Challenges of Wireless Sensor Networks for Internet of Thing Applications
Jaesung Park,Mikhail Gofman,Fan Wu,Yong‐Hoon Choi
DOI: https://doi.org/10.1177/1550147716665506
IF: 1.938
2016-01-01
International Journal of Distributed Sensor Networks
Abstract:Recently, we have witnessed fast development of technologies for Internet of things (IoTs) to support smart life, smart homes, smart workplaces, and smart city. Since things become proactive actors of the Internet by generating and consuming information for IoT applications, a wireless sensor network (WSN) becomes one of the most important ingredients for IoT applications. This special issue is intended to attract contributions from academia and industry on the recent advances in different aspects of WSN design for IoT applications. In the paper entitled ‘‘Distributed MAC Protocol Based on Successive Collision Detection for Dense Wireless Sensor Networks,’’ the authors provide a distributed medium access control (MAC) protocol that uses successive multiple collision detection (CD) phases for dense WSN environments by enhancing the typical carrier sense multiple access with collision resolution (CSMA/CR) protocol. They also analyze the throughput numerically and find optimal operating parameters that maximize the throughput. The authors propose a possible architecture, necessary components, and related mechanisms for efficient data delivery in the wireless IoT environment, which is based on content-centric networking in their work entitled ‘‘Efficient Data Delivery Based on Content-Centric Networking for IoT Applications.’’ The authors also present various simulation results to show that the proposed architecture works well in the wireless sensor environment. The paper entitled ‘‘Energy Harvesting for Throughput Enhancement of Cooperative Wireless Sensor Networks’’ investigates optimal energy harvesting strategy that maximizes the total throughput of multi-hop transmissions in a cooperative WSN. In ‘‘Preserving Patient’s Anonymity for Mobile Healthcare System in IoT Environment,’’ the authors propose a novel and secure privacy-enhanced mobile health-care scheme that is robust over the wireless cellular network. Their method considers real network environments and provides unlinkability between patient’s alias and their real identification in all communication and also satisfies the security requirements for mobile health-care systems. To speed up network formation through a new structure of slotframe in highly dynamic time-slotted channel hopping (TSCH) networks, a rapid joining scheme is presented in a paper entitled ‘‘A Rapid Joining Scheme Based on Fuzzy Logic for Highly Dynamic IEEE 802.15.4e TSCH Networks.’’ They also propose an adaptive mechanism to adjust number of advertised enhanced beacons (EBs) based on network density to optimize energy consumption. Through extensive mathematical analysis and experimental testbed on TelosB motes, they also show the improvement compared to other schemes. In the paper entitled ‘‘QoE Provisioned Mobile Streaming Protocol for the Hyper-connected IoT Devices over the Heterogeneous Wireless Access Networks,’’ the authors study a video streaming protocol over the 5G-based hyper-connected IoT environment. Specifically, they focus on quality of experience (QoE) issue when multimedia-based IoT devices are moved over the heterogeneous wireless network environment and propose a novel mobile video streaming protocol. In ‘‘Privacy Enhancement Using Selective Encryption Scheme in Data Outsourcing,’’ the authors introduce a practical scheme that dynamically secures and outsources data on demand, as well as propose a corresponding architecture to securely process data in Database Service Provider. They also adopt the application of bring your own device (BYOD) in this scheme as an enhanced security solution. A mutual lattice-based authentication scheme for secure financial payment services in near field communication–passive communication mode (NFCPCM) payment environments is proposed in the paper entitled ‘‘Mutual Authentication Scheme Based on Lattice for the NFC-PCM Payment Service Environment.’’ The authors show the efficiency of the propose method in terms of computational complexity. In the paper ‘‘Light-Weight Trust Model for the Detection of Concealed Malicious Nodes in Sparse Wireless Ad-hoc Networks,’’ the authors present new statistical representations for the operation of concealed malicious nodes and non-malicious nodes and