Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11

Authors

  • Noor Sattar Noor Engineering Technical College-Baghdad, Middle Technical University, Baghdad, Iraq
  • Dalal Abdulmohsin Hammood Engineering Technical College-Baghdad, Middle Technical University, Baghdad, Iraq
  • Ali Al-Naji School of Engineering, University of South Australia, Adelaide, Australia

DOI:

https://doi.org/10.51173/jt.v4i3.593

Keywords:

Text-to-Image Encryption (TTIE), TTIED-CMYK algorithm, Wireless Sensor Networks (WSNs), Raspberry Pi, DHT-11

Abstract

Recently, there has been a wide and continuous development in wireless sensor networks WSNs. These networks are directly employed in our daily lives, so it has become necessary to maintain the confidentiality of information in these networks. This paper provided a detailed explanation of the types of attackers according to their layer, in addition to the design of a wireless sensor network consisting of a temperature and humidity sensor called the DHT-11 and a Raspberry Pi to implement the Text-To-Image Encryption/Decryption algorithm based on CMYK mode (TTIED-CMYK) in these networks. An encrypted image with dimensions of 2×2 and a size not exceeding 70 bytes was obtained for a text consisting of eleven characters. In addition to that, the encryption time is very short, not exceeding 1 microsecond.

Downloads

Download data is not yet available.

References

A. Albakri, L. Harn, and S. Song, “Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN),” Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/3950129.

M. Hema Kumar, V. Mohanraj, Y. Suresh, J. Senthilkumar, and G. Nagalalli, “Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 5, pp. 5287–5295, 2021, doi: 10.1007/s12652-020-02007-w.

D. G. Padmavathi and M. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks,” vol. 4, no. 1, pp. 1–9, 2009, [Online]. Available: http://arxiv.org/abs/0909.0576.

M. Dener, “Security analysis in wireless sensor networks,” Int. J. Distrib. Sens. Networks, vol. 2014, 2014, doi: 10.1155/2014/303501.

A. Karakaya and S. Akleylek, “A survey on security threats and authentication approaches in wireless sensor networks,” 6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 - Proceeding, vol. 2018-January, pp. 1–4, 2018, doi: 10.1109/ISDFS.2018.8355381.

A. Rani and S. Kumar, “A survey of security in wireless sensor networks,” 3rd IEEE Int. Conf. , pp. 3–7, 2017, doi: 10.1109/CIACT.2017.7977334.

D. S. Ibrahim, A. F. Mahdi, and Q. M. Yas, “Challenges and Issues for Wireless Sensor Networks : A Survey,” J. Glob. Sci. Res., vol. 6, no. 1, pp. 1079–1097, 2021, [Online]. Available: https://www.researchgate.net/publication/349738262.

N. S. Noor, D. . Hammood, A. Al-Naji, and J. Chahl, “A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication,” Computers, vol. 11, no. 39, 2022, [Online]. Available: https://doi.org/10.3390/computers11030039.

Y. Cao, X. Zhao, W. Ye, Q. Han, and X. Pan, “A compact and low power RO PUF with high resilience to the EM side-channel attack and the SVM modelling attack of wireless sensor networks,” Sensors (Switzerland), vol. 18, no. 2, 2018, doi: 10.3390/s18020322.

T. Schneider, A. Moradi, and T. Güneysu, ParTI - Towards combined hardware countermeasures against side-channel and fault-injection attacks, vol. 9815. 2016.

P. Sinha, V. K. Jha, A. K. Rai, and B. Bhushan, "Security vulnerabilities, attacks, and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey," Proc. IEEE Int. Conf. Signal Process. Commun. ICSPC 2017, vol. 2018-January, no. July, pp. 288–293, 2018, doi: 10.1109/CSPC.2017.8305855.

R. den Hollander et al., “Adversarial patch camouflage against aerial detection,” no. September 2020, p. 11, 2020, doi: 10.1117/12.2575907.

L. Li et al., “A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems,” vol. XX, no. X, pp. 1–10.

L. Sujihelen, C. Jayakumar, and C. Senthilsingh, “SEC approach for detecting node replication attacks in static wireless sensor networks,” J. Electr. Eng. Technol., vol. 13, no. 6, pp. 2447–2455, 2018, doi: 10.5370/JEET.2018.13.6.2447.

R. Bhatt, P. Maheshwary, P. Shukla, P. Shukla, M. Shrivastava, and S. Changlani, “Jo urn,” Comput. Commun., 2019, doi: 10.1016/j.comcom.2019.09.007.

