407 202
Full Length Article
Journal of Intelligent Systems and Internet of Things
Volume 1 , Issue 2, PP: 80-92 , 2020 | Cite this article as | XML | Html |PDF


Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption Technique for Wireless Sensor Networks

Authors Names :   Disheng Zheng   1 *     Kai Liang   2  

1  Affiliation :  Ningbo Institute of Technology, Zhejiang University, China

    Email :  zds@nit.zju.edu.cn

2  Affiliation :  School of Control Engineering, Chengdu University of Information Technology, China

    Email :  lk1987@cuit.edu.cn

Doi   :   https://doi.org/10.54216/JISIoT.010203

Abstract :

Wireless sensor network (WSN) comprises a set of sensor nodes, mainly used for data collection and tracking process. The imaging sensors in WSN captures the images from the target environment, which needs to be securely transmitted to the base station (BS). Since data transmission in WSN takes place through wireless links, security is a major challenging issue involved in the design of WSN. Image encryption is a commonly available solution to securely transmit the images to destination without comprising security. Therefore, this study designs a novel Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption (CBO-OMKIE) technique for WSN. The goal of the CBO-OMKIE technique is to securely encrypt the images in WSN. The proposed CBO-OMKIE technique involves the design of multi-key based image encryption technique to accomplish security in WSN. In addition, the CBO algorithm is applied to determine the optimal keys involved in the encryption process and it helps for improving the security level to a maximum extent. The performance validation of the CBO-OMKIE technique takes place using benchmark test images and the outcomes were examined under several aspects. The simulation outcome pointed out the enhanced security analysis of the CBO-OMKIE technique over the other techniques.

Keywords :

Wireless sensor networks , Image encryption , optimal key generation , Multi-key approach , Butterfly optimization

References :

[1]      Shankar, K., Lakshmanaprabu, S.K., Gupta, D., Khanna, A. and de Albuquerque, V.H.C., 2020. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4), p.e5122.

[2]      Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X. A review of compressive sensing in information security field. IEEE Access. 2016;4:2507-2519.

[3]      Shankar K, Lakshmanaprabu SK. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol. 2018;7(1.9):22-27.

[4]      Thirumalai, C. and Kar, H., 2017, April. Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices. In 2017 Innovations in Power and Advanced Computing Technologies (i-PACT) (pp. 1-6). IEEE.

[5]      Jinasena, T.M.K.K., Meegama, R.G.N. and Marasinghe, R.B., 2018. A Novel Elliptic Curve Based Multi-Key Encryption Method for Multicasting Single Content with Access Control.

[6]      Yang P, Gui X, An J, Tian F. An efficient secret key homomorphic encryption used in image processing service. Secur Commun Netw. 2017;2017:1-12. 7695751.

[7]      Puech W. Image encryption and compression for medical image security. Paper presented at: 2008 First Workshops on Image Processing Theory, Tools and Applications; 2008; Sousse, Tunisia.

[8]      Khizrai MSQ, Bodkhe ST. Image encryption using different techniques for high-security transmission over a network. Int J Eng Res Gen Sci. 2014;2(4):299-306

[9]      Zheng P, Huang J. An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Proceedings of the 21st ACM international conference on Multimedia; 2013; Barcelona, Spain.

[10]   Khan, M.A., Ahmad, J., Javaid, Q. and Saqib, N.A., 2017. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), pp.531-540.

[11]   Elhoseny, M., Elminir, H., Riad, A. and Yuan, X., 2016. A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), pp.262-275.

[12]   Shankar, K. and Lakshmanaprabu, S.K., 2018. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), pp.22-27.

[13]   Istwal, Y. and Verma, S.K., 2017, September. Secured data transmission using improvised Arnold cat map in WSN. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall) (pp. 1-4). IEEE.

[14]   Gao, Y., Ao, H., Feng, Z., Zhou, W., Hu, S. and Tang, W., 2018. Mobile network security and privacy in WSN. Procedia Computer Science, 129, pp.324-330.

[15]   KLEF, V., 2018. An efficient light weight cryptography algorithm scheme for WSN devices using chaotic map and GE. International Journal of Pure and Applied Mathematics, 118(20), pp.861-875.

[16]   Mishra, S. and Dastidar, A., 2018, March. Hybrid image encryption and decryption using cryptography and watermarking technique for high security applications. In 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT) (pp. 1-5). IEEE.

[17]   Elhoseny, M., Farouk, A., Batle, J., Shehab, A. and Hassanien, A.E., 2017. Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of study on ML trends and innovations (pp. 1022-1040). IGI Global.

[18]   Vaseghi, B., Pourmina, M.A. and Mobayen, S., 2017. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dynamics, 89(3), pp.1689-1704.

[19]   Xiao, L., Bastani, O. and Yen, I.L., 2012. An Efficient Homomorphic Encryption Protocol for Multi-User Systems. IACR Cryptol. EPrint Arch., 2012, p.193.

[20]   Arora, S. and Singh, S., 2017. An improved butterfly optimization algorithm with chaos. Journal of Intelligent & Fuzzy Systems, 32(1), pp.1079-1088.

Cite this Article as :
Disheng Zheng , Kai Liang, Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption Technique for Wireless Sensor Networks, Journal of Intelligent Systems and Internet of Things, Vol. 1 , No. 2 , (2020) : 80-92 (Doi   :  https://doi.org/10.54216/JISIoT.010203)