Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
International Journal of Distributed Sensor Networks
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. The IoT concerns the connection of physical devices (cars, thermostats, smartphones, home lighting, tide sensors, smart meters, etc.) to the Internet. There are more devices connected to the Internet than people on the planet, and the prediction is that there will be 50 billion IoT devices by 2020. The IoT brings with it many security challenges,
... urity challenges, and this issue will explore these challenges and look at some emerging solutions. Of course these challenges fall into existing security and identity challenges but are exacerbated and modified by the specific aspects of the IoT. In this special issue, we introduce researchers and expertise to contribute original research articles as well as review articles that will cover identity, confidentiality, denial of service, privacy, and other aspects and specifically how those are different in the IoT space. This special issue is aimed at professionals who understand identity and security issues and wish to understand how those concepts apply in the IoT space. It will also be relevant to IoT specialists looking to understand security issues. Many researchers study and propose new protocols and research results for efficient and reliable SPMs (Security and Privacy Mechanisms). During the working period, we received many submissions from at least 7 different countries where the corresponding authors were majorly counted by the deadline for manuscript submission. Twelve research articles are selected in this issue. We hope many researchers in academia and industries are getting interested in this area by focusing on this issue. The paper "Secure Data Distribution Scheme with Two-Hop Survival Strategy for Unattended WSNs" proposes a novel data distribution scheme based on erasure codes which adapt the MOVE-ONCE survival strategies. Two-hop neighbor set has been utilized as data shareholders in the proposed data distribution scheme. Since two-hop neighbor set is the better candidate shareholder than one-hop neighbor set for security of data distribution, our proposed scheme could further improve both the probabilistic Backward Secrecy (BSe) and the reliability of data acquisition. Numeric simulations show that the proposed approach outperforms several previous approaches developed for UWSNs. The paper "Sensor Fusion for Accurate Ego-Motion Estimation in a Moving Platform" proposes a method to address problems that occur when ego-motion estimation is made with a vision sensor and a fast-moving platform. The proposed method generates virtual data using the results of the relatively accurate vehicle sensor at high velocity when the vision sensor is relatively inaccurate. It is possible to obtain more robust and accurate results using these data and giving them a higher weighting value. The proposed method was the result of using an automobile platform.