Secure Encryption for Wireless Multimedia Sensors Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
The security in wireless multimedia sensor network is a crucial challenge engendered by environmental, material constraint requirements and the energy consumption. Standard encryption algorithms do not agree with the real-time applications on this network. One of the solutions to the challenges mentioned above is to maintain the safety and reduce the energy consumption. In this article, a new approach with a high-energy efficiency, a high level of security and a big robustness against the statistics and differential attacks is presented in this paper. The new approach called Shift-AES admits simple operations such as the substitution, the transposition by or-exclusive and shift. It keeps the principle of Shannon for the diffusion and the confusion. Some criteria to measure the performances of the approach such as the visual inspection, histogram analysis, entropy images, the correlation of two adjacent pixels, the analysis against differential attacks, and the analysis of performance at the level run-time and throughput are successfully realized. The experimental evaluation of the proposed algorithm Shift-AES proves that the algorithm is ideal for wireless multimedia sensor network. With a satisfactory level of security, best term timeliness and throughput of transmission, compared with the AES standard encryption algorithm, this approach allows us to increase the lifetime of the network.
Authors and Affiliations
Amina Msolli, Haythem Ameur, Abdelhamid Helali, Hassen Maaref
Ensuring Data Provenance with Package Watermarking
The last decade has shown tremendous growth data production from different sectors, e.g., biology, financial markets, scientific computing, business processes, Internet of Things. The “Data is New Oil” has become a prove...
Effects of Walls and Floors in Indoor Localization Using Tracking Algorithm
The advancement in wireless and mobile networks has led to an increase in location based services (LBS). LBS can be applied in many applications, such as vehicle systems, security systems, and patient tracking systems. T...
Classification of Human Emotions from Electroencephalogram (EEG) Signal using Deep Neural Network
Estimation of human emotions from Electroencephalogram (EEG) signals plays a vital role in developing robust Brain-Computer Interface (BCI) systems. In our research, we used Deep Neural Network (DNN) to address EEG-based...
Constraint on Repair Resources, Optimal Number of Repairers and Optimal Size of a Serviced System
The focus of this paper is the analysis of the constraint on the repair resources caused by breakdowns of components in large systems. The study has been conducted by creating a very efficient discrete-event simulator, b...
Role Term-Based Semantic Similarity Technique for Idea Plagiarism Detection
Most of the text mining systems are based on statistical analysis of term frequency. The statistical analysis of term (phrase or word) frequency captures the importance of the term within a document, but the techniques t...