Secure Encryption for Wireless Multimedia Sensors Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
The security in wireless multimedia sensor network is a crucial challenge engendered by environmental, material constraint requirements and the energy consumption. Standard encryption algorithms do not agree with the real-time applications on this network. One of the solutions to the challenges mentioned above is to maintain the safety and reduce the energy consumption. In this article, a new approach with a high-energy efficiency, a high level of security and a big robustness against the statistics and differential attacks is presented in this paper. The new approach called Shift-AES admits simple operations such as the substitution, the transposition by or-exclusive and shift. It keeps the principle of Shannon for the diffusion and the confusion. Some criteria to measure the performances of the approach such as the visual inspection, histogram analysis, entropy images, the correlation of two adjacent pixels, the analysis against differential attacks, and the analysis of performance at the level run-time and throughput are successfully realized. The experimental evaluation of the proposed algorithm Shift-AES proves that the algorithm is ideal for wireless multimedia sensor network. With a satisfactory level of security, best term timeliness and throughput of transmission, compared with the AES standard encryption algorithm, this approach allows us to increase the lifetime of the network.
Authors and Affiliations
Amina Msolli, Haythem Ameur, Abdelhamid Helali, Hassen Maaref
ACOUSTIC STRENGTH OF GREEN TURTLE AND FISH BASED ON FFT ANALYSIS
The acoustic power at difference angle and distance were measure for four different ages of Green Turtles and three species of fish using modified echo sounder V1082. The echo signal from TVG output was digitized at a sa...
Comparative Performance of Deep Learning and Machine Learning Algorithms on Imbalanced Handwritten Data
Imbalanced data is one of the challenges in a classification task in machine learning. Data disparity produces a biased output of a model regardless how recent the technology is. However, deep learning algorithms, such a...
SDME Quality Measure based Stopping Criteria for Iterative Deblurring Algorithms
Deblurring from motion problem with or without noise is ill-posed inverse problem and almost all inverse problem require some sort of parameter selection. Quality of restored image in iterative motion deblurring is depen...
On the Probability of Detection Ability in Observing Dynamic Environmental Phenomena using Wireless Sensor Networks
Wireless Sensor Network (WSN) is being utilised for several purposes in military and civil domains, including surveillance, monitoring, and management, where networked sensors monitor and detect an event of interest and...
Cyberspace Forensics Readiness and Security Awareness Mode
The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is...