You are on page 1of 8

2016 IEEE TrustCom-BigDataSE-ISPA

TrustCom/BigDataSE/ISPA

Data Sharing in Secure Multimedia Wireless Sensor


Networks
Muhammad Usman, Mian Ahmad Jan, Xiangjian He*, Priyadarsi Nanda
School of Computing and Communications
Faculty of Engineering and Information Technology
University of Technology Sydney, Australia
*Corresponding author: Xiangjian.He@uts.edu.au

AbstractThe use of Multimedia Wireless Sensor Networks in these networks [3]. Such challenges in MWSNs demand
(MWSNs) is becoming common nowadays with a rapid growth proper network security, better scheduling mechanisms for the
in communication facilities. Similar to any other WSNs, these
transmission of video data streaming, and energy optimization.
networks face various challenges while providing security, trust
and privacy for user data. Provisioning of the aforementioned An ideal solution to fulll these demands is to design a reliable
services become an uphill task especially while dealing with real- and highly efcient Medium Access Control (MAC) protocol.
time streaming data. These networks operates with resource- In MWSNs, MAC layer can guarantee efcient resource
constrained sensor nodes for days, months and even years utilization with reliable data transmission, thus maximizing
depending on the nature of an application. The resource-
the network throughput and minimizing energy consumption.
constrained nature of these networks makes it difcult for the
nodes to tackle real-time data in mission-critical applications such MWSNs are deployed for mission-critical tasks for an
as military surveillance, forest re monitoring, health-care and unspecied duration of time. Therefore, security considera-
industrial automation. For a secured MWSN, the transmission tions need to be in place at the time of network design.
and processing of streaming data needs to be explored deeply. The resource-constrained nature of these networks coupled
The conventional data authentication schemes are not suitable
with their unique characteristics, such as dynamic topology,
for MWSNs due to the limitations imposed on sensor nodes
in terms of battery power, computation, available bandwidth in-network processing, error-prone communication links and
and storage. In this paper, we propose a novel quality-driven scalability, makes the security provisioning challenging and
clustering-based technique for authenticating streaming data in complicated. In addition, these networks are left unattended
MWSNs. Nodes with maximum energy are selected as Cluster without human intervention and base station supervision.
Heads (CHs). The CHs collect data from member nodes and
Instead, sensor-collected data is harvested intermittently by
forward it to the Base Station (BS), thus preventing member
nodes with low energy from dying soon and increasing life span a base station. Since data packets are retained on individual
of the underlying network. The proposed approach not only sensors, securing these packets is both important and challeng-
authenticates the streaming data but also maintains the quality ing. Sensor nodes operating in unattended environments face
of transmitted data. The proposed data authentication scheme a higher risk of security breaches. If any one of these nodes is
coupled with an Error Concealment technique provides an
compromised, its sensitive data and security parameters will be
energy-efcient and distortion-free real-time data streaming. The
proposed scheme is compared with an unsupervised resources retrieved by an adversary to participate in malicious activities.
scenario. The simulation results demonstrate better network These networks face a diverse range of security challenges
lifetime along with 21.34 dB gain in Peak Signal-to-Noise Ratio at various layers, and they are vulnerable to a wide range
(PSNR) of received video data streams. of attacks such as Sybil, homing, wormhole, sinkhole, se-
Index TermsMultimedia WSNs, Surveillance, Fire Monitor- lective forwarding, resource-exhaustion and Denial-of-Service
ing, Health-Care, Automation, Streaming, Authentication, Clus- (DoS) [4]. As a result, security and protection of sensors
tering, Error Concealment, PSNR. against malicious behaviours is extremely important. However,
the resource-starving nodes cannot withstand the resource-
I. I NTRODUCTION demanding nature of real-time multimedia trafc towards pro-
Adaptive and secured video data streaming is grabbing re- visioning of highly-robust, stronger and sophisticated security
searchers attention in the eld of Multimedia Wireless Sensor services in MWSNs. Therefore, designing an effective, energy-
Networks (MWSNs). Such type of networks are deployed in efcient and secured solution for any MWSN is a challenging
many applications such as multimedia surveillance, storage of issue.
potentially relevant activities, trafc avoidance, enforcement Traditional error resilience schemes provide better data pro-
and control systems, advanced health care, environmental tection against data alteration during transmission. However,
monitoring, industrial process control and many more [1]. these techniques are not suitable for sensor nodes because they
These networks, similar to any other WSNs, have limited require high computational power from the underlying pro-
resources such as energy, computational power, transmission cessing devices which ultimately lead to energy consumption
range, available bandwidth, data rate and storage [2]. These [5], [6]. Schemes like watermarking are robust against net-
limitations render the support for resource-intensive opera- work impairments. However, they incur excessive processing
tions which ultimately affect the Quality of Service (QoS) overhead, so they are not suitable for network devices having

