Fei Yu
    Chin-Chen Chang
    Jian Shu
    Iftikhar Ahmad
    Jun Zhang
    Jose Maria de Fuentes

    0 thoughts on “Research Papers On Wireless Security

    Leave a Reply

    Your email address will not be published. Required fields are marked *