Data security framework for cloud computing networksIAEME Publication
The document discusses security issues related to data storage in cloud computing networks. It proposes a multi-tier cloud architecture with two clouds - a secured cloud that encrypts data using fully homomorphic encryption before transferring it to an unsecured cloud for storage and access. This allows processing of encrypted data without revealing it, addressing confidentiality concerns in cloud environments where data is exposed. The model aims to provide enhanced security and performance compared to existing single-cloud solutions.
This paper proposes a new compressive
sensing based method for simultaneous data
compression and convergent encryption for secure
deduplication to efficiently use for the cloud storage. It
performs signal acquisition, its compression and
encryption at the same time. The measurement matrix
is generated using a hash key and is exploited for
encryption. It seems that it is very suitable for the cloud
model considering both the data security and the
storage efficiently.
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
Abstract Due to the increasing popularity of cloud computing, organisations have the choice to outsource their large encrypted data
content along as well as data mining operations to cloud the environment. Outsourcing data to such a third party cloud
environment can compromise the data security as cloud operations and data mining tasks cannot carry out computations without
decrypting the data. Hence, already present privacy-preserving data mining techniques are not efficient to address the security
and confidentiality problems. In the base paper, a k-NN classification algorithm over secure data under a semi-honest model was
developed using a Paillier cryptosystem for public key encryption. The usage of public key cryptosystems has security issues
during data transfer in the cloud. In this proposed work, we focus on solving the k-NN problem over secure encrypted data by
proposing a privacy preserving k-nearest neighbour classification on encrypted information in the cloud using private key for
encryption and decryption based on the symmetric AES cryptographic algorithm under the secure multiparty computations for
creating a complete homomorphic encryption (CHE) scheme which results in the reduction of space requirement and processing
time. Also, we aim to apply the same PPk-NN classification over encrypted images. The proposed protocol hides the input query
and data access patterns of the users and also preserves the confidentiality of text and image data.Finally, we present a practical
analysis of the efficiency and security performance of our proposed protocol for application in a Life insurance firm where the
clients are classified according to their risk-level.
Keywords: Data Mining, PPk-NN, Semi-Honest Model , Individual Key, Symmetric Homomorphic Encryption, AES
Algorithm,CHE, Less Space and Time
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
The document describes a new algorithm called MCHF (Meiosis based Ciphering and Hash Function generation) for encryption, cryptographic hashing, and random number generation for multilevel cloud security. The algorithm emulates meiotic cell division processes using concepts from molecular biology like DNA crossover during metaphase. It uses a 1024-bit key for encryption and the Navier-Stokes equation to model DNA movement for crossover-based encryption and hashing. The algorithm aims to securely handle login, database transactions, and data storage in the cloud by generating secure cryptographic hashes. Java code is implemented to test the algorithm's encryption, hashing, random number generation and 3D login system capabilities.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
This document surveys various chaos encryption techniques for encrypting image data. It begins by explaining why traditional encryption techniques are unsuitable for images and how chaos encryption provides an effective solution. It then provides background on chaos theory and describes the general process of chaos-based image encryption. The document proceeds to summarize several specific chaos encryption algorithms proposed in other papers, evaluating aspects like key space, correlation coefficient, and resistance to attacks. It concludes that chaos encryption is an effective method for secure image encryption and multiple techniques can be combined to further increase security.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
This document discusses securely mining data stored in the cloud using encryption techniques. It proposes using k-means clustering on the data, then encrypting it with AES. Homomorphic encryption is then performed using Paillier cryptosystem to allow computations on the encrypted data while preserving privacy. The key advantages discussed are that this approach allows for secure data mining and analysis in the cloud without revealing private information to unauthorized parties. It also analyzes related work on encryption and homomorphic techniques for secure cloud computing and big data analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
This document compares parallel and segmentation methods for image encryption and decryption using matrix multiplication. The parallel method implements encryption by multiplying the original image matrix with a random key matrix, and decryption by multiplying the encrypted matrix with the inverse of the key. Segmentation divides the image into segments, generates a random key for each, and encrypts/decrypts segments individually before recombining. Experimental results on images of sizes 2000x2000 and 4096x4096 show that segmentation provides higher security through multiple keys and is more efficient than parallel processing, achieving speedups of up to 3x.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
This document proposes a new hybrid algorithm for enhanced data security combining encryption, compression, and steganography. It first describes existing algorithms and their limitations. It then proposes a new encryption algorithm using pseudo-random number generation and key scheduling. Encrypted data is compressed with LZW and hidden in an image using modified LSB steganography. Analysis shows this hybrid algorithm improves security parameters like timing and distortion compared to existing methods.
This document presents a proposed algorithm for public key cryptography using matrices. The algorithm has three stages: 1) shuffling the original data using a linear congruential method and arranging it in a matrix, 2) traversing the data matrix in different patterns, and 3) generating a system of non-homogeneous linear equations from the matrix to derive private keys. The algorithm aims to provide data confidentiality, integrity and authentication for cloud computing applications using public key cryptography with matrices in a way that has constant complexity regardless of key size.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
This document summarizes a research paper on privacy-preserving data aggregation without a secure channel. It discusses two models for aggregating private data from multiple participants: one with an external aggregator and one where participants calculate the aggregation jointly. The paper proposes protocols for the aggregator or participants to calculate the sum and product of the private data in a way that preserves the privacy of each participant's data, without requiring secure pairwise channels between participants. The protocols are based on the computational hardness of solving certain cryptographic problems like the discrete logarithm problem.
Harnessing the cloud for securely outsourcing large scale systems of linear e...JPINFOTECH JAYAPRAKASH
The document proposes a secure mechanism for outsourcing the solving of large-scale systems of linear equations to the cloud. It uses an iterative method rather than direct methods like Gaussian elimination, as iterative methods only require simpler matrix-vector operations. The mechanism enables a customer to securely outsource the iterative computation while keeping the input and output private. It also includes an efficient batch result verification mechanism that allows the customer to verify all answers from previous iterations in one batch, ensuring efficiency and robustness. Experiments show the method can provide computational savings for customers solving large-scale linear equations in the cloud.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Chaotic cryptography and multimedia securityFatima Azeez
This document provides an overview of chaotic cryptography and its applications to multimedia security. It discusses the requirements for multimedia encryption, including high security, reduced computational complexity, compression ratio invariance, real-time performance, and multitier security. It also evaluates methods for analyzing multimedia encryption algorithms. The document then covers attractors, architectures for chaotic image cryptosystems, and chaos-based encryption algorithms for images, audio, and video. It provides examples of full and partial encryption algorithms for each media type.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - [email protected]¬m-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Obediencia o desobediencia ciudadana maría corina machadoVenteVenezuela
El documento presenta la situación actual de Venezuela como una encrucijada histórica entre dos modelos de sociedad: democracia y libertad versus sumisión a un régimen extranjero. Plantea que el chavismo ha establecido una "neo dictadura" que ha dividido a la sociedad y concentrado el poder. Llama a los venezolanos a unirse para enfrentar y derrotar este régimen a través de la defensa de valores como la justicia, el trabajo, la propiedad privada y la democracia.
