$$\hbox {S}^2$$S2DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks

Thanks to the availability of miniaturized camera and microphones, nowadays Wireless Multimedia Sensor Networks (WMSNs) can sense and deliver audio/video signals from a target environment to remote analysis sites. Hence, new opportunity are disclosed for advanced applications in health care, surveillance, military, and traffic monitoring domains, to name a few. But, at the same time, due to the high volume of multimedia streams and the richness of information they bring, WMSNs incur critical issues in terms of congestion control, privacy, and security. These problems can be solved separately by adopting consolidated solutions conceived to address each of them. But one of the pivotal point of optimization in a Wireless Sensor Network is the possibility of exploiting a cross layer design. To bridge this gap, an integrated solution is proposed hereby, namely Secure Selective Dropping Congestion Control $$(\hbox {S}^{2}\hbox {DCC})$$(S2DCC), based on end-to-end ciphering, in-network selective data dropping, scalable multimedia encoding, and hierarchical and hybrid network design. Moreover, an open source implementation of $$\hbox {S}^{2}\hbox {DCC}$$S2DCC has been developed in the Castalia simulator. The main outcomes of the performance evaluation show that $$\hbox {S}^{2}\hbox {DCC}$$S2DCC is able to meet data security and privacy requirements and to improve the quality of the received images at the sink with respect to state of the art solutions.

[1]  Luigi Alfredo Grieco,et al.  GoNe: Dealing with node behavior , 2015, 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[2]  Jolanta Brzostek-Pawłowska Multimedia Mathematical Communication in a Diverse Group of Students , 2019 .

[3]  Jong Hyuk Park,et al.  Privacy Protection and Access Control of Image Information Processing Devices , 2011 .

[4]  K. Deergha Rao,et al.  A New and Secure Cryptosystem for Image Encryption and Decryption , 2011 .

[5]  Martin Reisslein,et al.  A survey of multimedia streaming in wireless sensor networks , 2008, IEEE Communications Surveys & Tutorials.

[6]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[7]  Sara Tedmori,et al.  Image cryptographic algorithm based on the Haar wavelet transform , 2014, Inf. Sci..

[8]  Gennaro Boggia,et al.  SETA: A secure sharing of tasks in clustered wireless sensor networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[9]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[10]  Gennaro Boggia,et al.  DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..

[11]  Li-Hua Gong,et al.  Novel color image encryption algorithm based on the reality preserving fractional Mellin transform , 2012 .

[12]  Jun Lang,et al.  Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation , 2012 .

[13]  Hamid R. Rabiee,et al.  WCCP: A congestion control protocol for wireless multimedia communication in sensor networks , 2014, Ad Hoc Networks.

[14]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[15]  Raheem A. Beyah,et al.  Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[16]  Hamid Sharif,et al.  A cross layer resource allocation scheme for secure image delivery in wireless sensor networks , 2007, IWCMC.

[17]  Xingyuan Wang,et al.  Chaos-based partial encryption of SPIHT coded color images , 2013, Signal Process..

[18]  Alfred Mertins,et al.  Fully spatial and SNR scalable, SPIHT-based image coding for transmission over heterogenous networks , 2003 .

[19]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[20]  Gennaro Boggia,et al.  Selective Dropping Congestion Control for wireless multimedia sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[21]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[22]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[23]  Srinivasan Seshan,et al.  Synopsis diffusion for robust aggregation in sensor networks , 2008, ACM Trans. Sens. Networks.

[24]  Anthony Tzes,et al.  A hybrid scheme for video transmission over wireless multimedia sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.

[25]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[26]  Mohan Trivedi,et al.  The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.

[27]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[28]  Shaoming Pan,et al.  A content security protection scheme in JPEG compressed domain , 2014, J. Vis. Commun. Image Represent..

[29]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[30]  D. Patil,et al.  Priority-based Congestion Control Protocol (PCCP) for controlling upstream congestion in Wireless Sensor Network , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[31]  Gennaro Boggia,et al.  Secure Wireless Multimedia Sensor Networks: A Survey , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[32]  Anthony Vetro,et al.  Energy efficient JPEG 2000 image transmission over wireless sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[33]  Khumanthem Manglem Singh,et al.  Image Encryption using Elliptic Curve Cryptography , 2015 .

[34]  Imran Shafi,et al.  Enhanced Image Encryption Techniques Using Modified Advanced Encryption Standard , 2012 .

[35]  Birendra Biswal,et al.  Security of image in multimedia applications , 2011, 2011 International Conference on Energy, Automation and Signal.

[36]  Fathi E. Abd El-Samie,et al.  Efficient implementation of chaotic image encryption in transform domains , 2014, J. Syst. Softw..

[37]  Özlem Durmaz Incel,et al.  SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[38]  Chieh-Yih Wan,et al.  CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.