Secure Encryption for Wireless Multimedia Sensors Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
The security in wireless multimedia sensor network is a crucial challenge engendered by environmental, material constraint requirements and the energy consumption. Standard encryption algorithms do not agree with the real-time applications on this network. One of the solutions to the challenges mentioned above is to maintain the safety and reduce the energy consumption. In this article, a new approach with a high-energy efficiency, a high level of security and a big robustness against the statistics and differential attacks is presented in this paper. The new approach called Shift-AES admits simple operations such as the substitution, the transposition by or-exclusive and shift. It keeps the principle of Shannon for the diffusion and the confusion. Some criteria to measure the performances of the approach such as the visual inspection, histogram analysis, entropy images, the correlation of two adjacent pixels, the analysis against differential attacks, and the analysis of performance at the level run-time and throughput are successfully realized. The experimental evaluation of the proposed algorithm Shift-AES proves that the algorithm is ideal for wireless multimedia sensor network. With a satisfactory level of security, best term timeliness and throughput of transmission, compared with the AES standard encryption algorithm, this approach allows us to increase the lifetime of the network.
Authors and Affiliations
Amina Msolli, Haythem Ameur, Abdelhamid Helali, Hassen Maaref
Semantic based Data Integration in Scientific Workflows
Data Integration has become the most prominent aspect of data management applications, especially in scientific domains like ecology, biology, and geosciences. Today’s complex scientific applications and the rise of dive...
A New Bio-Informatics Framework: Research on 3D Sensor Data of Human Activities
Due to increasing attraction of motion capture systems technology and the usage of captured data in wide range of research-oriented applications, a framework has developed as an improved version of MOCAP TOOLBOX in Matla...
Validation of the IS Impact Model for Measuringthe Impact of e-Learning Systems in KSA Universities StudentPerspective
The IS-Impact Measurement Model, developed by Gable, Sedera and Chan in 2008, represents the to-date and expected stream of net profits from a given information system (IS), as perceived by all major user classes....
Fault-Tolerant Resource Provisioning with Deadline-Driven Optimization in Hybrid Clouds
Resource provisioning remains as one of the chal-lenging research problems in cloud computing, more importantly when considered together with service reliability. Fault-tolerance techniques such as fault-recovery is one...
Autonomic Computing for Business Applications
Autonomic computing, a new deployment technology introduced by IBM a decade ago, to manage the ever increasing complexity of IT systems, has become a part of many large scale deployments today. A lot of inroads have been...