Special Issue (24-29):Energy-Efficient Security Protocols for Wireless Sensor Networks in Harsh Environments
Posted on 2024-08-27
Energy-Efficient Security Protocols for Wireless Sensor Networks in Harsh Environments
The goal of energy-efficient routing protocols is to extend the lifespan of each SN while lowering energy usage. Conversely, energy-balanced routing strategies increase network longevity by distributing power usage among network nodes in an equitable manner. While IlTESLA offers authenticated broadcast for networks with extreme resource constraints, SNEP concentrates on data confidentiality, two-party authentication of data, and data freshness. Among the clustering routing methods used in wireless sensor networks is LEACH (Low Energy Adaptive Clustering Hierarchy). The benefit of LEACH is that every node has an equal chance of becoming a cluster head, which results in a reasonably balanced energy dissipation across all nodes. A thorough introduction to the theoretical and practical elements of these issues is given in Energy Efficiency in Wireless Networks via Fractional Programming Theory, which also discusses the solutions made possible by this method. All engineers and researchers working on contemporary communication systems will find it useful. The deployment of a battery source to power the sensor node is the foundation of the battery-driven classification; the battery itself may be fixed, removable, or rechargeable.
A hardware and software network combined, the Wireless Sensor Network (WSN) employs a set of sensors to identify physical occurrences. WSN is widely used in both consumer and industrial applications. A crucial component of WSN is privacy; all data that is used, transferred, or kept must be secured. For WSN routing methods to transmit precise and secure data to users across the network, security services are required. In WSNs, a routing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) groups sensor nodes into clusters. Multi-hop routing has a number of security and privacy-related problems. Snooping, sinkholes, tampering with Sybil, clones, wormholes, spoofing, and other concerns impact the WSNs' availability, integrity, and data secrecy. Power amplifiers (PAs) are widely acknowledged as one of the most important parts of wireless communication systems, and they account for a large portion of the system's energy consumption. An energy-efficient building or gadget requires very less energy to operate. Giving WSN nodes the ability to harvest energy from their surroundings results in Energy Harvesting-based WSNs (EHWSNs).
Numerous energy sources, including wind, solar power, mechanical vibrations, temperature changes, magnetic fields, and others, can be harnessed by energy harvesting. The primary challenge in developing a data collection method for wireless sensor networks (WSNS) is figuring out how to minimise sensor node energy consumption while still fulfilling application and user requirements. As was already mentioned, because WEP transmits communications over radio waves, it has the least secure protocol. Hackers may already easily grab the data as it travels thanks to this. A series of actions designed to guarantee data security. When paired with a communications protocol, it enables two parties to send data securely. In general, the phrase describes a group of related parts that function together. The Secure Sockets Layer (SSL) protocol guarantees message integrity, authenticates the origins of data, and encrypts data. Through a handshake, SSL generates session keys and negotiates security session parameters to authenticate the server. Articles are invited that explore Energy-Efficient Security Protocols for Wireless Sensor Networks in Harsh Environments. Case studies and practitioner perspectives are also welcome.
Potential topics include but are not limited to the following:
- An examination of wireless sensor network security mechanisms.
- Method and algorithm development for wireless sensor networks.
- Studying wireless sensor network security techniques.
- A description of wireless sensor network security concerns.
- A study of security measures and assaults for wireless sensor networks.
- An overview of vulnerabilities, defences, and issues with wireless sensor networks.
- Techniques for detecting intrusions in wireless sensor networks that are connected with the Internet of Things.
- A low-power protocol for wireless sensor network key management.
- A thin security protocol designed for sensor networks that are wireless.
- An overview of military specifics and security concerns related to wireless sensor networks.
- Regarding the safety of communication protocols based on clusters for wireless sensor networks.
- Techniques for secure localization in wireless sensor networks.
Editor Details:
Dr. Yusliza Yusoff
Senior Lecturer in Computer Science Department,
Universiti Teknologi Malaysia, Malayisa.
Email: [email protected], [email protected]
Google Scholar: https://scholar.google.co.in/citations?user=6lS61CwAAAAJ&hl=en
Short Bio: Dr. Yusliza Yusoff holds a Ph.D. in Computer Science from Universiti Teknologi Malaysia, with research focused on Multi Objective Evolutionary Algorithms for Machining Parameters Optimization. She has international experience from Hochschule Darmstadt University of Applied Science, where she completed an academic attachment. Dr. Yusoff's expertise spans computational intelligence, AI, numerical analysis, optimization, and applied mathematics. Her research includes algorithms, simulation, modeling, and machining. She also holds a Master’s degree in Computer Science and a Bachelor's degree in Computer Science and System Engineering from institutions in Malaysia and Japan, respectively.
Dr. Kai-Qing Zhou
Associate Professor of Computer Science,
Jishou University, China.
Email: [email protected]
Google Scholar: https://scholar.google.com/citations?user=XFvTC7YAAAAJ&hl=zh-CN
Short Bio: Dr. Kai-Qing Zhou is an Associate Professor of Computer Science, as well as the deputy dean of the School of Communication and Electronic Engineering at Jishou University. He obtained his Ph.D. degree in Computer Science at Universiti Teknologi Malaysia in 2015, master's degrees in Computer Applied Technique at Changsha University of Science and Technology in 2011, and bachelor's degrees in Computer Science and Technology at Jishou University in 2006. Zhou's current research interest lies in knowledge representation and application, including fuzzy Petri net, soft computing technique, knowledge graph, and its applications. His broad research interests focus on clinical decision support system. He is also an author of over 50 published research papers in impact journals and conferences.
Dr. Murad A. Rassam
Assistant Professor of Cybersecurity,
Qassim University, Saudi Arabia.
Email: [email protected]
Google Scholar: https://scholar.google.com/citations?user=gT83IVcAAAAJ&hl=en
Short Bio: Dr. Murad A. Rassam received a B.Sc. degree in Information Engineering from the Faculty of Information Engineering, Tishreen University, Syria, in 2005, an M.Sc. degree in Information Security from Universiti Teknologi Malaysia, UTM, Malaysia, in 2010, and a Ph.D. degree in Computer Science (information security) from the Faculty of Computing, UTM, in 2013. He is currently an Assistant Professor of Cybersecurity at the College of Computer, Qassim University, Saudi Arabia. He is the recipient of several academic awards and recognitions, including the UTM Alumni Award, UTM Best Postgraduate Student Award, and UTM Excellence Award. His research interests include, but are not limited to, information assurance and security, network security, wireless sensor networks, vehicular ad hoc networks, cloud computing security, and applied data mining and machine learning in the information security domain.
Timeline:
Manuscript Submission Deadline: 25th Jan, 2025
Authors Notification: 25th Mar, 2025
Revised Papers Due: 05th Jun, 2025
Final notification: 15th Aug, 2025