2324-9013/16 $31.00 2016 IEEE 590


DOI 10.1109/TrustCom.2016.113
10.1109/TrustCom/BigDataSE/ISPA.2016.113
out excessive energy consumption.
2) In MWSNs, packets drop frequently at various intervals.
For this purpose, a simple EC method is presented in
the second phase as a backup technique to maintain
the quality of received videos. Our approach provides a
proper analysis of proposed authentication scheme along
with the packet drops and perceived video quality.
The rest of the paper is organized as follows. The related
work is provided in Section II. The proposed scheme is briey
described in Section III. In Section IV, the experimental set-up,
comparison and evaluation are presented. Finally, the paper is
concluded in Section V.

II. R ELATED W ORK


In this section, rst we discuss the related work on security
issues faced by MWSNs, followed by data authentication and
Fig. 1. Clustering-based multimedia wireless sensor network
error concealment in these networks.
In [26], the authors presented a survey which summarized
limited battery power [7]. The cryptography-based techniques the challenges incurred by any MWSN while securing it. These
are used to protect sensitive data by embedding them in challenges and security issues need to be taken into account
other data. They are light-weighted, but they cannot resist while designing efcient and robust authentication protocols
against network impairments [8][11]. The stenography-based for these networks. Three types of attacks, i.e., snoozing, sleep
techniques are also used to embed the secret data into other deprivation and network substituition in WSNs, were reported
data at bit level. However, these techniques are also unable to in [27]. The unattended nature of deployed region, privacy
resist against network impairments and are ineffective while assurance of the data and multimedia in-network processing
dealing with larger quantity of data [12]. are some of the main challenges faced by these networks at
A wide range of techniques are available to authenticate the design stage of secured authentication protocols. Fake data
the video data streams in error-prone wireless networks. Un- injection is a commonly found type of attacks in MWSNs,
like watermarking, cryptography and stenography-based tech- which was reported in [28]. Detecting this type of attacks
niques, which are considered as pre-processing schemes, the helps minimize the malicious intrusions. In [29], the authors
data authentication schemes are post-processing techniques. conducted a research on secure data collection in an unse-
These techniques make use of simple but specic signatures cured WMSN. Secure data collection for sensitive networks is
or hash functions to classify an incoming data packet as important and poses crucial challenges.
authorized or unauthorized [13][18]. The video data packets Resources allocation was combined with stream authen-
can be given higher priority in MWSNs, as video processing tication to improve the video quality along with integrity
requires high computational power and computing resources protection [30]. Although this scheme works well, it involves
and is less tolerant to bit errors [19][23]. crypto-hash functions, which are not strong enough to tackle
In this paper, we propose a centralized cluster-based hi- network impairments. To maintain end-to-end video quality
erarchical data authentication approach for real-time video in wireless channels, a joint channel authentication and rate
streaming over MWSNs. Multimedia sensor nodes are grouped allocation scheme was proposed in [31]. This scheme only
into geographical clusters, and designated nodes, also named considers the authentication and rate allocation issues using
cluster heads (CHs) [24], are assigned the task to collect data an unequal error protection. However, the proposed scheme
from their neighbouringhood as shown in Figure 1. demands nodes with constant energy source. In [32], wa-
Cluster-based hierarchical protocols are iterative in nature termarking was used to authenticate real-time digital video
and operate in rounds [25]. In each round, a new set of cluster streaming. This technique is suitable for both H.264/AVC and
heads are elected to perform resource-intensive operations H.265/HEVC video standards, however, it produces quality
such as data aggregation, data fusion and data transmission degradation in received videos. Joint ngerprinting, decryption
to a centralized base station. Our proposed approach secures and authentication were used together to protect the video
MWSNs and maintains the received video quality by combin- streams transmitted in a multi-casting wireless environment
ing a lightweight data authentication with an Error Conceal- [33]. A robust watermarking framework was proposed to
ment (EC) technique, respectively. The major contributions of authenticate the HEVC encoded video streams in unsecured
our proposed scheme are as follow. wireless networks [34]. Data encryption was applied on H.264
1) Our proposed scheme operates in two phases. First phase encoded videos using codeword substitution to protect and
deals with cluster formation and data authentication authenticate the sensitive data from network intruders [35].
using hashing. With the help of a hierarchical cluster- The techniques presented in [33][35] work well without
based architecure and a lightweight data authentication disturbing the coding structure of encoded video stream.
scheme, smooth video streaming can be achieved with- However, they demand heavy computations which make them
infeasible for WSNs.

