Skip to main content

An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks

  • Chapter
  • First Online:
Secure Image Transmission in Wireless Sensor Network (WSN) Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 564))

Abstract

With rapid growth of multimedia applications, secure image transmission over Wireless Sensor Network (WSN) is a challenging task. So, image encryption techniques are used to meet the demand for real-time image security over wireless networks. In the proposed research, the security of Digital Images (DI) in wireless sensor network is enhanced using Light Weight Ciphers (LWC) which encrypts the input image through encryption process. To improve DI privacy and confidentiality, an innovative security model is proposed i.e. Lightweight SIMON block cipher. The proposed LWC encrypted the image along with optimal key selection and enhanced the image security level in the cloud. For key optimization, a meta-heuristic algorithm called Opposition-based Particle Swarm Optimization (OPSO) algorithm was presented. The proposed SIMON-OPSO achieved the minimum time in generating key value to decrypt the image. The simulation result demonstrated that the SIMON-OPSO algorithm improves the accuracy of DI security for all input images (Lena, Barbara, Baboon, and House) compared to existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Riad, A. M., El-Minir, H. K., & El-hoseny, M. (2013). Secure routing in wireless sensor networks: A state of the art. International Journal of Computer Applications, 67(7).

    Google Scholar 

  2. Sathesh Kumar, K., Shankar, K., Ilayaraja, M., & Rajesh, M. (2017). Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 9(18), 2888–2899.

    Google Scholar 

  3. Shankar, K. (2018). An optimal RSA encryption algorithm for secret images. International Journal of Pure and Applied Mathematics, 118(20), 2491–2500.

    Google Scholar 

  4. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In Neural computing and applications (pp. 1–15).

    Google Scholar 

  5. Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.

    Google Scholar 

  6. Elhoseny, M., & Hassanien A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp 115–143). Cham: Springer.

    Google Scholar 

  7. Elhoseny M., & Hassanien A. E. (2019). Extending homogeneous WSN lifetime in dynamic environments using the clustering model. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp. 73–92). Cham: Springer.

    Google Scholar 

  8. Somaraj, S., & Hussain, M. A. (2015). Performance and security analysis for image encryption using key image. Indian Journal of Science and Technology, 8(35).

    Google Scholar 

  9. Karthikeyan, K., Sunder, R., Shankar, K., Lakshmanaprabu, S. K., Vijayakumar, V., Elhoseny, M., et al. (2018). Energy consumption analysis of virtual machine migration in cloud using hybrid swarm optimization (ABC–BA). The Journal of Supercomputing, 1–17.

    Google Scholar 

  10. Ramya Princess Mary, Eswaran, P., & Shankar, K. (2018). Multi secret image sharing scheme based on DNA cryptography with XOR. International Journal of Pure and Applied Mathematics, 118(7), 393–398.

    Google Scholar 

  11. Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on Boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.

    Google Scholar 

  12. Zhang, X., Seo, S. H., & Wang, C. (2018). A lightweight encryption method for privacy protection in surveillance videos. Algorithm. Journal of Medical Systems, 42(11), 208.

    Article  Google Scholar 

  13. Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A. (2017). Sit: A lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688.

  14. Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.

    Article  Google Scholar 

  15. Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 1–13.

    Google Scholar 

  16. Praneeta, G., & Pradeep, B. (2014). Security analysis of digital stegno images using genetic algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277–283). Cham: Springer.

    Google Scholar 

  17. Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.

    Article  Google Scholar 

  18. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.

    Google Scholar 

  19. Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.

    Article  Google Scholar 

  20. Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks, 146, 151–158.

    Article  Google Scholar 

  21. Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE sensors letters, 1(4), 1–4.

    Article  Google Scholar 

  22. Bhoyar, P., Dhok, S. B., & Deshmukh, R. B. (2018). Hardware implementation of secure and lightweight Simeck32/64 cipher for IEEE 802.15.4 transceiver. AEU—International Journal of Electronics and Communications, 90, 147–154.

    Article  Google Scholar 

  23. Dos Santos Júnior, J. G., & do Monte Lima, J. P. S. (2018). Particle swarm optimization for 3D object tracking in RGB-D images. Computers & Graphics, 76.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shankar, K., Elhoseny, M. (2019). An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks. In: Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Lecture Notes in Electrical Engineering, vol 564. Springer, Cham. https://doi.org/10.1007/978-3-030-20816-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20816-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20815-8

  • Online ISBN: 978-3-030-20816-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics