Abstract

Recently, we have witnessed fast development of technologies for Internet of things (IoTs) to support smart life, smart homes, smart workplaces, and smart city. Since things become proactive actors of the Internet by generating and consuming information for IoT applications, a wireless sensor network (WSN) becomes one of the most important ingredients for IoT applications. This special issue is intended to attract contributions from academia and industry on the recent advances in different aspects of WSN design for IoT applications.
In the paper entitled “Distributed MAC Protocol Based on Successive Collision Detection for Dense Wireless Sensor Networks,” the authors provide a distributed medium access control (MAC) protocol that uses successive multiple collision detection (CD) phases for dense WSN environments by enhancing the typical carrier sense multiple access with collision resolution (CSMA/CR) protocol. They also analyze the throughput numerically and find optimal operating parameters that maximize the throughput.
The authors propose a possible architecture, necessary components, and related mechanisms for efficient data delivery in the wireless IoT environment, which is based on content-centric networking in their work entitled “Efficient Data Delivery Based on Content-Centric Networking for IoT Applications.” The authors also present various simulation results to show that the proposed architecture works well in the wireless sensor environment.
The paper entitled “Energy Harvesting for Throughput Enhancement of Cooperative Wireless Sensor Networks” investigates optimal energy harvesting strategy that maximizes the total throughput of multi-hop transmissions in a cooperative WSN.
In “Preserving Patient’s Anonymity for Mobile Healthcare System in IoT Environment,” the authors propose a novel and secure privacy-enhanced mobile health-care scheme that is robust over the wireless cellular network. Their method considers real network environments and provides unlinkability between patient’s alias and their real identification in all communication and also satisfies the security requirements for mobile health-care systems.
To speed up network formation through a new structure of slotframe in highly dynamic time-slotted channel hopping (TSCH) networks, a rapid joining scheme is presented in a paper entitled “A Rapid Joining Scheme Based on Fuzzy Logic for Highly Dynamic IEEE 802.15.4e TSCH Networks.” They also propose an adaptive mechanism to adjust number of advertised enhanced beacons (EBs) based on network density to optimize energy consumption. Through extensive mathematical analysis and experimental testbed on TelosB motes, they also show the improvement compared to other schemes.
In the paper entitled “QoE Provisioned Mobile Streaming Protocol for the Hyper-connected IoT Devices over the Heterogeneous Wireless Access Networks,” the authors study a video streaming protocol over the 5G-based hyper-connected IoT environment. Specifically, they focus on quality of experience (QoE) issue when multimedia-based IoT devices are moved over the heterogeneous wireless network environment and propose a novel mobile video streaming protocol.
In “Privacy Enhancement Using Selective Encryption Scheme in Data Outsourcing,” the authors introduce a practical scheme that dynamically secures and outsources data on demand, as well as propose a corresponding architecture to securely process data in Database Service Provider. They also adopt the application of bring your own device (BYOD) in this scheme as an enhanced security solution.
A mutual lattice-based authentication scheme for secure financial payment services in near field communication–passive communication mode (NFC-PCM) payment environments is proposed in the paper entitled “Mutual Authentication Scheme Based on Lattice for the NFC-PCM Payment Service Environment.” The authors show the efficiency of the propose method in terms of computational complexity.
In the paper “Light-Weight Trust Model for the Detection of Concealed Malicious Nodes in Sparse Wireless Ad-hoc Networks,” the authors present new statistical representations for the operation of concealed malicious nodes and non-malicious nodes and devise a new trust model to detect malicious nodes of jamming and selfish types. They build a simulation model to evaluate system performance and show that the proposed model is efficient in detecting all types of considered malicious nodes.
In the paper entitled “An Azimuth-Based Dead-End Avoiding Routing Mechanism for Providing Reliable IP Connectivity in Multi-Hop Wireless Networks,” routing scheme with dead-end avoidance (RSDA) mechanism is proposed aiming to avoid dead-ends using the concept of the coverage range of a node based on the azimuth and the perpendicular bisector.
In the paper entitled “OCC-ID: New Broadcasting Service-Based Cloud Model and Image Sensor Communications,” the authors present and evaluate the performance of two image sensor techniques, named rolling shutter and global shutter. They also propose a new service application for optical camera communications (OCC) based on cloud architecture, named OCC-ID which can be considered as an invisible ID by taking the advantages of visible light communication, camera communication, and cloud computing technology.
The paper entitled “Fine-Grained Support of Security Services for Resource Constrained Internet of Things” proposes a scheme to allow communication parties to change the security service flexibly without carrying out the datagram transport layer security (DTLS) handshake process each time under a resource constrained IoT environment.
A security framework for the IoT environment that uses software-defined networking (SDN) technology is studied in a paper entitled “Enhanced SDIoT Security Framework Models.” They investigate strategies for establishing a security framework for the configuration of a software-defined IoT environment and efficient provision of security services. Moreover, the service to reduce the overhead involved in security service provision is configured, and a simple test is conducted to verify the feasibility of the proposed model.
In the paper entitled “A Bio-inspired Fair Resource-Allocation Algorithm for TDMA-Based Distributed Sensor Networks for IoT,” the authors propose a multi-hop desynchronization (DESYNC) algorithm that is a bio-inspired time division multiple access (TDMA)-based distributed resource-allocation scheme for IoT networks. Simulation results showed that multi-hop DESYNC can effectively resolve the hidden-node problem, and the throughput performance of the proposed multi-hop DESYNC is better than that of carrier sensing multiple access with collision avoidance (CSMA/CA).
In the paper entitled “Optimization Approach for Resource Allocation on Cloud Computing for IoT,” the authors consider execution time constraint a service-level agreement (SLA) constraint in combinatorial auction system. They determine winners at each bidding round according to the job’s urgency based on execution time deadline, in order to efficiently allocate resources and reduce the penalty cost.
Footnotes
Acknowledgements
The guest editors would like to thank the authors for their contributions to this special issue and many experts who have provided constructive comments to the authors to improve the quality of the papers.