591
Likewise security in MWSNs, the EC is also a new research their nearby CHs. The CHs then collect the data from the
eld in MWSNs. So far researchers have focused on proper multimedia sensor nodes within their clusters and forward it
scheduling for video transmission in MWSNs. However, such to the BS.
schedulings cannot eliminate burst losses in unreliable wireless 1) Node Authentication: Initially, each multimedia wireless
channels [36]. The error concealment techniques are very sensor node i broadcasts a control packet to the Base Station
popular in multimedia streaming to estimate the lost and/or (BS). This packet contains nodes identity (IDi ), location (Li )
missing information. However, they do not provide a robust and residual energy (Ei ). A threshold n is set for the maximum
and defensive solution for network impairments [37]. Lost number of multimedia sensor nodes at any location, where
frames of multiview videos, transmitted over MWSNs were n N . The purpose of setting the threshold is to reduce
concealed using motion vector extrapolation [38]. Although network congestion, caused by video data trafc, coming from
it produces a better objective quality, it is suitable only for different multimedia nodes. After receiving control packets
multiview videos. The impact of network impairment on Qual- from n multimedia wireless sensor nodes, coming from a
ity of Experience in video streaming over wireless network specic location, the BS performs a comparison among Ei
was analyzed in [39]. This study reports a deep subjective of all the nodes. The nodes with highest Ei are elected as
evaluation and uses frame copy algorithm to perform EC. An Cluster Heads (CHs). Soon after performing the election, the
efcient and fast EC technique was proposed in [40] to support BS replies them back with update packets. Those update
real-time video streaming over heterogeneous transmission packets contain an acknowledgement for their authentication,
networks. The technique produces better objective quality with a notication for CH selection along with locations and
less computational time. identities of their neighbouring multimedia sensor nodes. The
BS elects 5% of multimedia wireless sensor nodes as CHs in
III. Q UALITY-D RIVEN DATA AUTHENTICATION AND an entire sensor eld in each round. Along with the update
C OMMUNICATION packets, the BS also sends broadcast packets. The broadcast
In an encoded video bitstream, there are always N en- packets contain the identities of elected CHs in that particular
coded frames. Therefore, it becomes impractical to design and round. After receiving the update and broadcast packets, each
evaluate a data authentication scheme for a complete video authenticated and elected multimedia wireless sensor node
bitstream in an energy-constrained MWSN. Furthermore, the replies back with an acknowledgement packet to the BS.
designing of an authentication scheme heavily depends on 2) Cluster Formation: Each CH advertises itself to its
the encoding mode of a video codec. The authentication nearest neighbouring sensor nodes which evaluate the re-
provisioning becomes more difcult and resource consuming ceived signal strength from multiple CHs. A neighbouring
if the videos are encoded in intra mode. Current video stan- node associates itself with a CH having the strongest signal
dard, i.e. H.265/HEVC, is used to generate encoded video strength to form a cluster as shown in Figure 1. The selection
bitstreams [41]. Therefore, videos are encoded in inter and of CH and formation of cluster is known as set-up phase.
unsliced modes using H.265 in our experiments. As in inter The completion of set-up phase is followed by initiation
encoding mode, the successor video frames are dependent on of steady-state phase during which each CH allocates Time
former video frames, therefore, it becomes easy to perform Division Multiple Access (TDMA) slots within its cluster
authentication between video frames using a crypto-hashing for sharing the transmission medium. This concept of slot
function. The crypto-hashing is suitable for inter encoding, as allocation enables sensing nodes to remain inactive for most
the crypto-hash tag of current video packet is linked with the of their lifetime and at the same time avoids contention for
most recent previously processed video packet, which does not transmission over a wireless link. Each CH collects data within
increase the processing load over the resource-starving sensor its cluster in a particular round and transmits it directly to BS.
nodes [42]. The packet drop effects in received videos are 3) Cluster Head Communication: After successful authen-
covered by default error concealment technique of H.265. tication, each CH aggregates data from its member nodes
In our proposed scheme, rst we perform authentication within its cluster and transmits to the BS. During this step,
of multimedia wireless sensor nodes followed by a cluster- each CH performs data fusion to eliminate redundant packets
based data transmission to a centralized base station via cluster of overlapping regions of nearest neighbours. As a result,
heads. The authentication ensures that only legitimate nodes highly accurate and precise data is delivered to the BS. More-
can participate in data transmission to the base station. After over, elimination of redundant data packets reduces the energy
authenticating the sensor nodes, the next step is to secure consumption of deployed multimedia sensor nodes which
the transmitted video data over wireless channels through in turn reduces network congestion, in-network processing,
data authentication. The proposed scheme is summarized in latency and packets drop. Although, the nodes capture data
Algorithm 1. based on threshold values, however, it is highly probable that
more than one nodes in the same geographical region may
capture the same video. As a result, the captured data has a
A. Authentication high level of redundancy and it is the job of CH to eliminate
During authentication, the identities of multimedia sensor such redundancy. After all, the BS in any sensor network is
nodes are validated and a secured methodology is adopted interested only in brief description of events happening rather
for an optimal selection of cluster heads. After an optimal than a huge volume of redundant data.
selection, the multimedia sensor nodes form clusters with