Neutral Milk Hotel, an influential indie rock band known for their 1998 album In the Aeroplane Over the Sea, will be reuniting for a show at MASS MoCA on April 17, 2015. Neutral Milk Hotel gained a cult following during their initial run in the 1990s before going on indefinite hiatus. Frontman Jeff Mangum rarely performed live in the following years. Now the original band members are reuniting for their first full show together in over 15 years at MASS MoCA, where fans can expect their trademark experimental folk rock sound and lyrics.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
The document describes a new algorithm called MCHF (Meiosis based Ciphering and Hash Function generation) for encryption, cryptographic hashing, and random number generation for multilevel cloud security. The algorithm emulates meiotic cell division processes using concepts from molecular biology like DNA crossover during metaphase. It uses a 1024-bit key for encryption and the Navier-Stokes equation to model DNA movement for crossover-based encryption and hashing. The algorithm aims to securely handle login, database transactions, and data storage in the cloud by generating secure cryptographic hashes. Java code is implemented to test the algorithm's encryption, hashing, random number generation and 3D login system capabilities.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
This document surveys various chaos encryption techniques for encrypting image data. It begins by explaining why traditional encryption techniques are unsuitable for images and how chaos encryption provides an effective solution. It then provides background on chaos theory and describes the general process of chaos-based image encryption. The document proceeds to summarize several specific chaos encryption algorithms proposed in other papers, evaluating aspects like key space, correlation coefficient, and resistance to attacks. It concludes that chaos encryption is an effective method for secure image encryption and multiple techniques can be combined to further increase security.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
This document discusses securely mining data stored in the cloud using encryption techniques. It proposes using k-means clustering on the data, then encrypting it with AES. Homomorphic encryption is then performed using Paillier cryptosystem to allow computations on the encrypted data while preserving privacy. The key advantages discussed are that this approach allows for secure data mining and analysis in the cloud without revealing private information to unauthorized parties. It also analyzes related work on encryption and homomorphic techniques for secure cloud computing and big data analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
This document compares parallel and segmentation methods for image encryption and decryption using matrix multiplication. The parallel method implements encryption by multiplying the original image matrix with a random key matrix, and decryption by multiplying the encrypted matrix with the inverse of the key. Segmentation divides the image into segments, generates a random key for each, and encrypts/decrypts segments individually before recombining. Experimental results on images of sizes 2000x2000 and 4096x4096 show that segmentation provides higher security through multiple keys and is more efficient than parallel processing, achieving speedups of up to 3x.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
This document proposes a new hybrid algorithm for enhanced data security combining encryption, compression, and steganography. It first describes existing algorithms and their limitations. It then proposes a new encryption algorithm using pseudo-random number generation and key scheduling. Encrypted data is compressed with LZW and hidden in an image using modified LSB steganography. Analysis shows this hybrid algorithm improves security parameters like timing and distortion compared to existing methods.
This document presents a proposed algorithm for public key cryptography using matrices. The algorithm has three stages: 1) shuffling the original data using a linear congruential method and arranging it in a matrix, 2) traversing the data matrix in different patterns, and 3) generating a system of non-homogeneous linear equations from the matrix to derive private keys. The algorithm aims to provide data confidentiality, integrity and authentication for cloud computing applications using public key cryptography with matrices in a way that has constant complexity regardless of key size.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
This document summarizes a research paper on privacy-preserving data aggregation without a secure channel. It discusses two models for aggregating private data from multiple participants: one with an external aggregator and one where participants calculate the aggregation jointly. The paper proposes protocols for the aggregator or participants to calculate the sum and product of the private data in a way that preserves the privacy of each participant's data, without requiring secure pairwise channels between participants. The protocols are based on the computational hardness of solving certain cryptographic problems like the discrete logarithm problem.
Harnessing the cloud for securely outsourcing large scale systems of linear e...JPINFOTECH JAYAPRAKASH
The document proposes a secure mechanism for outsourcing the solving of large-scale systems of linear equations to the cloud. It uses an iterative method rather than direct methods like Gaussian elimination, as iterative methods only require simpler matrix-vector operations. The mechanism enables a customer to securely outsource the iterative computation while keeping the input and output private. It also includes an efficient batch result verification mechanism that allows the customer to verify all answers from previous iterations in one batch, ensuring efficiency and robustness. Experiments show the method can provide computational savings for customers solving large-scale linear equations in the cloud.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Chaotic cryptography and multimedia securityFatima Azeez
This document provides an overview of chaotic cryptography and its applications to multimedia security. It discusses the requirements for multimedia encryption, including high security, reduced computational complexity, compression ratio invariance, real-time performance, and multitier security. It also evaluates methods for analyzing multimedia encryption algorithms. The document then covers attractors, architectures for chaotic image cryptosystems, and chaos-based encryption algorithms for images, audio, and video. It provides examples of full and partial encryption algorithms for each media type.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - [email protected]¬m-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Obediencia o desobediencia ciudadana maría corina machadoVenteVenezuela
El documento presenta la situación actual de Venezuela como una encrucijada histórica entre dos modelos de sociedad: democracia y libertad versus sumisión a un régimen extranjero. Plantea que el chavismo ha establecido una "neo dictadura" que ha dividido a la sociedad y concentrado el poder. Llama a los venezolanos a unirse para enfrentar y derrotar este régimen a través de la defensa de valores como la justicia, el trabajo, la propiedad privada y la democracia.
Neutral Milk Hotel, an influential indie rock band known for their 1998 album In the Aeroplane Over the Sea, will be reuniting for a show at MASS MoCA on April 17, 2015. Neutral Milk Hotel gained a cult following during their initial run in the 1990s before going on indefinite hiatus. Frontman Jeff Mangum rarely performed live in the following years. Now the original band members are reuniting for their first full show together in over 15 years at MASS MoCA, where fans can expect their trademark experimental folk rock sound and lyrics.
El documento resume los requerimientos y evaluaciones académicas para la próxima semana para el curso 2°A del Colegio Camilo Henríquez. Se solicita a los apoderados enviar materiales como libros y trabajos, así como también asistir a una reunión de apoderados. Se informan los objetivos y contenidos que se verán en cada asignatura como lenguaje, matemáticas e inglés, y se indican las fechas de las próximas pruebas.
Este informativo semanal para los apoderados del Colegio Camilo Henríquez detalla los requerimientos y actividades académicas para los estudiantes de Primer Año A para la semana del 2 al 6 de abril. Incluye información sobre los libros, materiales y útiles que los estudiantes deben traer cada día para las diferentes asignaturas como Lenguaje, Matemáticas, Ciencias Naturales e Inglés. También indica las evaluaciones y eventos planeados como el taller de Psicopedagogía y el calendario de pruebas para el mes
1. The document discusses several issues facing Medical Affairs departments in pharmaceutical companies based on a survey. 2. 48% of those surveyed agree there is a lack of medically qualified people entering the industry due to various factors. 3. 64% note an increase in non-medically qualified people in Medical Affairs roles, with mixed views on if this is positive or cost-cutting.
LA EDUCACION SUPERIOR Y LOS PROYECTOS DE INVESTIGACION Y DESARROLLO TECNOLOGICOwendy1105
Este documento discute los desafíos de la educación superior y la investigación en Colombia. Identifica problemas como el bajo acceso y calidad de la educación, lo que limita la difusión del conocimiento. También señala que muchas universidades privadas brindan una educación de baja calidad que deja a los estudiantes poco preparados para el mundo laboral. El documento presenta entrevistas con varias personas que expresan que la educación debería ser un derecho y no un privilegio, y que el conocimiento debería valorarse más que los títulos.
Ringkasan dokumen tersebut adalah:
1. Bank Rakyat Indonesia (BRI) didirikan pada tahun 1895 dan merupakan salah satu bank milik pemerintah terbesar di Indonesia
2. Dokumen menjelaskan sejarah, produk, dan layanan BRI seperti tabungan, pinjaman, dan struktur organisasi
3. BRI menawarkan berbagai produk tabungan dan pinjaman untuk memenuhi kebutuhan nasabah
Lembar obsevasi keterampilan proses ilmiah (siklus ii)Lalu Gede Sudarman
Lembar observasi ini berisi penilaian keterampilan proses ilmiah siswa pada 5 aspek utama yaitu mengamati, mengumpulkan data, merumuskan hipotesis, mengidentifikasi variabel, dan membuat kesimpulan. Setiap aspek dibagi lagi menjadi beberapa sub keterampilan dan masing-masing diberi skor berdasarkan tingkat pencapaian siswa.
The document discusses inheritance and polymorphism in Java. It covers topics like superclass and subclass relationships, overriding methods, polymorphic arguments, and subclassing and overriding in Eclipse. Examples are provided of creating subclasses that extend classes and override methods to add specific behaviors while reusing attributes from the parent class.
El uso del doble colgajo en hacha brinda múltiples ventajas en la reparación de defectos del cuero cabelludo, debido a su componente tanto de avance como rotatorio, sus considerables dimensiones y la posibilidad de mantener la estética de la línea capilar.
A handbook designed for the students of engineering discipline to learn the basics of engineering Drawing.
Full-text pdf available at
https://www.researchgate.net/publication/283622413_Engineering_Drawing_for_beginners
Internet of things (IoT) and big data- r.nabatinabati
This document provides an introduction to Internet of Things (IoT) and Big Data Analytics. It discusses why IoT is an important and growing trend, defining IoT as connecting physical objects to the internet. It notes that billions of devices are expected to be connected by 2020. The document then discusses some key IoT technologies like communication standards, sensors, and embedded systems. It also outlines some common IoT applications and opportunities in areas like smart homes, healthcare, transportation and more. Finally, the document introduces some characteristics of big data, such as the scale, variety and velocity of data that is now being generated and needs to be analyzed.
Nossa Senhora apareceu ao índio São João Diego no México entre 9 e 12 de dezembro, pedindo que ele mostrasse rosas milagrosas ao Bispo para que uma capela fosse construída no local de suas aparições. Quando Diego mostrou seu manto ao Bispo, a imagem de Nossa Senhora estava milagrosamente impressa nele, vestida como uma princesa asteca e falando com ele em seu idioma de forma maternal.
This presentation, by big data guru Bernard Marr, outlines in simple terms what Big Data is and how it is used today. It covers the 5 V's of Big Data as well as a number of high value use cases.
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
The compressive detecting based information accumulation accomplishes with high exactness in information recuperation from less inspection which is available in sensor nodes. In this manner, the existing methods available in the literature diminish the information gathering cost and delays the existence cycle of WSNs. In this paper, a strong achievable security model for sensor network applications was initially proposed. At that point, a secure data collection conspire was displayed based on compressive detecting, which improves the information protection by the asymmetric semi-homomorphic encryption scheme, and decreases the calculation cost by inadequate compressive grid. In this case, particularly the asymmetric mechanism decreases the trouble of mystery key circulation and administration. The proposed homomorphic encryption permits the in-arrange accumulation in cipher domain, and in this manner improves the security and accomplishes the adjustment in system stack. Further, this paper focuses on estimating various network performances such as the calculation cost and correspondence cost, which remunerates the expanding cost caused by the homomorphic encryption. A real time validation on the proposed encryption scheme using AVISPA was additionally performed and the results are satisfactory.
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
This document proposes a medical image encryption technique that uses multiple chaotic maps. It utilizes the logistic map, Arnold cat map, and Baker's map within a triple data encryption standard (3DES) scheme. The technique encrypts and decrypts medical images efficiently and securely, making it suitable for transmission over insecure networks. It was tested using the transmission control protocol (TCP)/internet protocol (IP) to transfer encrypted images between a server and client. Experimental results found the method resistant to attacks while maintaining encryption performance.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
A Wireless Sensor Network is a multiple collection of large number of sensor nodes. These sensor nodes are used to collect the information from the surroundings and pass it to the base station. Data Aggregation is an important technique to achieve power resource effectively in the sensor network. Because sensor node has limited battery power so data aggregation techniques have been proposed for WSN. The data from the multiple sensor nodes are aggregated is usually performed by averaging method. The aggregated data are stored into header aggregator node and it is highly susceptible to attacks. To address this security issue, Iterative Filtering algorithms are used to monitor sensor nodes and provide great promise by detecting vulnerable errors. For transferring aggregator data from aggregated node to base station, this paper introduces Cryptography and Random Key Generation technique. We use encryption technique for original message and simultaneously create a key for that encrypted message. That generated key and encrypted message will be sent to the receiver through the possible paths where the hackers cannot hack the original message.
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
Abstract: Data gathering in wireless sensor network (WSN) is a crucial field of study and it can be optimized various algorithms like clustering, aggregation, and cryptographic technique in order to reliably transfer data between sensor and sink. But these techniques do not provide an optimized data gathering wireless sensor network because of the fact that they do not leverage the advantages of various techniques. Our problem definition is to create a reliable data gathering wireless sensor network which ensures good energy efficiency and lower delay as compared to existing techniques.
Keywords: Aggregation, Clustering, Data Gathering, Cryptography, Data Compression, Run Length Encoding.
Title: Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency and Delay
Author: Neelam Ashok Meshram
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
An auto-encoder bio medical signal transmission through custom convolutional ...IAESIJAI
The transmission of biomedical signals in real-time is extremely difficult and necessitates the use of cloud and internet of things (IoT) infrastructure. Security is also an important consideration, however, to achieve this, a reconstruction method is developed where the entire signal is fed as an input, just the primary portion, the entire signal is taken then encoded, and then deliver to the destination. It is unlocked using a reconstruction technique without any signal attenuation. The key difficulty is how to manage the sensor network once the input is prepared for transmission. This has problems with extremely high network energy consumption and accurate data collection. The accuracy of data reconstruction through is improved by compressive sensing. The lifespan of the network as a whole could be extended, in this study; the proposed proposed system convolutional neural network (PS-CNN) is an integrated model that combines feature selection and auto-encoder. In order to produce the most useful features for particular tasks, our algorithm can eventually separate the appropriate task units from the irrelevant tasks.
An Encrypted MAC for the Authentication Process in WSNIJMTST Journal
This document discusses an encrypted MAC protocol for authentication in wireless sensor networks. It aims to address security issues like denial-of-sleep attacks that drain sensor node energy. The proposed approach uses TLS to encrypt the MAC signature along with the message. This provides authentication, confidentiality and reduces energy consumption by keeping nodes awake for shorter periods. The encrypted MAC approach counters denial-of-sleep attacks by authenticating data transfers in a secure and efficient manner.
This document summarizes various data aggregation techniques for wireless sensor networks. It discusses how data aggregation can help reduce transmission overhead and improve security by allowing computation on encrypted data through privacy homomorphism. Several data aggregation schemes are described, including concealed data aggregation (CDA) schemes based on privacy homomorphism that allow aggregation of encrypted data without decrypting it first. The document also reviews recoverable concealed data aggregation (RCDA) schemes, a concealed data aggregation scheme for multiple applications (CDAMA), and public key cryptosystems that can enable data aggregation functions to be performed on encrypted data in wireless sensor networks.
This document presents a mathematical approach for calculating reliability in wireless sensor networks (WSN) for security purposes. It discusses three key aspects: 1) calculating the reliability of the interconnected network backbone through factors like bandwidth and signal transmission, 2) calculating the reliability of the overall WSN by considering parameters like performance and total reliability, and 3) classifying data aggregation schemes which can help provide secure and accurate data aggregation. The approach aims to estimate system working quality and design a reliable security system through these reliability calculations.
This document presents a mathematical approach for calculating reliability in wireless sensor networks (WSN) for security purposes. It discusses the requirements for designing a reliable security system for WSNs, including complex reliability parameters, reliability requirements, time requirements, and reparability requirements. It then describes calculating the reliability of the three main components of a WSN: the interconnected backbone, the sensor nodes organized into clusters, and data aggregation. Equations are provided for calculating the maximum transmitting channel bandwidth, minimum time cycle for signal transmission, and number of data bits transmitted per second over the channel to determine the reliability of the backbone interconnectivity. The goal is to use these reliability calculations to design robust security systems for WSNs.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
This document proposes a reliable strategy against power dissipating attacks in hierarchical wireless sensor networks. The strategy aims to develop an energy-efficient and reliable approach to counter denial-of-sleep attacks, which can rapidly reduce network lifetime. It introduces a two-tier energy-efficient reliable strategy that couples with the MAC protocol for mutual authentication in a simple way to minimize energy consumption while detecting and preventing power dissipating attacks. Simulation results show that the proposed strategy can efficiently counter replay and forgery attacks while being energy efficient to balance security and energy conservation in the network.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
An efficient tree based self-organizing protocol for internet of things.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Validation of pervasive cloud task migration with colored petri netredpel dot com
The document describes a study that used Colored Petri Nets (CPN) to model and simulate task migration in pervasive cloud computing environments. The study made the following contributions:
1) It expanded the semantics of CPN to include context information, creating a new CPN model called CCPN.
