Abstract
A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopic visual monitoring in real time. Compared to macrographic monitoring (e.g. aerial photography), it can also provide a flexible solution by means of the facility of setup and integration of microscopic data. Security is one of the significant issues for the applications of monitoring due to the visuality of the content in a WSMN. Besides the visual data, the confidentiality of the communication is also important since a WSMN serves as both a media network and a sensor network. Impersonation and key recovery attack are two particular harmful threats to the sensor networks. A spying agent masquerades as a normal node in the network, overhearing the data and signaling. In this paper, we present a data-aware scheme for a wireless sensor media network (WSMN) to guarantee the security of information system against both the impersonation and key recovery attacks during communication. With the consideration of the characteristics of visual data regarding both volatility and correlation, a chaos-driven strategy is used to design the protocol for tunnel establishment. The data-aware scheme is proposed to enhance the security for confidential communication by public key cryptography based attack detection. A simulation and related analysis are presented in this paper. The robustness against anti-attack is also discussed. The results show that the scheme is able to protect the system against both the impersonal intrusion and key recovery attack simultaneously based on data-aware attack-detection.
Original language | English |
---|---|
Pages (from-to) | 26941-26963 |
Number of pages | 23 |
Journal | Multimedia Tools and Applications |
Volume | 78 |
Issue number | 19 |
Early online date | 16 Jul 2017 |
DOIs | |
Publication status | Published - 15 Oct 2019 |
Bibliographical note
Publisher Copyright:© 2017, Springer Science+Business Media New York.
Keywords
- Chaotic encryption
- Confidential wireless communication
- Data-aware security
- Public key cryptography
- Wireless sensor media network