592
B. Video Communication Algorithm 1: Data Authentication and Communication
1) Video Encoding: The rst step in video streaming is Algorithm
video encoding, formally known as video compression. In our Input: CV - Captured Video
proposed scheme, we use HEVC standard to achieve that task. Output: OV - Output Video
In general, there are two encoding modes, i.e. intra and inter. /*Send coordinates and orientation to Base Station (BS)*/
In intra mode, each video frame is treated independently and for i = 1 to N do
the focus is on quality rather than compression. In contrary, control(Ei ,Li ,IDi );
the inter mode involves video frames dependency and the end
focus is on compression rather than quality. Each mode can /*Wait for authentication and CH selection*/
further be extended to sliced and unsliced versions. In sliced for i = 1 to n do
version, each video frame is further subdivided into smaller compare(Ei ,IDi );
data chunks and as a result, a sequence of data packets update(IDi );
traveling on transmission network, will contain only one video broadcast(IDi );
frame. On the other side, in unsliced mode, one data packet ack(IDi );
contains a whole video frame. end
In our proposed scheme, the multimedia wireless sensor /*Cluster formation*/
nodes, e.g. cameras, will be monitoring the objects. If an event for i = 1 to m do
is located, the cameras will start recording, i.e. Captured Video advertise(Ei ,IDi ,Li );
(CV). The CVs are encoded in inter but unsliced mode from a for j = 1 to n do
[IDi ,Li ] = receive();
pool of encoding options. We choose these parameters based
steady state(IDi ,Li );
on the following reasons.
ack(IDi ,Li );
The inter mode provides us an opportunity to utilize the end
dependency between frames to maintain an authentica- end
tion strategy. In this mode, any unrelated/modied video /*Encoding and transmission*/
frame can easily get diagnosed with the help of crypto- for i n do
hash function. In inter mode, each current video frame is wait for event();
dependent on its ancestor video frame for motion estima- if event == CV then
tion and compression purposes. Similarly, the crypto-hash bitstream = encode(CV,inter,unsliced);
tag of current video frame is dependent on its ancestor DPs = NL(bitstream);
video frame. Therefore, if one dependency fails, the other transmit(DPs ) to CH;
type works as a backup for authentication of video data end
packet. end
If any video frame gets lost/corrupted during transmis- /*Data authentication, concealing and transmission*/
sion, it can easily be noticed and estimated back with the for DPs CH do
help of a suitable error concealment technique. if crypto-hashing is True then
transmit(DPs ) to BS;
After encoding, a bitstream will be generated. The next
else
step is to convert the bitstream into Data Packets (DPs ) for discard(DPs );
transmission purpose. The DPs are generated by Network conceal(DPs );
Layer (NL) of HEVC test model, which are then transmitted transmit(DPs ) to BS;
to the CH. end
2) Data Authentication: It is impractical to build an authen- end
tication graph for all the video packets in video bitstream, as a /*Transmission of DPs to server*/
video may contain thousands of frames and it demands heavy for DPs BS do
processing which is not permissible with resource-constrained transmit(DPs ) to server;
MWSNs. In our proposed approach, the data authentication end
process does not put heavy computational load on sensor nodes /*Decoding and storing*/
to verify the incoming DP . for DPs server do
In order to maximize the probability of authentication, the bitstream = transform(DPs );
crypto-hash tag of each DP is connected with its former DP . end
In that way, a chain will be created where each former DP OV = decode(bitstream);
will be veried by its ancestor DP . Therefore, each current Store OV;
DP is formally veried by a series of DPs . Each DP contains
two crypto-hash tags except the rst and last DP in a series
of video frames. In our proposed approach, two crypto-hash
links are selected for an entire Group Of Pictures (GOP)
in an encoded video bitstream, where rst link denotes the
crypto-hash tag of even numbered video packets in a GOP