2) Using CCPN, it constructed two task migration models - one that considered context and one that did not - to simulate task migration in a pervasive cloud based on the OSGi framework.
3) It simulated the two models in CPN Tools and evaluated them based on metrics like task migration accessibility, integrity of the migration process, and system reliability and stability after migration. It also
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
The document proposes a novel approach for predicting quality of service (QoS) metrics for cloud services. The approach combines fuzzy neural networks and adaptive dynamic programming (ADP) for improved prediction accuracy. Specifically, it uses an adaptive-network-based fuzzy inference system (ANFIS) to extract fuzzy rules from QoS data and employ ADP for online parameter learning of the fuzzy rules. Experimental results on a large QoS dataset demonstrate the prediction accuracy of this approach. The approach also provides a convergence proof to guarantee stability of the neural network weights during training.
Towards a virtual domain based authentication on mapreduceredpel dot com
This document proposes a novel authentication solution for MapReduce (MR) models deployed in public clouds. It begins by describing the MR model and job execution workflow. It then discusses security issues with deploying MR in open environments like clouds. Next, it specifies requirements for an MR authentication service, including entity identification, credential revocation, and authentication of clients, MR components, and data. It analyzes existing MR authentication methods and finds they do not fully address the needs of cloud-based MR deployments. The paper then proposes a new "layered authentication solution" with a "virtual domain based authentication framework" to better satisfy the requirements.
Privacy preserving and delegated access control for cloud applicationsredpel dot com
Privacy preserving and delegated access control for cloud applications
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space time utility maximization model.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
Efficient multicast delivery for data redundancy minimization over wireless data centers
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
A tutorial on secure outsourcing of large scalecomputation for big data
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
A parallel patient treatment time prediction algorithm and its applications in hospital.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Exploring Ocean Floor Features for Middle SchoolMarie
This 16 slide science reader is all about ocean floor features. It was made to use with middle school students.
You can download the PDF at thehomeschooldaily.com
Thanks! Marie
Different pricelists for different shops in odoo Point of Sale in Odoo 17Celine George
Price lists are a useful tool for managing the costs of your goods and services. This can assist you in working with other businesses effectively and maximizing your revenues. Additionally, you can provide your customers discounts by using price lists.
Unit- 4 Biostatistics & Research Methodology.pdfKRUTIKA CHANNE
Blocking and confounding (when a third variable, or confounder, influences both the exposure and the outcome) system for Two-level factorials (a type of experimental design where each factor (independent variable) is investigated at only two levels, typically denoted as "high" and "low" or "+1" and "-1")
Regression modeling (statistical model that estimates the relationship between one dependent variable and one or more independent variables using a line): Hypothesis testing in Simple and Multiple regression models
Introduction to Practical components of Industrial and Clinical Trials Problems: Statistical Analysis Using Excel, SPSS, MINITAB®️, DESIGN OF EXPERIMENTS, R - Online Statistical Software to Industrial and Clinical trial approach
HOW YOU DOIN'?
Cool, cool, cool...
Because that's what she said after THE QUIZ CLUB OF PSGCAS' TV SHOW quiz.
Grab your popcorn and be seated.
QM: THARUN S A
BCom Accounting and Finance (2023-26)
THE QUIZ CLUB OF PSGCAS.
Strengthened Senior High School - Landas Tool Kit.pptxSteffMusniQuiballo
Landas Tool Kit is a very helpful guide in guiding the Senior High School students on their SHS academic journey. It will pave the way on what curriculum exits will they choose and fit in.
Rose Cultivation Practices by Kushal Lamichhane.pdfkushallamichhame
This includes the overall cultivation practices of Rose prepared by:
Kushal Lamichhane (AKL)
Instructor
Shree Gandhi Adarsha Secondary School
Kageshowri Manohara-09, Kathmandu, Nepal
Diptera: The Two-Winged Wonders, The Fly Squad: Order Diptera.pptxArshad Shaikh
Diptera, commonly known as flies, is a large and diverse order of insects that includes mosquitoes, midges, gnats, and horseflies. Characterized by a single pair of wings (hindwings are modified into balancing organs called halteres), Diptera are found in almost every environment and play important roles in ecosystems as pollinators, decomposers, and food sources. Some species, however, are significant pests and disease vectors, transmitting diseases like malaria, dengue, and Zika virus.
THE QUIZ CLUB OF PSGCAS BRINGS T0 YOU A FUN-FILLED, SEAT EDGE BUSINESS QUIZ
DIVE INTO THE PRELIMS OF BIZCOM 2024
QM: GOWTHAM S
BCom (2022-25)
THE QUIZ CLUB OF PSGCAS
Adam Grant: Transforming Work Culture Through Organizational PsychologyPrachi Shah
This presentation explores the groundbreaking work of Adam Grant, renowned organizational psychologist and bestselling author. It highlights his key theories on giving, motivation, leadership, and workplace dynamics that have revolutionized how organizations think about productivity, collaboration, and employee well-being. Ideal for students, HR professionals, and leadership enthusiasts, this deck includes insights from his major works like Give and Take, Originals, and Think Again, along with interactive elements for enhanced engagement.
How to Manage Maintenance Request in Odoo 18Celine George
Efficient maintenance management is crucial for keeping equipment and work centers running smoothly in any business. Odoo 18 provides a Maintenance module that helps track, schedule, and manage maintenance requests efficiently.
Completed Sunday 6/8. For Weekend 6/14 & 15th. (Fathers Day Weekend US.) These workshops are also timeless for future students TY. No admissions needed.
A 9th FREE WORKSHOP
Reiki - Yoga
“Intuition-II, The Chakras”
Your Attendance is valued.
We hit over 5k views for Spring Workshops and Updates-TY.
Thank you for attending our workshops.
If you are new, do welcome.
Grad Students: I am planning a Reiki-Yoga Master Course (As a package). I’m Fusing both together.
This will include the foundation of each practice. Our Free Workshops can be used with any Reiki Yoga training package. Traditional Reiki does host rules and ethics. Its silent and within the JP Culture/Area/Training/Word of Mouth. It allows remote healing but there’s limits As practitioners and masters, we are not allowed to share certain secrets/tools. Some content is designed only for “Masters”. Some yoga are similar like the Kriya Yoga-Church (Vowed Lessons). We will review both Reiki and Yoga (Master tools) in the Course upcoming.
S9/This Week’s Focus:
* A continuation of Intuition-2 Development. We will review the Chakra System - Our temple. A misguided, misused situation lol. This will also serve Attunement later.
Thx for tuning in. Your time investment is valued. I do select topics related to our timeline and community. For those seeking upgrades or Reiki Levels. Stay tuned for our June packages. It’s for self employed/Practitioners/Coaches…
Review & Topics:
* Reiki Is Japanese Energy Healing used Globally.
* Yoga is over 5k years old from India. It hosts many styles, teacher versions, and it’s Mainstream now vs decades ago.
* Anything of the Holistic, Wellness Department can be fused together. My origins are Alternative, Complementary Medicine. In short, I call this ND. I am also a metaphysician. I learnt during the 90s New Age Era. I forget we just hit another wavy. It’s GenZ word of Mouth, their New Age Era. WHOA, History Repeats lol. We are fusing together.
* So, most of you have experienced your Spiritual Awakening. However; The journey wont be perfect. There will be some roller coaster events. The perks are: We are in a faster Spiritual Zone than the 90s. There’s more support and information available.
