Enhanced approach using trust based decision making for secured wireless streaming video sensor networks

The advances in the expanse of image sensors have made it conceivable to make high-resolution picture sensors easily accessible. The amelioration of wireless interactive media sensor networks are found to be greatly increased due to the day to day usage of cameras, microphones and smart devices. A secured multi-hop routing mechanism is addressed in surveillance areas which could be incorporated to the multimedia sensors that are capable of peruse the detected data comprises of recorded images and videos. Also, malevolent sensor hubs could be interjected into the vigilance area in an untrusted environment. In this contemplated venture, a novel lightweight trust decision-making framework is accomplished for QoS clustering to give secure routing in both intercluster and intracluster communication. A quantifiable aberrant trust value is the variable determined by the Cluster Head (CH) for its Cluster Member (CM) inside the cluster. The LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is adopted for group formation and also for the exchange of the trust values among the master nodes, member nodes and Base station. In this way, the correspondence overhead, likelihood of dynamic assaults for example sinkhole and black hole assaults mount by eavesdroppers can be reduced by maintenance of trust values by cluster heads rather than cluster members. Besides, in wireless streaming video sensor networks this approach authorizes us to predict and counteract malicious untrusted and flawed nodes. Simulation results using NS-2 is examined and the suggested trust decision-making model escalates the dependability, elasticity and low memory aloft in comparison with the current trust models adopted for wireless video sensor network security.

[1]  K. Dhanalakshmi,et al.  Farmbot-a Smart Agriculture Assistor Using Internet of Things , 2018 .

[2]  Andreas Willig,et al.  Data Transport Reliability in Wireless Sensor Networks. A Survey of Issues and Solutions , 2005, PIK Prax. Informationsverarbeitung Kommun..

[3]  P. Punitha,et al.  Certain Investigation on Power Preservation in Sensor Networks , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).

[4]  Hongyu Pei Breivold,et al.  Internet of Things for Industrial Automation -- Challenges and Technical Solutions , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[5]  Victor C. M. Leung,et al.  Optimal Resource Allocation for Green and Clustered Video Sensor Networks , 2018, IEEE Systems Journal.

[6]  Jacques M. Bahi,et al.  A Security Framework for Wireless Sensor Networks: Theory and Practice , 2014, 2014 IEEE 23rd International WETICE Conference.

[7]  Minghao Yin,et al.  Animal migration optimization: an optimization algorithm inspired by animal migration behavior , 2014, Neural Computing and Applications.

[8]  Song Han,et al.  Wireless Multimedia Sensor Networks Applications and Security Challenges , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[9]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[10]  C. Sivaparthipan,et al.  Demonetization: a Visual Exploration and Pattern Identification of People Opinion on Tweets , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).

[11]  S. Senthilkumar,et al.  A Survey on Trust Management for Mobile Ad Hoc Networks , 2018 .

[12]  Yuguang Fang,et al.  Multiconstrained QoS multipath routing in wireless sensor networks , 2008, Wirel. Networks.

[13]  Jamal N. Al-Karaki,et al.  Wireless Multimedia Sensor Networks: Current Trends and Future Directions , 2010, Sensors.

[14]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[15]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[16]  Bruce H. Krogh,et al.  Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.

[17]  Chang-Gun Lee,et al.  MMSPEED: multipath Multi-SPEED protocol for QoS guarantee of reliability and. Timeliness in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[18]  S. Sivaranjani,et al.  ----------------------------------------------------------------------------------------------------------------IDENTIFYING FAKE USER ’ S IN SOCIAL NETWORKS USING NON VERBAL BEHAVIOR , 2015 .

[19]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Dijiang Huang,et al.  RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[21]  Ian F. Akyildiz,et al.  Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[22]  Marion Souil,et al.  Contribution to quality of service in wireless sensor networks. (Contribution à la qualité de service dans les réseaux de capteurs sans fil) , 2013 .

[23]  Gunasekaran Manogaran,et al.  Intelligent security algorithm for UNICODE data privacy and security in IOT , 2018, Service Oriented Computing and Applications.

[24]  S. Karthik,et al.  Designing statistical assessment healthcare information system for diabetics analysis using big data , 2018, Multimedia Tools and Applications.

[25]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[26]  C.B. Sivaparthipan,et al.  Eshopping Scam Identification using Machine Learning , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).

[27]  Md.Asdaque Hussain,et al.  WSN research activities for military application , 2009, 2009 11th International Conference on Advanced Communication Technology.

[28]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[29]  Huadong Ma,et al.  Some problems of directional sensor networks , 2007, Int. J. Sens. Networks.

[30]  Rajesh Patel,et al.  Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network , 2011 .

[31]  M. BalaAnand,et al.  Designing a Framework for Communal Software: Based on the Assessment Using Relation Modelling , 2018, International Journal of Parallel Programming.

[32]  V Geetha,et al.  A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network , 2014 .

[33]  Kwangjo Kim,et al.  State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[34]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[35]  Jacques M. Bahi,et al.  Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications , 2011, ADHOCNETS.

[36]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[37]  Ian F. Akyildiz,et al.  Correlation-Aware QoS Routing for Wireless Video Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[38]  Yang Liu,et al.  An energy-efficient QoS-aware media access control protocol for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..