593
while the second link denotes the crypto-hash tag of odd odd numbered link must be given a higher priority, as the
numbered video packets in a GOP. This distribution reduces forthcoming DPs authentication is linked with them. Let i
the computational load for authenticating a particular DP . In denote the crypto-hash tag of an even numbered video packet
general, if the transmission Channels Error Rate is denoted by in a GOP, i.e. {0, 2, 4, ...}, while j denote the crypto-hash tag
(CER), payload of video DP by PL(n1) , payload of crypto of an odd numbered video packet in a GOP, i.e. {1, 3, 5, ...}.
signature by PC and payload of hash function by PH , then The crypto-hash tags are connected in reverse order, e.g. both
the probability to verify a DP can be calculated as: in even and odd frames sets, the crypto-hash tag of frame K
will be connected with frame K1 . The crypto-hash assignment
puts extra processing load in terms of processing extra data,
P = (1 CER)(PL(n1) +PC +PH ) (1 CER)(PL(n) +PH )
i.e. crypto-hash tags, on the processing node. Except the rst
(1)
and last video packets in a GOP, remaining video packets will
where n represents the video packet or frame number.
be dealing with dual tags, i.e. one tag from previous frame and
In a video stream, the frames always occur sequentially.
the second one from the upcoming frame. If the total energy,
If frame K 1 is already veried, then we may assume
consumed by an entire GOP is represented by ET , then it can
that the verication for frame K, which is linked with frame
be computed by following equation:
K 2 can be skipped in our proposed approach. Based on
that assumption, the proposed authentication scheme becomes ET = E0 + E1
light-weighted, less expensive in term of computation and k2

can easily be applied on any energy-constrained multimedia + Ei + Ei2
wireless sensor node. However, in some applications, such i=2
as military surveillance and health-care monitoring, every k3
(2)