(See Presentation for all sections, THX AGAIN.)
*Order Hemiptera:*
Hemiptera, commonly known as true bugs, is a large and diverse order of insects that includes cicadas, aphids, leafhoppers, and shield bugs. Characterized by their piercing-sucking mouthparts, Hemiptera feed on plant sap, other insects, or small animals. Many species are significant pests, while others are beneficial predators.
*Order Neuroptera:*
Neuroptera, also known as net-winged insects, is an order of insects that includes lacewings, antlions, and owlflies. Characterized by their delicate, net-like wing venation and large, often prominent eyes, Neuroptera are predators that feed on other insects, playing an important role in biological control. Many species have aquatic larvae, adding to their ecological diversity.
Pests of Rice: Damage, Identification, Life history, and Management.pptxArshad Shaikh
Rice pests can significantly impact crop yield and quality. Major pests include the brown plant hopper (Nilaparvata lugens), which transmits viruses like rice ragged stunt and grassy stunt; the yellow stem borer (Scirpophaga incertulas), whose larvae bore into stems causing deadhearts and whiteheads; and leaf folders (Cnaphalocrocis medinalis), which feed on leaves reducing photosynthetic area. Other pests include rice weevils (Sitophilus oryzae) and gall midges (Orseolia oryzae). Effective management strategies are crucial to minimize losses.
Pests of Rice: Damage, Identification, Life history, and Management.pptxArshad Shaikh
A hybrid security and compressive sensing based sensor data gathering scheme
1. SPECIAL SECTION ON INDUSTRIAL SENSOR NETWORKS WITH
ADVANCED DATA MANAGEMENT: DESIGN AND SECURITY
Received March 30, 2015, accepted May 18, 2015, date of publication June 1, 2015, date of current version June 9, 2015.
Digital Object Identifier 10.1109/ACCESS.2015.2439034
A Hybrid Security and Compressive Sensing-Based
Sensor Data Gathering Scheme
JIN QI1, XIAOXUAN HU2, YUN MA1, AND YANFEI SUN2
1School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2School of Automation, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Corresponding author: Y. Sun ([email protected])
This work was supported in part by the National Natural Science Foundation of China under Grant 61003237, in part by the China
Post-Doctoral Science Foundation Funded Project under Grant 2015M571790, and in part by NUPTSF under Grant NY213047,
Grant NY213050, Grant NY214102, and Grant NY214098.
ABSTRACT The use of cryptographic techniques such as encryption and hashing largely increases the
energy consumption of sensors, which aggravates the original critical energy constraint problem of wireless
sensor networks (WSNs). To reduce the burden of sensors, compression can be utilized. Since the traditional
chaos-based schemes are not directly applicable for WSNs, we present a hybrid security solution. The hybrid
security consists of 8-bit integer chaotic block encryption and a chaos-based message authentication codes.
It aims to promote the security and performance of data gathering. In this paper, a hybrid security and
compressive sensing-based scheme for multimedia sensor data gathering is presented. It has light security
mechanism and thus decreases the complexity and energy consumption of system. Performance analysis
about security and compression is carried out. The results show that our scheme is more applicable for
WSNs multimedia data gathering from security and compression efficiency.
INDEX TERMS WSNs, multimedia data gathering, chaotic block encryption, compressive sensing.
I. INTRODUCTION
Recent years, there is a strong interest in WSNs for
multimedia or secure communications [1], [2], which can
gather large volume sensitive data and thus provides the
impetus for extending the capabilities of WSNs for many new
and advanced applications. Security requirement of many
WSNs applications are normally fulfilled according to
confidentiality, authentication, integrity, and availability
with encryption and hashing technologies. But current
cryptographic algorithms charge high in computation and
memory, which impose a significant burden on the limited
energy sources of sensor nodes. This may cause the
application of state-of-the-art cryptographic algorithms
infeasible. A widely used network security method is
compressing data with data compression algorithms before
encryption. Data compression is a process of reducing the
amount of data, which removes redundancy, repeatability and
irrelevancy of original data. But traditional protocols such as
SSL cannot be applied directly to WSNs because they are
compute-intensive. To deal with this problem, a promising
approach is compressive sensing (CS) technology [3]–[5],
which implements data compression in WSNs.
CS has a low complexity for transmitting computationally
complex data while keeping high compression ratios for
sparse data.
Data gathering techniques based on CS have been lately
researched [6], [7], with the objective of minimizing the
total energy consumption when collecting data from
sensors. Since information contained in some multimedia
communication is sensitive and important, we have to
prevent any unauthorized access to this system. Commonly
encryption is incorporated into CS technique for security.
Symmetric cryptographic algorithms are usually applied in
WSNs for security, like AES and SKIPJACK. AES [8] and
SKIPJACK [9] both have the requirement for large storage,
which are not appropriate for the data gathering in resource-
limited WSNs. Thus we should consider a lightweight chaotic
encryption method. As a research focus, chaotic encryption
is a widely applied non-traditional encryption technology.
Chaotic-based cryptography is based on the complex
dynamics of nonlinear maps that are deterministic but simple.
Thus it can provide a secure and fast solution for data
protection, which can be appropriately applied in WSNs data
gathering. However, many literatures on chaos
encryption [10], [11] have poor efficiency. To increase
the encryption performance, we propose a hybrid security
718
2169-3536
2015 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
2. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
strategy that combines a chaotic block encryption and
light-weighted message authentication codes (MACs). It can
avoid the data redundancy resulting from padding in
encryption, and thus fit for WSNs communications with small
packets.
In this thesis, we address security problem for multimedia
sensor data gathering in WSNs. A hybrid security and
CS based sensor data gathering scheme is presented.
A performance analysis on security is carried out; also the
influence of different compression ratio is discussed.
The rest of the paper is organized as follows. Section II
present the hybrid security strategy. Section III introduces CS
in WSNs applications. Section IV proposes a HSCS based
sensor data gathering scheme. Conclusions are given
in Section V.
II. BACKGROUND AND RELATED WORK
In this part, we will present some related work, and mainly
focus on CS and MACs.
A. BACKGROUND OF CS
First, we will give a brief introduction to CS. Compressed
Sensing techniques [1]–[4] is not a new concept. But it
does bring us a good approach to recover a compressible
signal from under-sampled random projections, also refer
to as measurements. A compressible vector signal x∈RN
(x = [x1x2 . . . xN ]T ) is k-sparse if x has k non-zero elements.
In another case, x may be dense (most elements of x are
non-zeros) but can be considered as sparse in ψ domain
if x = ψθ and θ is a k-sparse vector. When applying CS
to a data gathering system, vector x represents data from
N sensors in the network. The gain when applying CS comes
from the shrinkage of the number of transmitting measure-
ments in comparing with the number of the original sensing
data. Vector y can be regarded as the measurement vector,
contains data sampled from N sensor readings: y ∈ RM
(y = [y1y2. . .yM ]T ), where M N [4]. For signal sampling,
the random measurements are generated by y = φx where
φ ∈ RM is the measurement vector with yi = N
j=1 ϕi,jxj,
where ϕi,j are all entries on the ith row of the projection
matrix ∅. For signal recovery, the number of measurement
for reconstruction of the original signal perfectly with high
probability is M = O(klogN/k) following the l1 optimiza-
tion problem given in [4].
ˆx = argmin x 1, subject to y = φx (1)
In case we need sparsifying matrix to make x sparse in ψ
domain (ψ can be DCT or Wavelet depending on the signal
properties).
ˆθ = argmin x 1, subject to y = φψθ (2)
Where θ 1 = n
i=1 |θi|. The l1 optimization can be
achieved by linear programming techniques, such as Basis
Pursuit [3].
