SECURED IMAGE TRANSMISSION USING LEHS ALGORITHM IN WIRELESS SENSOR NETWORK TO ENHANCE THE NETWORK'S LIFETIME

被引:0
作者
Chandrasekaran, Bennila Thangammal [1 ]
Parthasarathy, Rangarajan [2 ]
Jeevaratinam, Raja Paul Perinbham [3 ]
机构
[1] RMD Engn Coll, Dept Informat Technol, Kavaraipettai 601026, Tamil Nadu, India
[2] RMD Engn Coll, Dept Comp Sci, Kavaraipettai 601026, Tamil Nadu, India
[3] KCG Coll Technol, Dept Elect & Commun, Karapakkam 600097, Tamil Nadu, India
来源
COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES | 2014年 / 67卷 / 10期
关键词
double guard Hill cipher; energy efficiency; Losningen cross-layer approach; modulo-256; inverse; secured image transmission; MULTIMEDIA; COMPRESSION;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Multimedia devices interconnected with the wireless sensor networks are able to transmit and retrieve the images because of the availability of low-cost CMOS cameras. Many cryptographic algorithms are proposed for transmitting image in a secured manner. In this paper, an image is transmitted in a secured manner by enhancing the application specific Wireless Sensor Network's lifetime using LEHS algorithm. Modified Hill cipher, Double Guard Hill cipher used as a cryptographic algorithm to provide secured image transmission and Losningen cross layer approach are used to enhance the wireless sensor network's lifetime by utilizing the energy efficiently in order to reduce the end-to-end delay, packet loss and routing overhead in the network. Network simulator-2 results show that the network's lifetime was enhanced by 1.2 times using Losningen cross-layer approach higher than AODV routing protocol without the cross-layer technique, and 1.6 times higher for secured image transmission using LEHS algorithm.
引用
收藏
页码:1401 / 1410
页数:10
相关论文
共 19 条
[1]   A survey on wireless multimedia sensor networks [J].
Akyildiz, Ian F. ;
Melodia, Tommaso ;
Chowdhury, Kaushik R. .
COMPUTER NETWORKS, 2007, 51 (04) :921-960
[2]   Energy Efficient Image Transmission in Wireless Multimedia Sensor Networks [J].
Aziz, Syed Mahfuzul ;
Duc Minh Pham .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (06) :1084-1087
[3]  
Bennila Thangammal C., 2012, ASIAN J SCI RES, V5, P133
[4]   How to repair the Hill cipher [J].
Ismail I.A. ;
Amin M. ;
Diab H. .
Journal of Zhejiang University-SCIENCE A, 2006, 7 (12) :2022-2030
[5]   Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks [J].
Lee, Sungju ;
Jeong, Seohyun ;
Chung, Yongwha ;
Cho, Hyeonjoong ;
Pan, Sung Bum .
2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, :137-140
[6]  
MAGAMBA K., 2012, INT J COMPUTER APPL, V57, P43
[7]  
Mohammed B., 2009, INT J COMPUTER SCI I, V4, P30
[8]   A high-performance SPIHT-based image and video codec for surveillance [J].
Mohanty, Bibhuprasad ;
Verma, Pramod Kumar ;
Mahapatra, Sudipta .
INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2013, 6 (02) :75-82
[9]   SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks [J].
Nasser, Nidal ;
Chen, Yunfeng .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2401-2412
[10]   A study of the energy consumption characteristics of cryptographic algorithms and security protocols [J].
Potlapally, NR ;
Ravi, S ;
Raghunathan, A ;
Jha, NK .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) :128-143