R. Gooding-townsend, S. T. E. N. Holder, and B. Ingalls, “Displacement of Bacterial Plasmids by Engineered Unilateral Incompatibility,” IEEE Life Sci. Lett., vol. 1, no. August, pp. 19–21, 2015, doi: 10.1109/LLS.2015.2465839.

O. Almomani, "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks," mdpi , Sensors, vol. 20, no. 2311, pp. 1–19, 2020, doi: 10.3390/s20082311.

D. Huang, W. Liu, and J. Bi, “Data tampering attacks diagnosis in dynamic wireless sensor networks,” Comput. Commun., vol. 172, no. March, pp. 84–92, 2021, doi: 10.1016/j.comcom.2021.03.007.

N. Alqudah and Q. Yaseen, “ScienceDirect ScienceDirect Machine Learning for Traffic Analysis : A Review Machine Learning for Traffic Analysis : A Review,” Procedia Comput. Sci., vol. 170, pp. 911–916, 2020, doi: 10.1016/j.procs.2020.03.111.

J. R. Ward, M. Younis, and J. R. Ward, “Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks,” Wirel. Networks, vol. 9, 2019, doi: 10.1007/s11276-019-02003-9.

A. Kumari, N. Shrivastava, and N. K. Raman, “A Prime Exploration of Collision Detection in WSN :,” vol. 4, no. 4, pp. 241–244, 2019, doi: 10.1038/ncomms852.

J. Kaushik and D. Academics, “Security Technique against Power Exhausting Attacks in WSN,” vol. 25, no. 6, pp. 4640–4667, 2021.

I. Journal, “A Critical Analysis on Network Layer Attacks in Wireless Sensor Network,” Int. Res. J. Eng. Technol., vol. 5, no. 2, pp. 2395–0072, 2018.

L. Alsulaiman, S. Al-ahmadi, and S. Arabia, "PERFORMANCE E VALUATION OF M ACHINE L EARNING TECHNIQUES FOR DOS DETECTION IN," vol. 13, no. 2, pp. 21–29, 2021, doi: 10.5121/ijnsa.2021.13202.

H. H. Syed, “WSNs Prone to Swap Attacking and Eavesdropping,” no. July 2019, 2022.

R. Varatharajan and A. P. Preethi, “Stealthy attack detection in multi-channel multi-radio wireless networks,” Springer Multimed Tools Appl 2backgr., vol. 7, no. 9, pp. 2001–2018, 2018.

K. S. Adu-Manu, N. Adam, C. Tapparello, H. Ayatollahi, and W. Heinzelman, “Energy-harvesting wireless sensor networks (EH-WSNs): A review,” ACM Trans. Sens. Networks, vol. 14, no. 2, 2018, doi: 10.1145/3183338.

L. Hn, S. Anand, and S. Sinha, “Flooding Attack in Wireless Sensor Network-Analysis and Prevention,” Int. J. Eng. Adv. Technol., vol. 8, no. 5, 2020.

J. S. Alshudukhi and Z. G. Al-mekhlafi, “Desynchronization Traveling Wave Pulse-Coupled-Oscillator Algorithm Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks,” 2020, doi: 10.1109/ACCESS.2020.3034577.

M. Nafis, U. Islam, A. Fahmin, and S. Hossain, “Denial ‑ of ‑ Service Attacks on Wireless Sensor Network and Defense Techniques,” Wirel. Pers. Commun., no. 0123456789, 2020, doi: 10.1007/s11277-020-07776-3.

A. Kardi and R. Zagrouba, “Attacks classification and security mechanisms in Wireless Sensor Networks,” Adv. Sci. Technol. Eng. Syst. J., vol. 4, no. 2415–6698, pp. 229–243, 2019, doi: 10.25046/aj040630.

Yi, L., Tong, X., Wang, Z., Zhang, M., Zhu, H., & Liu, J. “A novel block encryption algorithm based on chaotic S-box for wireless sensor network”. IEEE Access, vol.9, pp. 53079-53090, 2019.

Downloads

Published

2022-09-30

How to Cite

Noor Sattar Noor, Dalal Abdulmohsin Hammood, & Ali Al-Naji. (2022). Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11. Journal of Techniques, 4(3), 1–7. https://doi.org/10.51173/jt.v4i3.593

Issue

Section

Engineering

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.