Still, we need to put noise into consideration while
sampling and sending the measurements (in our WSN data
gathering case we collect measurements and send them to the
base station): y = φx + e, with [[e]]2 < e and recover:
ˆx = argmin x 1
, subject to y = φx 2
< e. (3)
B. BACKGROUND OF MACs
Message Authentication Codes (MACs) [14] are symmetric
cryptographic algorithms that provide data integrity and
the authentication of data origin. Data integrity enables the
recognition of any modification or manipulation of the
message during data communication. The authentication of
data origin provides confirmation that the message come from
the sender, who shares the used secret key with the receivers.
Due to the sharp demand for secure transmission,
communication systems can use MACs for security
consideration. MACs are constructed in such a way that any
modification of the message results in large changing of
original data in a MAC. This effect is known in cryptography
as ‘‘avalanche effect’’, which follows such law: every
modified message produces an incorrect MAC at the
verification. If the verification fails, the message is not
authentic and it is regarded as useless.
For multimedia application, the strong verification
condition for data authentication is not applicable, since the
digital content is continuously modified and manipulated as
a result of compression and conversion in these applications.
Any of these modifications would be considered as a forgery
in case of MAC verification. Therefore it is necessary to
research such technique that make the modifications of a
single or a few message bits do not result in any modification
of MAC.
In the last decade there are researches for the construction
of ‘‘robust’’ MACs [5], [6] that are less sensitive to modifica-
tions on messages. Literature [7] presented a MAC algorithm
for correction of data that used a different verification as
Soft Input Soft Verification (SISV). The received MAC and
the one recalculated of the received message are compared,
as by regular verification. But it is unnecessary to be equal
for the successful verification: which can also be successful if
one or two, or few bits of both compared MACs are different.
This algorithm is viewed as a basis of Soft Input Decryption.
Both algorithms are iterative and combine channel decoding
and cryptographic verification like this: the message is
corrected with both channel decoding and MACs. These
two papers are also referred in our paper, with more expansion
in data transmission efficiency.
III. HYBRID SECURITY STRATEGY
The hybrid security strategy adopted in this paper is based on
the research of MACs and chaotic block encryption that has
integer chaotic mapping.
A. DISCRETIZATION OF INTEGER CHAOTIC MAP
WSNs usually adopt embedded CPU without supporting of
complicated computation like float number operation. Thus
we need the discretization process for integer chaotic map.
VOLUME 3, 2015 719
www.redpel.com+917620593389
www.redpel.com+917620593389
3. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
Here we adopt one-dimensional Logistic mapping and
transform it to an integer chaotic map that are discrete both
in time-domain and frequency-domain [13]. The chaotic
function of a Logistic mapping is:
xn+1 = ζxn(1 − xn), (4)
where xn is the result of the nth iteration. When system
parameter ζ is among the range of 3.57 to 4, the iteration
result of Logistics has such chaotic characteristics as noise
like [14]. There exists the equivalent form of (4):
xn+1 = 1 − αx2
n , (5)
where α ∈ [0, 2], xn ∈ [−1, 1]. (5) can be transformed to:
k2
xn+1 = k2
− α(kxn)2
, (6)
where k = 0. Set yn = k(xn + 1), then we get:
xn = yn/k − 1, xn+1 = yn+1/k − 1, (7)
Put the values of (7) into (6). When α = 2, we can
simplify (6) as:
yn+1 = 4yn − 2/k · y2
n, (8)
If we assign integer to all yn, it can be inferred that (8) are
the iteration formula in unsigned integer range with machine
word length. The computing of (8) only needs addition,
subtraction multiplication, and shifting in embedded system,
which is in favor of energy efficiency for WSNs. Experiments
show (8) has perfect stochastic characteristic under 32-bit
machine word. It can guarantee security and computing
performance in the meanwhile. Thus we choose 32-bit integer
chaotic series as the sub-key of the encryption in our
HSSC scheme.
B. CHAOTIC BLOCK ENCRYPTION
We use 8-bit block Feistel [13]. Each block of plaintext
is divided equally into low and high part, denoted as
L and H. Feistel round operation is achieved through the
XOR of Li−1 and Hi−1 with the help of round key ti and
F function. F function is an 8-bit integer chaotic iterative
that is computed as: expand the 4-bit low Li−1 to 8-bit, and
XOR it with 8-bit ti. The result (namely yn) is input into
c function and 8-bit integer chaotic iterations are carried out.
The output of iterations (namely yn+1) is divided equally into
low and high part, which will do XOR operation and generate
output f.
The structure of Feistel is:
Hi = Li−1
Li = Hi−1 ⊕ f,
(9)
Where each element is 4-bit. The security performance of
Feistel mostly roots from the nonlinearity characteristic in the
8-bit integer chaotic computation of encryption round process
of c function. Besides, sub-key is increased by increasing the
round number in Feistel structure, which can further promote
the security of the chaotic block encryption. The substitute
structure of 8-bit Feistel block encryption is simple and thus
is suitable for data gathering in WSNs.
C. MACs BASED ON CHAOTIC BLOCK ENCRYPTION
The system security cannot be well guaranteed with
encryption alone given the attacker know the seed
information. Thus we consider hash function to solve the
problem. Notice that hashing alone cannot guarantee integrity
as an imposter may hash and send spurious data with hash
function knowledge. However, a combination of hashing
and encryption is more robust to resist attack of imposter.
We utilize the cipher block chain mode (CBC) for hashing
in message authentication codes (MACs) computing.
As symmetric cryptographic algorithms, MACs [15] can
provide data integrity and the authentication of data origin.
Integrity checking enables the recognition of any modifica-
tion or manipulation of the data during transmission. The
authentication of data makes receiver ensure the message
originates by sender. Sender and receiver share the same
secret key.
For those communication systems that demand secure data
transfer, MACs can provide strong protection against
forgeries. Any modification of the message results in
changing about half of bit a MAC. Such effect is known
as ‘‘avalanche effect’’ in cryptography: each modified
message results in an incorrect MAC at the verification and
the authentication verification is not passed. Thus we
adopt MAC in our hybrid security scheme. Besides, any
modification of message will be considered as a forgery in
MAC verification. Whereas small changes of message bits
are possible in multimedia application of WSNs.
To degrade the sensitivity to modifications of MAC, we can
add software counter in the receiver comparing the received
MAC and the one recalculated of the received message.
If the non-matching cases are below the allowable level, the
received message is also regarded as safe.
FIGURE 1. Structure of MA-CBE.
The structure of our message authentication algorithm
based on 8-bit chaotic block encryption (MA-CBE) is
illustrated in Figure 1.
In Figure 1, CB is the cipher grouping process. F function
is defined as:
tn = Jn−1 mod xupper + xn
= Jn−1 mod xupper + 4tn−2 − 2/k · t2
n−2, (10)
720 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
4. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
MA-CBE uses 32-bit integer Logistic chaotic map, whose
process is as follows:
Step I, divide the original message I into n single-byte
block I1, I2, . . . , In;
Step II, I1 is encrypted into J1 (it has the same length
with I1) with the original key t1 and iteration original
x1: J1 = CBt1 (I1);
Step III, t1 and J1, as the input parameters of R function, are
used to compute final output. Besides, J1 and x2 will generate
the key t2 that is required in next block;
Step IV, repeat step I∼ step III, until reach In;
Step V, Compute R function, obtain the final MAC with
length m bytes, labeled as MAC [m].
The construction of R function is: enlarge and mapping
each bit of the 8-bit Ji into the corresponding bit of the
m byte MAC [m]. Notice ti is used as the index Ind to
determine the subscript of target unit in MAC [m]. Ji is
defined as: all the bits are set zero except the ith bit of Ji
(reserved). For R function, each block carries out rotate
operations: traverse i from 1 to 8, which has two steps.
First, t rotate left for i-1 bits, from where intercept the former
h bits to construct integer ind. The value of h and m follows:
2h = m. Second, conduct such operation:
MAC[Ind] = MAC[Ind] ⊕ Ji, (11)
Our hybrid security strategy combines F function,
R function, and CBC mode, which enhances the diffusion
effect of the hashing and thus promotes the whole security
of our scheme.
