A data-aware confidential tunnel for wireless sensor media networks

Charles Z. Liu*, Manolya Kavakli

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopic visual monitoring in real time. Compared to macrographic monitoring (e.g. aerial photography), it can also provide a flexible solution by means of the facility of setup and integration of microscopic data. Security is one of the significant issues for the applications of monitoring due to the visuality of the content in a WSMN. Besides the visual data, the confidentiality of the communication is also important since a WSMN serves as both a media network and a sensor network. Impersonation and key recovery attack are two particular harmful threats to the sensor networks. A spying agent masquerades as a normal node in the network, overhearing the data and signaling. In this paper, we present a data-aware scheme for a wireless sensor media network (WSMN) to guarantee the security of information system against both the impersonation and key recovery attacks during communication. With the consideration of the characteristics of visual data regarding both volatility and correlation, a chaos-driven strategy is used to design the protocol for tunnel establishment. The data-aware scheme is proposed to enhance the security for confidential communication by public key cryptography based attack detection. A simulation and related analysis are presented in this paper. The robustness against anti-attack is also discussed. The results show that the scheme is able to protect the system against both the impersonal intrusion and key recovery attack simultaneously based on data-aware attack-detection.

Original languageEnglish
Pages (from-to)26941-26963
Number of pages23
JournalMultimedia Tools and Applications
Volume78
Issue number19
DOIs
Publication statusPublished - Oct 2019

Keywords

  • data-aware security
  • wireless sensor media network
  • confidential wireless communication
  • public key cryptography
  • chaotic encryption

Fingerprint Dive into the research topics of 'A data-aware confidential tunnel for wireless sensor media networks'. Together they form a unique fingerprint.

Cite this