sensors-logo

Journal Browser

Journal Browser

Cryptography and Information Security in Wireless Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (31 January 2021) | Viewed by 15177

Special Issue Editors


E-Mail Website
Guest Editor
Department of Communications Engineering, University of Málaga, 29071 Málaga, Spain
Interests: cryptography; RFID security; wireless sensor networks and IoT Security; pseudo-random bit generators; lightweight cryptography

E-Mail Website
Guest Editor
Institute of Fundamental Physics and Mathematics, Department of Applied Mathematics, University of Salamanca, 37008 Salamanca, Spain
Interests: cryptography; mathematical modeling; wireless sensor network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Technology and Communications, Institute of Physical and Information Technologies (ITEFI), Spanish National Research Council (CSIC), C/ Serrano 144, 28006 Madrid, Spain
Interests: cryptography; cybersecurity; information security; number theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless sensor networks (WSN) traditionally refer to a set of hundreds or thousands of devices with the ability to monitor certain physical parameters and send them cooperatively to a main node, the sink, which acts as an interface with the rest of the world. The diversity of services, applications, and devices applied in WSN has increased considerably in recent times, resulting in an increase of security requirements, threats, and weaknesses. Cryptographic primitives and algorithms and information security protocols are being proposed as solutions in many different environments, from the most classical, such as stream ciphers, authentication mechanisms or key distribution schemes, to the most recent ones, such as critical infrastructure protection, epidemic models for malware, jamming, and cyber-attack propagation, the application of artificial intelligence, etc.

This Special Issue focuses on cryptographic applications and information security protocols, algorithms, and systems for wireless sensor networks. We welcome original research contributions and state-of-the-art reviews from academia and industry. The Special Issue topics include but are not limited to:

  • Symmetric-key systems (stream ciphers, block ciphers) in WSN;
  • Asymmetric-key systems in WSN;
  • Cryptanalysis in WSN;
  • Key distribution schemes and authentication in WSN;
  • Epidemic models applied to WSN (malware, jamming, cyber-attack propagation);
  • Physical-layer security in WSN;
  • Security in IoT devices;
  • Information security in WSN;
  • Lightweight cryptography;
  • Sensor-based user profiling and continuous authentication.
Dr. Alberto Peinado Domínguez
Dr. Angel Martín-del-Rey
Dr. Luis Hernández-Encinas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless sensor networks
  • Cryptography
  • Cryptanalysis
  • Key management and authentication
  • Cybersecurity
  • Propagation attacks
  • Physical-layer security
  • Security in IoT devices
  • Information security
  • Lightweight cryptography

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

23 pages, 433 KiB  
Article
WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks
by Deok Kyu Kwon, Sung Jin Yu, Joon Young Lee, Seung Hwan Son and Young Ho Park
Sensors 2021, 21(3), 936; https://0-doi-org.brum.beds.ac.uk/10.3390/s21030936 - 30 Jan 2021
Cited by 45 | Viewed by 5505
Abstract
Wireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway. However, it can suffer from serious [...] Read more.
Wireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway. However, it can suffer from serious security issues because susceptible messages are exchanged through an insecure channel. Therefore, secure authentication protocols are necessary to prevent security flaws in WSN. In 2020, Moghadam et al. suggested an efficient authentication and key agreement scheme in WSN. Unfortunately, we discover that Moghadam et al.’s scheme cannot prevent insider and session-specific random number leakage attacks. We also prove that Moghadam et al.’s scheme does not ensure perfect forward secrecy. To prevent security vulnerabilities of Moghadam et al.’s scheme, we propose a secure and lightweight mutual authentication protocol for WSNs (WSN-SLAP). WSN-SLAP has the resistance from various security drawbacks, and provides perfect forward secrecy and mutual authentication. We prove the security of WSN-SLAP by using Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. In addition, we evaluate the performance of WSN-SLAP compared with existing related protocols. We demonstrate that WSN-SLAP is more secure and suitable than previous protocols for WSN environments. Full article
(This article belongs to the Special Issue Cryptography and Information Security in Wireless Sensor Networks)
Show Figures

Figure 1

15 pages, 564 KiB  
Article
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
by Hwajeong Seo, Hyeokdong Kwon, Hyunji Kim and Jaehoon Park
Sensors 2020, 20(13), 3788; https://0-doi-org.brum.beds.ac.uk/10.3390/s20133788 - 6 Jul 2020
Cited by 8 | Viewed by 2902
Abstract
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To achieve high-speed implementation, primitive operations, including rotation operation, a substitute layer, and a diffusion layer, are carefully optimized for [...] Read more.
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To achieve high-speed implementation, primitive operations, including rotation operation, a substitute layer, and a diffusion layer, are carefully optimized for the target low-end embedded processor. The proposed ARIA implementation supports the electronic codebook (ECB) and the counter (CTR) modes of operation. In particular, the CTR mode of operation is further optimized with the pre-computed table of two add-round-key, one substitute layer, and one diffusion layer operations. Finally, the proposed ARIA-CTR implementations on 8-bit AVR microcontrollers achieved 187.1, 216.8, and 246.6 clock cycles per byte for 128-bit, 192-bit, and 256-bit security levels, respectively. Compared with previous reference implementations, the execution timing is improved by 69.8%, 69.6%, and 69.5% for 128-bit, 192-bit, and 256-bit security levels, respectively. Full article
(This article belongs to the Special Issue Cryptography and Information Security in Wireless Sensor Networks)
Show Figures

Figure 1

Review

Jump to: Research

23 pages, 328 KiB  
Review
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
by Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano and Luis Hernández Encinas
Sensors 2021, 21(1), 92; https://0-doi-org.brum.beds.ac.uk/10.3390/s21010092 - 25 Dec 2020
Cited by 23 | Viewed by 5283
Abstract
Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection and, typically, are implemented only when accessing the device. [...] Read more.
Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection and, typically, are implemented only when accessing the device. Nevertheless, in many occasions it is necessary to carry out user authentication in a continuous manner to guarantee an allowed use of the device while protecting authentication data. In this work, we first review the state of the art of Continuous Authentication (CA), User Profiling (UP), and related biometric databases. Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization. The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric features with privacy-preserving approaches. Full article
(This article belongs to the Special Issue Cryptography and Information Security in Wireless Sensor Networks)
Show Figures

Figure 1

Back to TopTop