Volume 18 , Issue 1 , PP: 35-48, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Israa Hussain Abd Alla 1 , Falath M.Mohammed 2 , Saif Al-din M. N 3 , Azmi Shawkat Abdulbaqi 4 *
Doi: https://doi.org/10.54216/FPA.180103
Throughout a Wireless Sensor Network (WSN), information collected from the environment is continuously transmitted from one node to the next, and then the main collector or server receives and processes it. With the growth of a network, data transfers within the network also grow dramatically. Medical images increase traffic on a network if they are transmitted. An interlayer transmission protocol (WSN) was developed for this study. Pixels are used to create the medical image using the protocol. A gray-level medical image with 512x512 pixels provided by Brain was used to conduct the study. Medical image size is reduced from 256 KB to 192 KB, providing a 25% advantage. A study found SSIM of 51, 1365 and PSNR of 0,9976 for the structural similarity ratio (SSIM). The Advanced Encryption Standard (AES) encryption algorithm safeguards data during the transfer. By creating such a layer, transmissions became safer. In the WSNs, 12.5% and 25% of the data transfer has been reduced based on the information obtained from the study without changing the medical image.
WSNs (Wireless Sensors Networks) , Medical Image Transmission , Structural Similarity Ratio (SSIM)
[1]. Zhao, G., Yang, X., Zhou, B., and Wei, W., "RSA-based digital image encryption algorithm in wireless sensor networks," in Proc. 2010 2nd Int. Conf. Signal Processing Systems, vol. 2, pp. V2-640–643, Jul. 2010.
[2]. Bisht, N., Thomas, J., and Thanikaiselvan, V., "Implementation of security algorithm for wireless sensor networks over multimedia images," in Proc. 2016 Int. Conf. Communication and Electronics Systems (ICCES), pp. 1–6, Oct. 2016.
[3]. Mahrous, A. M., Moustafa, Y. M., and El-Ela, M. A. A., "Physical characteristics and perceived security in urban parks: Investigation in the Egyptian context," Ain Shams Engineering Journal, vol. 9, no. 4, pp. 3055–3066, Dec. 2018.
[4]. Aminudin, N., Maseleno, A., Shankar, K., Hemalatha, S., Sathesh Kumar, K., Fauzi1, et al., "Nur algorithm on data encryption and decryption," Int. J. Engineering & Technology, vol. 7, no. 2.26, pp. 109–118, 2018.
[5]. Ilayaraja, M., Shankar, K., and Devika, G., "A modified symmetric key cryptography method for secure data transmission," Int. J. Pure and Applied Mathematics, vol. 116, no. 10, pp. 301–308, 2017.
[6]. Shankar, K., and Eswaran, P., "An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm," in Advances in Intelligent Systems and Computing, vol. 394, pp. 705–714, New York: Springer, 2016.
[7]. JayaLakshmi, G., Khalaf, H. A., Farhadi, A., Al Barzinji, S. M., Mahmood, S. D., Najim, S. A. D. M., et al., "Detection of COVID-19 from radiology modalities and identification of prognosis patterns," Int. J. Nonlinear Analysis and Applications, vol. 13, no. 1, pp. 1351–1365, 2022.
[8]. Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., and Muhammad, K., "The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems," J. Ambient Intelligence and Humanized Computing, pp. 1–16, 2017. DOI: 10.1007/s12652-017-0659-1.
[9]. Lee, S., Jeong, S., Chung, Y., Cho, H., and Pan, S. B., "Secure and energy-efficient image transmission for wireless sensor networks," in Proc. 2011 IEEE Ninth Int. Symp. Parallel and Distributed Processing with Applications Workshops, pp. 137–140, May 2011.
[10]. Rekha, R. N., and PrasadBabu, M. S., "On some security issues in pervasive computing- lightweight cryptography," Int. J. Computer Science and Engineering, vol. 4, no. 2, pp. 267, 2012.
[11]. Sathesh Kumar, K., Shanka, K., Ilayaraja, M., and Rajesh, M., "Sensitive data security in cloud computing aid of different encryption techniques," J. Advanced Research in Dynamical and Control Systems, vol. 9, pp. 2888–2899, 2018.
[12]. Gupta, D., Khanna, A., Shankar, K., Furtado, V., and Rodrigues, J. J., "Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET," Trans. Emerging Telecommunications Technologies, pp. 1–10, 2018. DOI: 10.1002/ett.3524.
40
DOI: https://doi.org/10.54216/FPA.180103
Received: June 18, 2024 Revised: September 17, 2024 Accepted: December 22, 2024
[13]. Bokhari, M. U., and Hassan, S., "A comparative study on lightweight cryptography," in Cyber Security: Proceedings of CSI 2015, pp. 69–79, Singapore: Springer, 2018.
[14]. Mary, I. R. P., Eswaran, P., and Shankar, K., "Multi secret image sharing scheme based on DNA cryptography with XOR," Int. J. Pure and Applied Mathematics, vol. 118, no. 7, pp. 393–398, 2018.