incoming video packet needs to be veried. + Ej + Ej2
3) Error Concealment Technique: The Error Concealment j=3
(EC) techniques play an important role to maintain an accept- +EK2 + EK1
able video quality as receivers side, especially if the videos
are streaming through lossy networks. The issue of packet IV. E XPERIMENTAL S ETUP
drops is always there in MWSNs, which makes the presence In this section, we summarize the experimental setup and
of an EC technique as a feasible option. The choice of an simulation results and performance comparisons. We use a
EC technique is very important in MWSNs. Usually, the main High Denition (HD) test video le, named Rush hour,
part in any EC technique of inter domain is the estimation of in YUV format, in our experiments. The YUV is an un-
Motion Vectors (MVs) of missing video frames. The MVs are compressed format and is recommended by video codecs.
estimated by a Motion Estimation (ME) procedure, which is The video is encoded through HM 16.9 [43] test model of
by far, the most complex and resource-consuming process in H.265/HEVC standard. We encode the test video in inter and
any video standard/codec. Since, the sensor nodes have limited unsliced mode. For data authentication, we use Secure Hash
energy, therefore, we cannot apply such EC techniques directly Algorithm-2 (SHA-2). This algorithm computes and compare
to MWSNs. the hash value of current data packet with an expected hash
The default EC method in any video codec is Frame Copy value, i.e. of previous data packet (in our case) to ensure data
(FC), which we use in our proposed scheme to ght against integrity and validity. Our network consists of N multimedia
packet drops issue. If frame K gets lost during transmission, wireless sensor nodes in a sample area of 100 100 square
this method simply copies frame K 1 to ll up the gap meter. To set up the parameters for network communication,
of missing frame K. This EC technique does not require any we follow the the specication sheet of LOTUS mote [44]. The
extra processing, which means energy is not consumed on part Cluster-based Hierarchical Routing (CHR) protocol is used for
of each node. As a result, it is suitable for our proposed scheme dual purpose, i.e. for transmission and cluster head selection.
and can be applied to any real-time video transmission. This protocol determines which node should be selected, not
4) Video Decoding: After performing the data authentica- only as a cluster head but to process and authenticate the
tion and/or EC at CH, the next step is to broadcast the DPs video packet. The last phase is the reconstruction of test
to the BS, which forwards them to the server. As soon as video le. During that phase, rstly, the video data packets
the DPs arrive at the server, it performs three operations, i.e. are transformed into a video bitstream. Secondly, the video
transform DPs to bitstream, decoding of bitsream to generate bitstream is decoded by same HM 16.9 test model to produce
Output Video (OV), and store the OV in internal storage. video le in YUV format. Thirdly, the reconstructed video le
is compared with the original source le to compute the PSNR
C. Energy Evaluation to evaluate the received video quality.
After getting a synchronization between video stream en- In this section, we analyze our proposed scheme for differ-
coding, authentication and decoding, the video packet authen- ent network performance metrics.
tication is achieved through crypto-hash links. In our approach,
the size of the GOP can be set manually, but it can be set A. Resilience to Attacks
even by default. Furthermore, in order to make the evaluation Our proposed authentication scheme can efciently de-
procedure simple, the starting video packets in either even or tect various attacks. The security properties of our proposed

594
scheme in comparison to related schemes are shown in Table authentication scheme, the packet loss rate reaches up to 30%
I. in some rounds. Our proposed scheme only protects MWSN
TABLE I. Comparison of Security Properties
from external and internal attacks. The drop in packet is due
to the operation of nodes in a hostile environment using error-
Attacks LEACH LEACH-C Tsais scheme Our Scheme prone communication links. The drop in packets is contributed
Replay Insecure Insecure Insecure Secured much toward these error-prone links. In Fig. 3, the nodes drop
Sybil Insecure Insecure Insecure Secured
DoS Attack No No Yes Yes
Replication No No No Yes

As shown in the table, our proposed scheme is highly


efcient to detect various attacks such as replay, Sybil, Denial-
of-Service (DoS) and node replication. LEACH and LEACH-C
only provides cluster-based hierarchy for data transmission to
a centralized base station. These schemes do not provide any
protection against attacks and as such are vulnerable to all the
aforementioned attacks. Tsais scheme, on the other hand, is
capable to detect only DoS attack, however, it is not capable
to detect replay, DoS and node replication attacks.

