Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions

Wireless multimedia sensor networks will play a central role in the Internet of Things world, providing content-rich information for an uncountable number of monitoring and control scenarios. As more applications rely on multimedia data, security concerns gain attention, and new approaches arise to provide security for such networks. However, the usual resource constraints of processing, memory and the energy of multimedia-based sensors have brought different challenges for data encryption, which have driven the development of different security approaches. In this context, this article presents the state-of-the-art of cryptography in wireless multimedia sensor networks, surveying innovative works in this area and discussing promising research directions.

[1]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[2]  Mohamed Hamdi,et al.  A Survey on Encryption Schemes in Wireless Sensor Networks , 2014, 2014 7th International Conference on Advanced Software Engineering and Its Applications.

[3]  Wang Guoyu,et al.  A refined quadtree-based automatic classification method for remote sensing image , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[4]  Honggang Wang Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks , 2010, The Journal of Supercomputing.

[5]  Rui Gao,et al.  Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching , 2014, Int. J. Distributed Sens. Networks.

[6]  Hamid Sharif,et al.  On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks , 2010, IEEE Transactions on Multimedia.

[7]  Jamal N. Al-Karaki,et al.  Wireless Multimedia Sensor Networks: Current Trends and Future Directions , 2010, Sensors.

[8]  Yanfei Sun,et al.  A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.

[9]  Guoliang Xing,et al.  QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[10]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[11]  Luiz Affonso Guedes,et al.  Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization , 2015, Sensors.

[12]  Levente Buttyán,et al.  A Secure Distributed Transport Protocol for Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[13]  Murat Dener,et al.  Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[14]  Brahmjit Singh,et al.  Performance analysis of modified RC4 encryption algorithm , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[15]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[16]  Kyung-Ah Shim,et al.  A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.

[17]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[18]  Luiz Affonso Guedes,et al.  Availability Issues in Wireless Visual Sensor Networks , 2014, Sensors.

[19]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[20]  Bernhard Rinner,et al.  Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..

[21]  Yong Fu,et al.  A-LNT: A Wireless Sensor Network Platform for Low-Power Real-Time Voice Communications , 2014, J. Electr. Comput. Eng..

[22]  Ertan Onur,et al.  WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .

[23]  Daniel G. Costa,et al.  Energy-efficient Adaptive Encryption for Wireless Visual Sensor Networks , 2016 .

[24]  Hussein R. Al-Zoubi Video Coding and Routing in Wireless Video Sensor Networks , 2013 .

[25]  Qasem Abu Al-Haija,et al.  A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks , 2014, FNC/MobiSPC.

[26]  Gaël Richard,et al.  Audio Signal Representations for Indexing in the Transform Domain , 2010, IEEE Transactions on Audio, Speech, and Language Processing.

[27]  Luiz Affonso Guedes,et al.  The Coverage Problem in Video-Based Wireless Sensor Networks: A Survey , 2010, Sensors.

[28]  Hamid Sharif,et al.  Image transmissions with security enhancement based on region and path diversity in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[29]  Hassan N. Noura,et al.  Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks , 2015, Q2SWinet@MSWiM.

[30]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[31]  E. Elbasi,et al.  Secure data aggregation in wireless Multimedia Sensor Networks via watermarking , 2012, 2012 6th International Conference on Application of Information and Communication Technologies (AICT).

[32]  Lauri Sydanheimo,et al.  RC5-based security in wireless sensor networks: utilization and performance , 2010 .

[33]  Madhumita Panda Data security in wireless sensor networks via AES algorithm , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[34]  Shigeru Shimamoto,et al.  A Study on DWT-Based Digital Audio Watermarking for Mobile Ad Hoc Network , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[35]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[36]  Tasos Dagiuklas,et al.  Power Efficient Video Multipath Transmission over Wireless Multimedia Sensor Networks , 2008, Mob. Networks Appl..

[37]  Anthony Vetro,et al.  Distributed compression of zerotrees of wavelet coefficients , 2011, 2011 18th IEEE International Conference on Image Processing.

[38]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[39]  Abdelbasset Trad,et al.  Performance trade-offs of encryption algorithms for Wireless Sensor Networks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[40]  L. M. Varalakshmi,et al.  A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks , 2014, Telecommun. Syst..

[41]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[42]  Luiz Affonso Guedes,et al.  Exploiting the sensing relevancies of source nodes for optimizations in visual sensor networks , 2011, Multimedia Tools and Applications.

[43]  Tao Xiang,et al.  Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks , 2013, WASA.

[44]  P. P. Deepthi,et al.  Secure selective encryption of compressed audio , 2013, 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.

[45]  Kah Phooi Seng,et al.  Selective secure error correction on SPIHT coefficients for pervasive wireless visual network , 2013, Int. J. Ad Hoc Ubiquitous Comput..

[46]  Elizabeth Chang,et al.  Secure communication in wireless multimedia sensor networks using watermarking , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[47]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[48]  Sushma Agrawal,et al.  IoT based urban climate monitoring using Raspberry Pi , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[49]  Jong Min Kim,et al.  Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.

