Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1280940.1280973acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

A cross layer resource allocation scheme for secure image delivery in wireless sensor networks

Published: 12 August 2007 Publication History

Abstract

Selective encryption for secure image transmission is an important ongoing research area which aims to scramble the critical information correlation and inter-dependency within final image compression bit streams. However, how to take Unequal Error Protection (UEP) method for transmitting partially encrypted image data in error-prone communication channels is still an open research problem in Wireless Sensor Networks (WSN). In this paper, we propose a new cross layer optimization approach for energy efficient delivery of selectively encrypted images in WSN while assuring image quality. In the proposed approach, identified importance levels of diversity for encrypted procession blocks as well as position-value (P-V) information are extensively explored within image compression and encryption bit streams. Desirable BER, ARQ retry limit, transmission rate are jointly optimized across PHY, MAC and APP layers regarding the image distortion reduction bound and communication energy efficiency. Both image quality and security are assured while energy consumption is minimized. Simulations results have shown significant gain in image security assurance and transmission quality achievement with energy efficient communications in WSN.

References

[1]
T. Lookabaugh, D. C. Sicker,"Selective encryption for consumer applications," IEEE Commun. Mag., vol. 42, no. 5, pp. 124--129, May 2004.
[2]
W. Yu, Z. Sahinoglu, A. Vetro, "Energy efficient JPEG 2000 image transmission over wireless sensor networks," in Proc. GLOBECOM, pp. 2738--2743. 2004.
[3]
J. M. Shapiro, "Embedded image coding using zerotrees of wavelet coefficients," IEEE Trans. Signal Processing, vol. 41, no. 12, pp. 3445--3462, Dec. 1993.
[4]
A. Said, W. A. Pearlman, "A new, fast, and efficient image codec based on set partitioning in hierarchical trees," IEEE Trans. Circuits and Systems for Video Technology, vol. 6, no. 3, pp. 243--250, June 1996.
[5]
D. Taubman, "High performance scalable image compression with EBCOT," IEEE Trans. Image Process., vol. 9, no. 7, pp. 1158--1170, July 2000.
[6]
H. Cheng, X. Li, "Partial encryption of compressed images and videos," IEEE Trans. on Signal Process., vol. 48, no. 8, pp. 2439--2451, Aug. 2000.
[7]
T. van Dam and K. Langendoen. "An adaptive energy efficient MAC protocol for wireless sensor networks," In Proc. SenSys, Nov. 2003.
[8]
T. van Dam and K. Langendoen. "An adaptive energy efficient MAC protocol for wireless sensor networks," In Proc. SenSys, Nov. 2003.
[9]
C. Chiasserini, E. Magli, "Energy consumption and image quality in wireless video-surveillance networks," in Proc. 13th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Commun., vol. 5, pp. 2357--2361, Sept. 2002.
[10]
http://www.tinyos.net
[11]
W. Wang, D. Peng, H. Wang, H. Sharif, H. Chen, "Energy Efficient Multirate Interaction in Distributed Source Coding and Wireless Sensor Network," in Proc. IEEE WCNC, Mar 2007.
[12]
L. Qiong, M. van der Schaar, "Providing adaptive QoS to layered video over wireless local area networks through real-time retry limit adaptation," IEEE Trans. Multimedia, vol. 6, no. 2, pp. 278--290, April 2004.
[13]
M. van der Schaar, D. S. Turaga, "Cross-Layer Packetization and Retransmission Strategies for Delay-Sensitive Wireless Multimedia Transmission," IEEE Trans. Multimedia, vol. 9, no. 1, pp. 185--197, Jan. 2007.
[14]
Z. Wu, A. Bilgin, M. Marcellin, "Joint source/channel coding for multiple images," IEEE Trans. Commun., vol. 53, no. 10, pp. 1648--1654, Oct. 2005.
[15]
W. Wang, D. Peng, H. Wang, H. Sharif, "Image Component Transmissions in Wireless Sensor Network," in Proc. IEEE Sarnoff Symposium, May 2007.
[16]
M. van Der Schaar, Sai Shankar N, "Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms," IEEE Trans. Wirel. Commun., vol. 12, no. 4, pp. 50--58, Aug. 2005.
[17]
R. Hamzaoui, V. Stankovic, Z. Xiong, "Optimized error protection of scalable image bit streams," IEEE Signal Process. Mag., vol. 22, no. 6, pp. 91--107, Nov. 2005.
[18]
H. Wu, A. Abouzeid, "Error resilient image transport in wireless sensor networks," Int. J. Computer and Telecommunications Networking, vol. 50, no. 15, pp. 2873--2887, Oct. 2006.
[19]
Y. Andreopoulos, N. Mastronarde, M. Van Der Schaar, "Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks," IEEE J. Sel. Areas Commun., vol. 24, no. 11, pp. 2104--2115, Nov. 2006.
[20]
W. Zeng, S. Lei,"Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118--129, Mar. 2003.
[21]
M. Kankanhalli, T. Guan, "Compressed domain scrambler/descrambler for digital video," IEEE Trans. Consum. Electron., vol. 48, no. 2, pp. 356--365, May 2002.
[22]
C. Wu, C. Kuo, "Design of integrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828--839, Oct. 2005.
[23]
L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th Int. Conf. ACM Multimedia, pp. 219--229, Nov. 1996.
[24]
M. Grangetto, E. Magli, G. Olmo, "Multimedia Selective Encryption by Means of Randomized Arithmetic Coding," IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905--917, Oct. 2006.

Cited By

View all

Index Terms

  1. A cross layer resource allocation scheme for secure image delivery in wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
      August 2007
      716 pages
      ISBN:9781595936950
      DOI:10.1145/1280940
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 August 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cross layer optimization
      2. selective encryption
      3. unequal error protection
      4. wireless sensor network

      Qualifiers

      • Article

      Conference

      IWCMC07
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Energy-constrained quality optimization for secure image transmission in wireless sensor networksAdvances in Multimedia10.1155/2007/251872007:1(1-9)Online publication date: 13-Dec-2018
      • (2018)$$\hbox {S}^2$$S2DCCWireless Networks10.1007/s11276-016-1332-x24:1(309-328)Online publication date: 1-Jan-2018
      • (2014)Cross-Layer Contextual Interactions in Wireless NetworksIEEE Communications Surveys & Tutorials10.1109/SURV.2013.101813.0002316:2(1114-1134)Online publication date: Oct-2015
      • (2013)Fast encryption of JPEG 2000 images in wireless multimedia sensor networksProceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications10.1007/978-3-642-39701-1_17(196-205)Online publication date: 7-Aug-2013
      • (2009)Multimedia over Mobile WiMAXWiMAX Network Planning and Optimization10.1201/9781420066630.ch9Online publication date: 14-Dec-2009
      • (2009)Secure Wireless Multimedia Sensor NetworksProceedings of the 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies10.1109/UBICOMM.2009.27(194-201)Online publication date: 11-Oct-2009
      • (2008)An Energy-Efficient and High-Quality MAC Protocol for Image Transmission in Wireless Sensor Networks2008 4th IEEE International Conference on Circuits and Systems for Communications10.1109/ICCSC.2008.183(838-842)Online publication date: May-2008
      • (1989)Secure MQ coderImage Communication10.1016/j.image.2014.07.00729:9(1015-1027)Online publication date: 1-Jan-1989

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media