[15]. Manifavas, C., Hatzivasilis, G., Fysarakis, K., and Rantos, K., "Lightweight cryptography for embedded systems—A comparative analysis," in Data Privacy Management and Autonomous Spontaneous Security, pp. 333–349, Berlin, Heidelberg: Springer, 2013.
[16]. Sehrawat, D., and Gill, N. S., "Lightweight block ciphers for IoT based applications: A review," J. Applied Engineering Research, vol. 13, no. 5, pp. 2258–2270, 2018.
[17]. Elhoseny, M., Yuan, X., El-Minir, H. K., and Riad, A. M., "An energy efficient encryption method for secure dynamic WSN," Security and Communication Networks, vol. 9, no. 13, pp. 2024–2031, 2016.
[18]. Elhoseny, M., Elminir, H., Riad, A., and Yuan, X., "A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption," J. King Saud University—Computer and Information Sciences, vol. 28, no. 3, pp. 262–275, 2016.
[19]. Wang, X. Y., and Gu, S. X., "New chaotic encryption algorithm based on chaotic sequence and plain text," IET Information Security, vol. 8, no. 3, pp. 213–216, 2014.
[20]. Shankar, K., and Lakshmanaprabu, S. K., "Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm," Int. J. Engineering & Technology, vol. 7, no. 1.9, pp. 22–27, 2018.
[21]. Shehab, A., Elhoseny, M., Muhammad, K., Sangaiah, A. K., Yang, P., Huang, H., et al., "Secure and robust fragile watermarking scheme for medical images," IEEE Access, vol. 6, pp. 10269–10278, 2018. DOI: 10.1109/access.2018.2799240.
[22]. Ping, N. L., Ee, K. B., and Wei, G. C., "A study of digital watermarking on medical image," in World Congress on Medical Physics and Biomedical Engineering 2006, pp. 2264–2267, Berlin, Heidelberg: Springer, 2007.
[23]. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., and Arunkumar, N., "Hybrid optimization with cryptography encryption for medical image security in internet of things," in Neural Computing and Applications, pp. 1–15, 2018.
[24]. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., and Yuan, X., "Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique," J. Ambient Intelligence and Humanized Computing, pp. 1–13, 2018.
[25]. Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., and Manifavas, C., "A review of lightweight block ciphers," J. Cryptographic Engineering, vol. 8, no. 2, pp. 141–184, 2018.
[26]. Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., et al., "HIGHT: A new block cipher suitable for low-resource device," in Proc. Int. Workshop Cryptographic Hardware and Embedded Systems, pp. 46–59, Berlin, Heidelberg: Springer, Oct. 2006.
[27]. Bin Shibghatullah, A. S., "Mitigating developed persistent threats (APTs) through machine learning-based intrusion detection systems: A comprehensive analysis," SHIFRA, vol. 1, pp. 1–10, 2023. DOI: 10.70470/SHIFRA/2023/003.
[28]. Al Barazanchi, I. I., and Hashim, W., "Enhancing IoT device security through blockchain technology: A decentralized approach," SHIFRA, vol. 1, pp. 1–8, 2023. DOI: 10.70470/SHIFRA/2023/002.
[29]. Burhanuddin, M., "Assessing the vulnerability of quantum cryptography systems to emerging cyber threats," SHIFRA, vol. 1, pp. 1–8, 2023. DOI: 10.70470/SHIFRA/2023/004.
[30]. Aljohani, A., "Zero-trust architecture: Implementing and evaluating security measures in modern enterprise networks," SHIFRA, vol. 1, pp. 1–13, 2023. DOI: 10.70470/SHIFRA/2023/008.
[31]. Hashim, W., and Hussein, N. A.-H. K., "Securing cloud computing environments: An analysis of multi-tenancy vulnerabilities and countermeasures," SHIFRA, vol. 9, pp. 9–17, 2024. DOI: 10.70470/SHIFRA/2024/002.
[32]. Abdulbaqi, A. S., Salman, A. M., and Tambe, S. B., "Privacy-preserving data mining techniques in big data: Balancing security and usability," SHIFRA, vol. 1, pp. 1–10, 2023. DOI: 10.70470/SHIFRA/2023/001.
[33]. Sarsam, S. M., "Cybersecurity challenges in autonomous vehicles: Threats, vulnerabilities, and mitigation strategies," SHIFRA, vol. 1, pp. 1–9, 2023. DOI: 10.70470/SHIFRA/2023/005.
[34]. Gupta, S., Kumar, S., and Mishra, A., "Human-centric approach for cybersecurity: Understanding the impact of human behavior on security incidents and mitigation strategies," Computers & Security, vol. 104, pp. 102146, 2021. DOI: 10.1016/j.cose.2021.102146.
[35]. Tambe-Jagtap, S. N., "A survey of cryptographic algorithms in cybersecurity: From classical methods to quantum-resistant solutions," SHIFRA, vol. 1, pp. 1–10, 2023. DOI: 10.70470/SHIFRA/2023/006.