Buradasınız

KABLOSUZ ÇOKLU ORTAM ALGILAYICI AĞLARINDA DAMGALAMA İLE GÜVENLİ VERİ KÜMELEME

SECURE DATA AGGREGATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS VIA WATERMARKING

Journal Name:

Publication Year:

Author NameUniversity of AuthorFaculty of Author
Abstract (2. Language): 
Wireless Multimedia Sensor Networks (WMSNs) consist of a large number of sensor nodes that have multiple sensing units. Unlike traditional wireless sensor networks, WMSNs are used to collect multimedia data such as video or image. As WMSNs are employed by military or civil surveillance/tracking applications security of these Networks must be ensured. As in traditional wireless sensor networks, sensor nodes in WMSNs are resource limited. Hence, data collection in WMSNs must be performed in an energy efficient way. In this study, a watermarking based protocol that ensures secure and energy efficient data collection in WMSNs is proposed. In the proposed protocol, sensor nodes embed the secret data into image data using an attack resilient watermarking algorithm and data aggregators aggregate the image data. Performance analysis and simulations show that the proposed protocol ensures secure data aggregation and reduces the amount of data transmission.
Abstract (Original Language): 
Kablosuz Çoklu ortam Algılayıcı Ağları (KÇAA) birden çok algılayıcı ünitesine sahip algılayıcı düğümlerinin oluşturduğu ısı, nem v.b. basit veriler dışında video ve fotoğraf gibi verilerin de toplanabildiği bilgi toplama ağlardır. KÇAA’lar genellikle askeri yada sivil izleme/takip uygulamalarında kullanıldıkları için bu ağlarda güvenliğin sağlanması bir zorunluluktur. Geleneksel kablosuz algılayıcı ağlarında olduğu gibi, KÇAA’ları oluşturan algılayıcı düğümleri de enerji ve bantgenişliği açısından oldukça kısıtlıdır. Bu nedenle KÇAA’larda veri toplama işlemi hem güvenli hem de enerji etkin bir şekilde yapılmak zorundadır. Bu çalışmada KÇAA’larda veri toplama işlemini güvenli ve enerji etkin hale getirecek sayısal damgalama tabanlı veri kümeleme protokolü geliştirilmiştir. Geliştirilen protokolde algılayıcılar gizlemek istedikleri verileri fotoğraf verisi içine saldırılara karşı dayanıklı bir algoritma ile gömmekte ve bu damgalanmış veriler ise veri kümeleyiciler tarafından kümelenmektedir. Performans analizi ve benzetim çalışmaları, önerilen sistemin güvenli veri kümeleme sağlarken veri iletim miktarında da azalmaya neden olduğunu göstermektedir.
587
594

REFERENCES

References: 

1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. ve Cayirci, E., “A survey on sensor networks”, IEEE Communications Magazine, Cilt 40, No 8, 102-114, 2002. 2. Ozdemir, S., and Xiao, Y., “Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview” Computer Networks, Cilt 53, No 12, 2022-2037, 2009.
3. Akyildiz, I.F., Melodia, T. ve Chowdhury, K. R., “A survey on wireless multimedia sensor Networks”, Computer Networks, Cilt 51,No 4, 921-960, 2007.
4. Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D. ve Sanli, H.O., “Energy-Efficient and secure pattern based data aggregation for wireless sensor Networks”, Computer Communications, Cilt 29, No 4, 446-455, 2006.
5. Cam, H., Ozdemir, S., Nair, P. ve Muthuavinashiappan D., "ESPDA: Energy-Efficient and Secure Pattern-Based Data Aggregation for Wireless Sensor Networks", Proceding of IEEE Sensors Conference, Toronto, Canada, 2003.
6. Lee, S. ve Chung, T., “Data Aggregation for Wireless Sensor Networks Using Self organizing Map”, Artificial Intelligence and Simulation, 508-517, 2005.
7. Hu, L. ve Evans, D., “Secure aggregation for wireless Networks”, Workshop on Security and Assurance in Ad hoc Networks, 384-392, 2003.
8. Przydatek, B., Song, D. ve Perrig, A., “SIA : Secure information aggregation in sensor Networks”, ACM Conference on Sensor Systems, 255 – 265, 2003.
9. Girao, J., Westhoff, D. ve Schneider, M., “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation”, IEEE Transactions on Mobile Computing, 1417-1431, 2006.
10. Domingo-Ferrer, J., “A provably secure additive and multiplicative privacy homomorphism”, Information Security Conference, Lecture Notes in Computer Science, 471-483, 2002.
11. Ozdemir, S., “Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism”,International Conference on Pervasive Services, Istanbul, 2007.
12. Castelluccia, C., Mykletun, E. ve Tsudik, G., “Efficient aggregation of encrypted data in wireless sensor Networks”, Conference on Mobile and Ubiquitous Systems: Networking and Services, 109-117, 2005.
13. Ozdemir, S., “Secure Data Aggregation in Wireless Sensor Networks via Homomorphic Encryption”, Journal of The Faculty of Engineering and Architecture of Gazi University, Cilt 23,No 2,365-373, 2008. 14. Ozdemir S., ve Xiao, Y., "Integrity Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Networks", Computer Networks, Cilt 55, No 8, 1735-1746, 2011. 15. Ozdemir, S., Peng, M., ve Xiao, Y., “PRDA: Polynomial Regression Based Privacy Preserving Data Aggregation in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, Wiley, DOI: 10.1002/wcm.2369, 2013. 16. Cox I. J., Kilian J., Leighton T. ve Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Cilt 6, No 12,1673-1687,1997. 17. Piva A., Barni M., Bartolini F. ve Cappellini F., “DCT-based Watermark Recovering without Resorting to the Uncorrupted Orijinal Image, International Conference on Image Processing, Washington, DC, USA,, 1997. 18. Dugad R., Ratakonda K., ve Ahuja N., “A New Wavelet-Based Scheme for Watermarking Images,” International Conference on Image Processing,419-423,Chicago, IL, 1998. 19. Zhu W., Xiong Z. ve Zhang Y.Z., “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Cilt 9, No 4, 545-550,1999. 20. Elbasi E. ve Eskicioglu A. M., “A DWT-based Robust Semi-blind Image Watermarking Algorithm Using Two Bands,” IS&T/SPIE’s 18th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents Conference, San Jose, CA, 2006. 21. Elbasi E.,“Robust MPEG Watermarking in DWT Four Bands”, Journal of Applied Research and Technology, Cilt 10, No 2,87-93, 2012. 22. Huffman D.A., "A Method for the Construction of Minimum-Redundancy Codes", Proceedings of the I.R.E.,1098-1102, 1952. 23. Tiny OS Simulator. http://www.tinyos.net/. (Erişim Ocak 2012)
24. Çakıroğlu, M., Özcerit, T., Özdemir, Ç., “Boğma Saldırılarına Karşı Dinamik Kanal Atlamalı Yeni bir Güvenlik Yönteminin Tasarımı ve Başarım Analizi”, Gazi Üniv. Müh. Mim. Fak. Der., Cilt 26, No 4, 877-887, 2011

Thank you for copying data from http://www.arastirmax.com