IV. CS IN WSNs APPLICATIONS
The main idea behind CS describes the reconstruction of
signals from a small number of linear non-adaptive measure-
ments by using some optimization techniques [16]. Suppose
original signal X = [x1, x2, . . . , xn]T has a k-sparse represen-
tation under transform basis matrix (size n×n). It satisfies:
X = · S =
n
i=1
iSi, (12)
where S is a k-sparse column vector representation
of X (k n). Only k coefficients are needed to represent the
signal. Remaining n-k coefficients are equal to zero and we
can discard those coefficients without much perceptual loss.
In CS, we do not need to send the original signal X of size n.
Instead, we may send a sample measurement Y = φ · X
(size m = O(k log n)), where φ is a random sample basis
matrix of size m × n (m n). The original signal at
destination recovers properly by solving the convex
optimization problem:
min
˜S
˜S
lp
s.t. Y = φX = φ ˜S, (13)
where lp-norm for vector means v p = i |vi|p 1/p
.
By solving lp-norm, the problem gets transformed
into a linear problem which is quite straight forward.
After recovering the sparse vector ˜S from the above
optimization problem, the original signal X is recovered by
letting X = ˜S. The performance of CS heavily depends on
the sparse representation of the original signal, which means
how few sample measurements to recover signal are needed.
CS itself may intrinsically provide confidentiality, given that
the adversary does not know matrix φ [17].
V. HSCS BASED SENSOR DATA GATHERING SCHEME
CS has a low complexity for transmitting computationally
complex data while keeping high compression ratios
for sparse data. The Hybrid Secure and Compressive
Sensing (CSCS) based Sensor data gathering scheme in this
paper covers two operations: hybrid security (encryption +
hashing) and compressive sensing. They are performed to
reduce data volume and keep security.
A. APPLICATION SCHEME
For sensitive multimedia data gathering in WSNs, it is hard
to sustain sufficient security and low energy cost
simultaneously. Here we propose a hybrid security and
CS based (HSCS) scheme for sensitive correlative sensor data
collection. Firstly, the captured data are encoded within
sensor nodes. Then HSCS is followed: CS is conducted;
hybrid security strategy as encryption algorithm (chaotic
block encryption) and integrity checking (MACs) are
implemented before transmission.
The process of HSCS is as follows. After signal samples
are compressed with CS, they are encrypted using an
encryption algorithm. Here we use 8-bit integer chaotic block
encryption. Then integrity examination is carried out with
a cryptographic hash algorithm to prevent malicious
modifications. Message Authentication (MA) Algorithm
is adopted. The whole security operation is discussed
in Section III, namely MA-CBE. A block diagram of
HSCS system is given in Figure 2.
FIGURE 2. Block diagram of an HSCS system.
Notice in the receiver, the inverse hashing should neglect
the few transmitting errors. It can be accomplished by a
software counter. If the number of incorrect cases is under
an allowable level, the authentication verification is passed.
To reduce complexity and measure energy consumption,
we use a digital CS that does not include analog-to-digital
converter (ADC). Compression algorithm is applied linearly
after ADC. A top-level view of the compression compo-
nent is shown in Figure 3, where a linear feedback shift
register is used to create random matrix. Compression
process consists of multiplying the input vector with
VOLUME 3, 2015 721
www.redpel.com+917620593389
www.redpel.com+917620593389
5. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
FIGURE 3. Compression hardware component.
a random matrix φ. The energy consumption (namely
multiplication number) depends on the matrix size. Partition
of input and compression ratio has significant impact on
execution time and energy consumption. Compression ratio
indicates the compression capability of the proposed
algorithm, which is calculated as:
r =
ciphertext length
plaintext length
× 100%. (14)
B. PERFORMANCE ANALYSIS AND DISCUSSION
Our evaluation has two parts. Firstly, it addresses the security
of HSCS; secondly, it analysis the compression performance
from energy consumption under different compression ratio
and input/output size.
1) SECURITY ANALYSIS
To examine the security performance, we will do verification
experiments for MA-CBE. The length of MAC is
set as 16 bytes (favorite length in hash functions).
We randomly choose 216 bits message from a C++ source
program. First, compute the MACs of original message,
and then do some transformations to the original message,
then re-compute the MACs of the new message. We make
four transformations, namely: change the word ‘‘turn’’
into ‘‘from’’; alter ‘‘7’’ to ‘‘4’’; change the first word ‘‘for’’
to ‘‘four’’; transform the punctuation ‘‘.’’ of the last line
to ‘‘;’’. The original MACs and the corresponding new MACs
are as follows:
E3210C4146625BA2377D8584A2EE25B3
87F93CD0F9287E233D3BEE25C15D2451
8FCA86EC55FBF6CE6D7C145D05FC6348
657A28AD83BEA68959EA05B52BF89217
73658B8E99E95579482AAE3CF1230B46
The above MACs show our MA-CBE has such character-
istics that it can diffuse the original message into each bit
of the output, while compressing the digest of original
message. Any modification to plaintext will result in
‘‘avalanche effect’’ in output MACs, namely the large number
of transformation.
To further testify the performance of MA-CBE, we next
will make statistical analysis on the change of MACs.
Choose arbitrary 216-bit message and compute the MACs,
labeled as ma. Toggle arbitrary bit of the message, and
re-compute the MACs, labeled as ma’. Count the
mismatching bits between ma and ma’, labeled as D.
This measurement experiments are repeated for X times.
There are several common performance metrics
for hash functions:
¯D =
1
X
X
i=1
Di, (15)
D =
1
X − 1
·
X
i=1
(Di − ¯D)
1/2
, (16)
G =
¯D
128
× 100%, (17)
G =
1
X − 1
·
X
i=1
(
Di
128
− G)2
1/2
× 100%, (18)
In (15) ∼ (18), ¯D and G is the average of D; the standard
deviation of D and P reflect the deviation between
original message and the average. The smaller D and P
are, the more distinct the feature of diffusion and chaos are.
Notice that the ideal diffusion and chaos can make each bit of
MACs change at a 50% probability while tiny change exists.
The values of ¯D, D, G, and G for different X (256, 512,
1024, 2048) are showed in Table 1.
TABLE 1. Measurements of MA-CBE.
The results in Table 1 show MA-CBE has good
performance in various performance metrics.
2) COMPRESSION PERFORMANCE ANALYSIS
To evaluate the energy consumption of each component in our
CSSC architecture, we carried out simulation with hardware
implementations Synopsys Design Compiler based on 65-nm
TSMC standard cell library [18]. Our estimation addresses on
CS and MA-CBE.
Suppose input data is partitioned into blocks of a-byte,
output block size is b bytes, compression ratio is r. Here
a and b are width and height of φ respectively. Figure 4 and
Figure 5 show the energy consumption of CS. Figure 4 shows
the energy consumption under different a and r, b is
equal to a.
FIGURE 4. Energy consumption under different a and r.
722 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
6. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
FIGURE 5. Energy consumption under different a, with constant r = 8.
Figure 5 shows the situation under different a and
constant r (set as 8), b is 8 times of a.
Figure 4 and Figure 5 give the average consumption for
compressor implementations based on different input and
output block sizes. We can see from the figures that execution
time and energy consumption of the compressor are
proportional to the size of φ.
To measure the energy consumption of MA-CBE,
we address on input size. It determines the computation
amount and energy consumption. Suppose input and output
in simulation are both b bytes, and inputs are multiples of
the block size. For chaotic block encryption with block size
1 byte, the energy consumption Eenc(b) = 1.47b + 5.6pJ,
with error rate 0.25%. For hashing (MACs) with block size
4 bytes, the energy consumption Ehash(b) = 0.49b + 26.2pJ,
with error rate 0.012%.
