sensors-logo

Journal Browser

Journal Browser

Recent Trends and Advances in Sensors Cybersecurity

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 31 October 2024 | Viewed by 3540

Special Issue Editors


E-Mail
Guest Editor
Keene State College, University System of New Hampshire, Concord, NH 03435, USA
Interests: data science; cybersecurity; artificial intelligence

E-Mail Website
Guest Editor
Department of Computer Science, Toronto Metropolitan University, Toronto, ON M5B 2K3, Canada
Interests: next generation wireless networks; cloud computing; computational intelligence; telecommunications network design; management and control; distributing systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Over the past two decades, we have witnessed a strong convergence of human activities with mobile computing, sensing technologies, and sensor systems in the power grid, smart cities, IoT-enabled industrial systems, healthcare, and autonomous automotive industry. Such a merging of human activities with technologies using sensors accelerates scientific discoveries and increases dramatically the opportunities for new businesses, thus resulting in creating powerful information infrastructures for critical facilities, its success, however, has also paved the way for a large number of criminal activities while happening in the cyber domain and having strong implications in the real world. Existing cybersecurity mechanisms generate a number of good ideas, they are far from completed yet due to the evolution of cyberattacks targeted at sensors and their networking systems. This Special Issue, therefore, aims to put together original research and review articles on recent advances, technologies, solutions, applications, and new challenges in this multidisciplinary research field of sensors cybersecurity, with a focus on various aspects of privacy, security, and trust across the entire cybersecurity spectrum. 

Topics of interest for this Special Issue include, but are not limited to the following:

(1) Sensors-based Critical Infrastructure Protection
(2) Network and Wireless Security on Emerging Wearable Sensors and Systems
(3) Security and Privacy of Sensors with Web and Cloud Security 
(4) Hardware and Software Security in Physical Sensors and Sensors in Industrial Practices
(5) Cybersecurity on Emerging Sensor Applications
(6) Security and Privacy on Internet of Things (IoT) Enabled Sensors
(7) Intrusion Detection and Prevention Technologies on Sensor Networks 
(8) Security Analytics and Data Mining in the Sensors Data Processing 
(9) Cryptographic Technologies and Their Applications on Sensors
(10) Identity, Access Control, and Trust Management for Sensors 
(11) Emerging Cybersecurity Issues in Chemical, Electrochemical and Gas Sensors, Microfluidics and Biosensors, Optical Sensors, Microwave Sensors, and Acoustic and Ultrasonic Sensors

Prof. Dr. Wei Lu
Prof. Dr. Isaac Woungang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 472 KiB  
Article
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection
by Saeid Sheikhi and Panos Kostakos
Sensors 2022, 22(23), 9318; https://doi.org/10.3390/s22239318 - 30 Nov 2022
Cited by 7 | Viewed by 1379
Abstract
Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional [...] Read more.
Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Sensors Cybersecurity)
Show Figures

Figure 1

17 pages, 727 KiB  
Article
A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain
by Yves Frédéric Ebobissé Djéné, Mohammed Sbai El Idrissi, Pierre-Martin Tardif, Ali Jorio, Brahim El Bhiri and Youssef Fakhri
Sensors 2022, 22(20), 7730; https://doi.org/10.3390/s22207730 - 12 Oct 2022
Cited by 1 | Viewed by 1254
Abstract
Wireless Sensors Networks are integrating human daily life at a fast rate. Applications cover a wide range of fields, including home security, agriculture, climate change, fire prevention, and so on and so forth. If WSN were initially flat networks, hierarchical, or cluster-based networks [...] Read more.
Wireless Sensors Networks are integrating human daily life at a fast rate. Applications cover a wide range of fields, including home security, agriculture, climate change, fire prevention, and so on and so forth. If WSN were initially flat networks, hierarchical, or cluster-based networks have been introduced in order to achieve a better performance in terms of energy efficiency, topology management, delay minimization, load balancing, routing techniques, etc. As cluster-based algorithms proved to be efficient in terms of energy balancing, security has been of less importance in the field. Data shared by nodes in a WSN can be very sensitive depending on the field of application. Therefore, it is important to ensure security at various levels of WSN. This paper proposes a formal modeling of the energy consumed to secure communications in a cluster-based WSN in general. The concept is implemented using the Proof of Authentication (POAh) paradigm of blockchain and applied to a Multi-hop Clustering Algorithm based on spectral classification. The studied metrics are residual energy in the network, the number of alive nodes, first and last dead node. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Sensors Cybersecurity)
Show Figures

Graphical abstract

Back to TopTop