Share This Article:

Enhancements in the Security Level for Wireless Sensor Network

Abstract Full-Text HTML XML Download Download as PDF (Size:3637KB) PP. 213-228
DOI: 10.4236/jis.2015.63022    4,183 Downloads   4,745 Views  

ABSTRACT

The trade off between the energy consumption and the quality of the received image should be considered as a main point in the techniques design in Wireless Sensor Network (WSN). This paper analyzes the performance of multiple image encryption algorithms with different approaches. And also, it introduces two proposed modulation techniques to enhance the performance of WSN. These two techniques merge both the image and the audio in one signal. The merging process enhances the energy consumption data rate. In addition, it removes the effectiveness of the jamming completely from both the reconstructed image and reconstructed audio signal at the receiver. So, the receiver will reconstruct the image without jamming effectiveness. The paper introduces a proposed audio encryption algorithm. The use of encryption algorithms for both image and audio signals with the merging process enhances the security level. Popular metrics are used to compare between these image encryption algorithms and also to show the benefits from these enhancements. The results show the preference of one of these image encryption algorithms to others. And also, the merging process enhances the bit rate to high level.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Kishk, A. , Messiha, N. , El-Fishawy, N. , Alkafs, A. and Madian, A. (2015) Enhancements in the Security Level for Wireless Sensor Network. Journal of Information Security, 6, 213-228. doi: 10.4236/jis.2015.63022.

References

[1] Kishk, A.M., Messiha, N.W., Elfishawy, N.A., Elkafs, A.A. and Madian, A.H. (2014) Channel Encryption in Wireless Camera Sensor Network. Journal of Advances in Computer Networks, 2, 125-128. http://dx.doi.org/10.7763/JACN.2014.V2.95
[2] Liu, R. and Tian, X. (2012) New Algorithm for Color Image Encryption Using Chaotic Map and Spatial Bit-Level Permutation. Journal of Theoretical and Applied Information Technology, 43, 89.
[3] Wang, L.H. and Liao, X.B. (2012) A Novel Image Encryption Approach Based on Chaotic Piecewise Map. Journal of Theoretical physics & Cryptography, 1, 37-40.
[4] Khade, P. and Narnaware, M. (2012) 3D Chaotic Functions for Image Encryption. International Journal of Computer Science, 9, 323-328.
[5] Kishk, A., Messiha, N., Ayad, N., El-Fishawy, N. and Abdel-Samie, F. (2010) Fast and Flexible Symmetrical Encryption Algorithm Based on Key-Updating. Presented at the National Radio Science Conference.
[6] Chen, S., Zhong, X. and Wu, Z. (2008) Block Chaos Cipher for Wireless Sensor Network. Science in China Series F: Information Sciences, 51, 1055-1063. http://dx.doi.org/10.1007/s11432-008-0102-5
[7] Kishk, A., Messiha, N., El-Fishawy, N., Alkafs, A. and Madian, A. (2014) Channel Encryption in Wireless Camera Sensor Network. Journal of Advances in Computer Networks, 2, 125-128. http://dx.doi.org/10.7763/JACN.2014.V2.95
[8] Francois, M., Grosges, T., Barchiesi, D. and Erra, R. (2012) A New Image Encryption Scheme Based on a Chaotic Function. Signal Processing: Image Communication, 27, 249-259. http://dx.doi.org/10.1016/j.image.2011.11.003
[9] Chattopadhyay, S. and Sanyal, S. (2009) Comparison of Performance Metrics for QPSK and OQPSK Transmission Using Root Raised Cosine & Raised Cosine Pulse-Shaping Filters for Applications in Mobile Communication. International Journal of Computer Science and Information Security, 6, 106-112.
[10] Boiroju, N., Yerukala, R., Venugopala, M. and Krishna, M. (2011) A Bootstrap Test for Equality of Mean Absolute Errors. ARPN Journal of Engineering and Applied Sciences, 6, 9-11.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.