[50]  M. Sasi Kumar,et al.  Detection of jamming style DoS attack in Wireless Sensor Network , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[51]  Luiz Affonso Guedes,et al.  A Discrete Wavelet Transform (DWT)-Based Energy-Efficient Selective Retransmission Mechanism for Wireless Image Sensor Networks , 2012, J. Sens. Actuator Networks.

[52]  Song Han,et al.  Wireless Multimedia Sensor Networks Applications and Security Challenges , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[53]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[54]  Daniel G. Costa,et al.  A Survey of Image Security in Wireless Sensor Networks , 2015, J. Imaging.

[55]  Boon-Chong Seet,et al.  Distributed video coding for wireless video sensor networks: a review of the state-of-the-art architectures , 2015, SpringerPlus.

[56]  Ahmed Mehaoua,et al.  EDES — Efficient dynamic selective encryption framework to secure multimedia traffic in Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[57]  Christoph Ruland,et al.  A survey of image hashing technique for data authentication in WMSNs , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[58]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[59]  Massimo Merro,et al.  A semantic analysis of key management protocols for wireless sensor networks , 2011, Sci. Comput. Program..

[60]  Muhammad Hammad Ahmed,et al.  Security for WSN based on elliptic curve cryptography , 2011, International Conference on Computer Networks and Information Technology.

[61]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[62]  Jihong Guan,et al.  Towards a Secure Medium Access Control Protocol for Cluster-Based Underwater Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[63]  Hesham A. Ali,et al.  Image compression algorithms in wireless multimedia sensor networks: A survey , 2015 .

[64]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[65]  Qiu-xia Wang,et al.  Application research of the AES encryption algorithm on the engine anti-theft system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.

[66]  Luiz Affonso Guedes,et al.  A Survey on Multimedia-Based Cross-Layer Optimization in Visual Sensor Networks , 2011, Sensors.

[67]  Zhengding Qiu,et al.  Audio watermarking in DCT: Embedding strategy and algorithm , 2008, 2008 9th International Conference on Signal Processing.

[68]  Hee Yong Youn,et al.  Multi-Channel Multi-Path video transmission over wireless sensor networks , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[69]  Anthony Tzes,et al.  Adaptive Compression of Slowly Varying Images Transmitted over Wireless Sensor Networks , 2010, Sensors.

[70]  H. T. Panduranga,et al.  Partial image encryption for smart camera , 2013, 2013 International Conference on Recent Trends in Information Technology (ICRTIT).

[71]  Ponciano Jorge Escamilla-Ambrosio,et al.  Image compressive sensing cryptographic analysis , 2016, 2016 International Conference on Electronics, Communications and Computers (CONIELECOMP).

[72]  Kah Phooi Seng,et al.  Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose , 2012, ICWCA.

[73]  Hassan N. Noura,et al.  Efficient and Secure Visual Data Transmission Approach for Wireless Multimedia Sensor Networks , 2014, 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems.

[74]  Simon A. Dobson,et al.  Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing , 2014, Sensors.

[75]  Asaduzzaman Asaduzzaman,et al.  Security Issues in Wireless Sensor Networks: A Survey , 2013 .

[76]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[77]  Zhongmeng Zhao,et al.  Chaos-based image encryption with total shuffling and bidirectional diffusion , 2013, Nonlinear Dynamics.

[78]  Musab Ghadi,et al.  Securing data exchange in wireless multimedia sensor networks: perspectives and challenges , 2014, Multimedia Tools and Applications.

[79]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[80]  Hamid Sharif,et al.  Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks , 2010, IEEE Transactions on Multimedia.

[81]  Boon-Chong Seet,et al.  A comparative analysis of video codecs for multihop wireless video sensor networks , 2012, Multimedia Systems.

[82]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[83]  Bülent Tavli,et al.  The future of security in Wireless Multimedia Sensor Networks , 2010, Telecommun. Syst..

[84]  Yang Xin,et al.  A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[85]  A. Trad,et al.  Performance evaluation of encryption algorithm for wireless sensor networks , 2012, 2012 International Conference on Information Technology and e-Services.

[86]  G. Nikolakopoulos,et al.  A dual scheme for secured Multimedia Wireless Sensor Network , 2011, 2011 19th Mediterranean Conference on Control & Automation (MED).

[87]  Alaa Hussein Al-Hamami,et al.  Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[88]  Mohamed Hamed N. Taha,et al.  A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks , 2013 .

[89]  Min Chen,et al.  Quality-driven secure audio transmissions in wireless multimedia sensor networks , 2013, Multimedia Tools and Applications.

[90]  Mehmet A. Orgun,et al.  A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[91]  Leilei Liu,et al.  Compressive sensing image-fusion algorithm in wireless sensor networks based on blended basis functions , 2014, EURASIP J. Wirel. Commun. Netw..