To investigate the energy performance of the system with
and without compression, we next will compute the energy
consumption under the two situations. Let Ecs(a,b) be the
energy consumption for compressive sensing a bytes input
signals into b bytes, Eenc(b) and Ehash(b) are described as
above. Let E(a) be the total energy for encryption and
hashing a bytes without compression, E(a,r) be the energy
for compressing a bytes, with compression ratio r = a/b.
Then the energy saving with compression is:
η(b, r) = 1 −
E(br, r)
E(br)
= 1
−
Ecs(br, b) + Eenc(b) + Ehash(b)
Eenc(br) + Ehash(br)
, (19)
Figure 6 illustrates the energy reduction under different
b and r. Figure 6 (a) shows how energy decreases with r when
b is constant and (b) is that b changes and r is constant.
We can see from Figure 6 that η(b, r) increases if
compression ratio is larger, and decrease as output size
increase. HSCS is nearly 68% more energy-efficient than
encryption and hashing alone with appropriate r.
When r = 8, notice that if b is larger than 66, the additional
energy saving of CS exceeds the saving that encryption and
hash yield.
FIGURE 6. Energy saving with HSCS. (a) Constant output size b =16bytes.
(b) Constant compression ratio r = 8.
3) DISCUSSION
The experiment results show that our HSCS is especially
suitable for WSNs and greatly reduces the energy consump-
tion in secure sensor data gathering. With proper parameters,
our scheme has lower energy cost compared to the case
with no compression or hybrid security strategy. Besides,
we regulate that MA-CBE only operates a few rounds, which
will bring more energy bonus in comparing with other chaotic
encryption algorithm.
VI. CONCLUSIONS
This thesis presents a security scheme for multimedia data
gathering in WSNs. It constructs a lightweight hybrid
strategy MA-CBE with 8-bit integer chaotic block encryption
and MACs based hashing. The experiments and simulations
show our scheme has significant performance in security and
compression (mainly from energy-efficiency). MA-CBE is
robust and powerful in secure data gathering. With appr-
opriate compression ratio, input data size, and data
correlation, the energy-efficiency can promote more
than 67%.
Different with other MACs, our lightweight hybrid security
scheme allows a few mismatching bits. With the help of a
VOLUME 3, 2015 723
www.redpel.com+917620593389
www.redpel.com+917620593389
7. J. Qi et al.: Hybrid Security and CS-Based Sensor Data Gathering Scheme
software counter, it can pass the authentication verification
under a certain threshold. This will reduce the sensitivity of
MACs to a few errors during transmission.
REFERENCES
[1] R. G. Baraniuk, ‘‘Compressive sensing [lecture notes],’’ IEEE Signal
Process. Mag., vol. 24, no. 4, pp. 118–121, Jul. 2007.
[2] R. Berinde and P. Indyk, ‘‘Sparse recovery using sparse random matrices,’’
Apr. 2008.
[3] M. Sartipi and R. Fletcher, ‘‘Energy-efficient data acquisition in wireless
sensor networks using compressed sensing,’’ in Proc. Data Compress.
Conf. (DCC), Mar. 2011, pp. 223–232.
[4] N. Rahnavard, A. Talari, and B. Shahrasbi, ‘‘Non-uniform compres-
sive sensing,’’ in Proc. 49th Annu. Allerton Conf. Commun., Control,
Comput. (Allerton), Sep. 2012, pp. 212–219.
[5] C. G. Boncelet, Jr., ‘‘The NTMAC for authentication of noisy messages,’’
IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 35–42, Mar. 2006.
[6] N. Zivic, ‘‘Soft correction and verification of the messages protected by
cryptographic check values,’’ in Proc. 45th Annu. Conf. Inf. Sci. Syst.,
Mar. 2013, pp. 1–6.
[7] N. Zivic and M. F. Flanagan, ‘‘On joint cryptographic verification and
channel decoding via the maximum likelihood criterion,’’ IEEE Commun.
Lett., vol. 16, no. 5, pp. 717–719, May 2013.
[8] N. Zivic and C. Ruland, ‘‘Method for transmitting and receiving a data
block and a corresponding transmitter and receiver,’’ U.S. Patent 8 196 015,
Jun. 5, 2012.
[9] N. Sastry and D. Wagner, ‘‘Security considerations for IEEE 802.15.4
networks,’’ in Proc. 3rd ACM Workshop Wireless Security, New York, NY,
USA, 2004, pp. 32–42.
[10] (2005). SKIPJACK and KEA Algorithm Specifications. [Online].
Available: http://csrc.nist.gov/CryptoToolkit/skipjack/skipjack.pdf
[11] N. K. Pareek, V. Patidar, and K. K. Sud, ‘‘Cryptography using multiple
one-dimensional chaotic maps,’’ Commun. Nonlinear Sci. Numer. Simul.,
vol. 10, no. 7, pp. 715–723, 2005.
[12] H. Yang, K.-W. Wong, X. Liao, W. Zhang, and P. Wei, ‘‘A fast image
encryption and authentication scheme based on chaotic maps,’’ Commun.
Nonlinear Sci. Numer. Simul., vol. 15, no. 11, pp. 3507–3517, 2010.
[13] S. Chen and R. Shu, ‘‘Block permutation cipher in chaos with Feistel struc-
ture for wireless sensor networks,’’ J. Adv. Intell. Soft Comput., vol. 105,
pp. 391–396, Jul. 2011.
[14] A. Kanso and A. Smaoui, ‘‘Logistic chaotic maps for binary numbers
generations,’’ Chaos, Solitons Fractals, vol. 40, no. 5, pp. 2557–2568,
2009.
[15] Information Technology—Security Techniques—Message Authentication
Codes (MACs)—Part 1: Mechanisms Using a Block Cipher,
document ISO/IEC 9797-1, Geneva, Switzerland, 2011.
[16] J. Haupt, W. U. Bajwa, M. Rabbat, and R. Nowak, ‘‘Compressed sens-
ing for networked data,’’ IEEE Signal Process. Mag., vol. 25, no. 2,
pp. 92–101, Mar. 2008.
[17] A. Orsdemir, H. O. Altun, G. Sharma, and M. F. Bocko, ‘‘On the security
and robustness of encryption via compressed sensing,’’ in Proc. IEEE
Military Commun. Conf., Nov. 2008, pp. 1–7.
[18] Power Compiler User Guide Manual, Release V-2004.06,
Synopsys, Inc., Mountain View, CA, USA, Jun. 2004.
JIN QI received the B.S. degree in computer sci-
ence and technology from Liaocheng University,
Liaocheng, China, in 2005, the M.S. degree in
computer application from Jiangnan University,
Wuxi, China, in 2008, and the Ph.D. degree in
information network from the Nanjing University
of Posts and Telecommunications, Nanjing, China,
in 2012. He has been a Lecturer with the School of
Internet of Things, Nanjing University of Posts and
Telecommunications, since 2012.
His main research interests are in the areas of intelligent computing, future
network, and Internet of Things.
XIAOXUAN HU received the B.S. degree in
automation from the Nanjing University of
Posts and Telecommunications, Nanjing, China,
in 2014, where she is currently pursuing the
M.S. degree in pattern recognition and intelligent
systems.
Her main research interests are in the areas of
intelligent computing, future network, and Internet
of Things.
YUN MA will receive the B.S. degree in internet of
things engineering from the Nanjing University of
Posts and Telecommunications, Nanjing, China, in
July 2015. She will study in the Hong Kong Uni-
versity of Science and Technology, Hong Kong,
for the M.S. degree in telecommunications, since
September 2015.
Her main research interests are in the areas of
intelligent computing, future network, and Internet
of Things.
YANFEI SUN received the Ph.D. degree in infor-
mation network from the Nanjing University of
Posts and Telecommunications, Nanjing, China,
in 2006.
He has been a Professor with the School of
Automation, Nanjing University of Posts and
Telecommunications, since 2006.
His main research interests are in the areas
of intelligent optimization, network management,
machine learning, and future network.
724 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389