Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

Mohamed Elhoseny, Ahmed Farouk, Josep Batle, Abdulaziz Shehab, Aboul Ella Hassanien
Copyright: © 2017 |Pages: 19
DOI: 10.4018/978-1-5225-2229-4.ch045
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission's applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE).
Chapter Preview
Top

Introduction

Similar to the traditional networks, WSNs have a set of well-defined components such as the sensor nodes, the basestation and the communication unit. Sensor Nodes are distributed in open field environment to sense, process and transmit data to a specific destination. A node consist a power unit responsible to deliver power to all its units. The basic power consumption at node is due to computation and transmission where transmission is the most expensive activity at sensor node in terms of power consumption (Gaber, T., & Hassanien, A. E. (2014). These sensor nodes are consists of several components such as a radio transceiver, a built in antenna or external antenna connection, a microcontroller, and a sensor interface. These nodes have very limited and constrained resources such as memory storage, energy, and processing power which represent the main challenge of using them. The basestation is called the sink point to which all network data are directed. It is normally a resourceful node having unconstrained computational capabilities and energy supply (Fouad et al., 2015). There can be single or multiple basestations in a network. Sensor nodes use radio frequencies or optical communication in order to achieve networking. This task is managed by radio units in sensor nodes that use electromagnetic spectrum to convey the information to their destinations. Usually each sensor node transfers the data to other node or sinks directly or via multi-hop routing as shown at Figure 1.

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, industrial automation and manufacturing, health care and military applications. Depending on these applications’ requirements, the need for processing, transmission, evaluation of images and large amounts of data in WSNs is increased. Controlling these data at sensor nodes before transmitting it to the basestation is an important issue to avoid the energy exhaustion during the data transmission and aggregation process. Therefore, the clustering model (Thakkar & Kotecha, 2014), which is shown at Figure 1, is proposed to manage the data transmission between nodes in order to avoid consuming resources. However, forming the network clusters is non-trivial challenge due to the dynamic nature of the working environment with the resources limitations of sensor nodes. Each cluster has a CH node that is responsible of managing all operations of gathering data from all clusters nodes, sending it to the basestation, and receiving a feedback of messages and requests from the basestation.

Selecting the Cluster Head (CHs) is a cumbersome process (Thakkar & Kotecha, 2014) that greatly affects the network performance. Although there are several studies that proposed CH selection methods, most of them are not appropriate for dynamic clustering environment. In addition, security is a, essential challenging issue in Cluster-based WSNs, since sensors are usually deployed in hostile environments. The traditional security method cannot applied for WSN due to its characteristics, such as open communication medium, limited computational capabilities of nodes, and the disadvantages of bandwidth constraint (Ganesh & Amutha, 2013), which make them more susceptible to malicious attacks than other networks. In addition, CH in the network that responsible of the data aggregation from a set of SNs consumes more energy than common nodes and will quit the mission in advance due to energy exhausting because it must decrypt and re-encrypt the data after its aggregation. WSNs thus require efficient secure routing schemes in terms of memory size, energy consumption, and operating speed.

Figure 1.

Clustering model for wireless sensor network

978-1-5225-2229-4.ch045.f01

Complete Chapter List

Search this Book:
Reset