B. Energy Consumption
The amount of energy consumed by MWSNs in presence
and absence of authentication is shown in Fig. 2. As the gure Fig. 3. Packet Loss Rate
shows, our proposed scheme has little impact on the energy packets up to certain rounds, i.e., 1.2 104 rounds. After that,
consumption of multimedia sensor nodes. These nodes con- the packet loss rate is very marginal.
sume lesser amount of energy in absence of authentication, i.e.,
our proposed scheme. However, in absence of authentication,
D. Network Throughput
the nodes are vulnerable to a wide range of attacks such as
replay, DoS, eavesdropping, Sybil and replication. The network throughput is dened as the number of packets
successfully delivered to a base station. Each cluster head
aggregates, fusion and transmits the data of member nodes to
a centralized base station. The network throughput is shown in
Fig. 4. As shown in the gure, the network throughput is much

Fig. 2. Energy Consumption in Authentication

C. Packet Loss Rate


Similar to any sensor network, MWSNs are frequently Fig. 4. Network Throughput
deployed in remote and hostile environments. These environ-
ments coupled with little or no human intervention exposes higher up to 1.45 104 rounds. After these number of rounds,
the nodes to various threats. As a result, the nodes drop a the nodes have either little or no energy. As a result, the
signicant amount of packets. The error-prone communication network throughput also decreases. The quality of the received
links further aid to packet loss. videos after decoding can be estimated through some objective
In Fig. 3, the percentage of packets lost in presence of metric, e.g. Peak Signal-to-Noise Ratio (PSNR). As shown in
our proposed scheme is shown. Despite the presence of an Fig. 3, the packets loss ratio is very high. In such situations,

595
the Error Concealment (EC) techniques play an important role. [9] K.-A. Shim and C.-M. Park, A secure data aggregation scheme based
on appropriate cryptographic primitives in heterogeneous wireless sensor
As we have adopted frame copy as an EC technique in our networks, Parallel and Distributed Systems, IEEE Transactions on,
proposed approach, we cannot expect a higher average PSNR. vol. 26, no. 8, pp. 21282139, 2015.
In our experiments, 21.34 dB PSNR is recorded on average, [10] J. Choi, J. Bang, L. Kim, M. Ahn, and T. Kwon, Location-based key
management strong against insider threats in wireless sensor networks.
though it can be improved by applying more sophisticated EC [11] L. Harn and C.-F. Hsu, Predistribution scheme for establishing group
techniques. keys in wireless sensor networks, Sensors Journal, IEEE, vol. 15, no. 9,
pp. 51035108, 2015.
[12] A. Merlo, M. Migliardi, and L. Caviglione, A survey on energy-aware
V. C ONCLUSION security mechanisms, Pervasive and Mobile Computing, vol. 24, pp.
Multimedia Wireless Sensor Networks (MWSNs) has 7790, 2015.
[13] C. Zhu, H. Nicanfar, V. Leung, and L. T. Yang, An authenticated
gained popularity among the research community in recent trust and reputation calculation and management system for cloud and
years. These networks have the potential to provide various sensor networks integration, Information Forensics and Security, IEEE
types of multimedia data to an end-user and/or a base station. Transactions on, vol. 10, no. 1, pp. 118131, 2015.
[14] S.-I. Chu, Y.-J. Huang, and W.-C. Lin, Authentication protocol design
These networks have found their applications in various do- and low-cost key encryption function implementation for wireless sensor
mains such as military surveillance, healthcare monitoring of networks.
industrial products, intrusion detection, bridge suspension and [15] K. Cho, B.-G. Lee, and D. H. Lee, Low-priced and energy-efcient
detection of replicas for wireless sensor networks, Dependable and
agricultural monitoring. Despite their potential for monitoring Secure Computing, IEEE Transactions on, vol. 11, no. 5, pp. 454466,
a wide range of applications, these networks are resource- 2014.
constrained due to the presence of resource-starving sensor [16] C. Benzaid, K. Lounis, A. Al-Nemrat, N. Badache, and M. Alazab,
Fast authentication in wireless sensor networks, Future Generation
nodes at the core of their architecture. Similar to any sensor Computer Systems, vol. 55, pp. 362375, 2016.
nodes, a multimedia sensor node also operates in remote and [17] K. Grover and A. Lim, A survey of broadcast authentication schemes
hostile environments and as such, it is vulnerable to a wide for wireless networks, Ad Hoc Networks, vol. 24, pp. 288316, 2015.
[18] A. Al-Riyami, N. Zhang, and J. Keane, Impact of hash value truncation
range of malicious attacks. The presence of resource-starving on id anonymity in wireless sensor networks, Ad Hoc Networks, 2016.
nodes requires lightweight but energy-efcient and secured [19] N.-E. Rikli and M. Alabdulkarim, Cross-layer-based adaptive video
authentication schemes. In this paper, we aim to provide transport over low bit-rate multihop wsns, Electrical and Computer
Engineering, Canadian Journal of, vol. 37, no. 4, pp. 182191, 2014.
a lightweight but highly secured authentication scheme for [20] L. Cheng, J. Niu, M. Di Francesco, S. K. Das, C. Luo, and Y. Gu,
resource-constrained MWSNs. Our proposed scheme elects an Seamless streaming data delivery in cluster-based wireless sensor
optimal percentage of cluster heads by using the resources networks with mobile elements.
[21] S.-H. Ou, C.-H. Lee, V. S. Somayazulu, Y.-K. Chen, and S.-Y. Chien,
of a centralized base station. Inherently, the base station is On-line multi-view video summarization for wireless video sensor
a resource-rich entity and has the ability to elect an optimal network, Selected Topics in Signal Processing, IEEE Journal of, vol. 9,
percentage of CHs. The interaction between the base station no. 1, pp. 165179, 2015.
[22] J. H. Ko, B. A. Mudassar, and S. Mukhopadhyay, An energy-efcient
and each elected cluster head is authenticated prior to cluster wireless video sensor node for moving object surveillance, Multi-Scale
formation. The clusters are formed through setup and steady- Computing Systems, IEEE Transactions on, vol. 1, no. 1, pp. 718, 2015.
state processes between cluster heads and their neighbouring [23] A. Kudeshia and A. K. Jagannatham, Optimal viterbi based total
variation sequence detection (tvsd) for robust image/video decoding in
multimedia sensor nodes. Our proposed scheme not only wireless sensor networks, Signal Processing Letters, IEEE, vol. 21,
ensures that the data is coming from legitimate nodes but also no. 6, pp. 722726, 2014.
transmits highly-critical and delay-sensitive authenticated data [24] M. A. Jan, P. Nanda, and X. He, Energy evaluation model for
an improved centralized clustering hierarchical algorithm in wsn. in
to the base station. WWIC. Springer, 2013, pp. 154167.
[25] M. A. Jan, P. Nanda, X. He, and R. P. Liu, Enhancing lifetime and
quality of data in cluster-based hierarchical routing protocol for wireless
R EFERENCES sensor network, in High Performance Computing and Communications
[1] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, A survey on wireless & 2013 IEEE International Conference on Embedded and Ubiquitous
multimedia sensor networks, Computer networks, vol. 51, no. 4, pp. Computing (HPCC EUC), 2013 IEEE 10th International Conference
921960, 2007. on. IEEE, 2013, pp. 14001407.
[2] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, Wireless sensor [26] M. Guerrero-Zapata, R. Zilan, J. M. Barcelo-Ordinas, K. Bicakci,
networks: a survey on recent developments and potential synergies, The and B. Tavli, The future of security in wireless multimedia sensor
Journal of supercomputing, vol. 68, no. 1, pp. 148, 2014. networks, Telecommunication Systems, vol. 45, no. 1, pp. 7791, 2010.
[3] M. A. Jan, P. Nanda, X. He, and R. P. Liu, Pasccc: Priority-based [27] A. Gabrielli, L. V. Mancini, S. Setia, and S. Jajodia, Securing topology
application-specic congestion control clustering protocol, Computer maintenance protocols for sensor networks, Dependable and Secure
Networks, vol. 74, pp. 92102, 2014. Computing, IEEE Transactions on, vol. 8, no. 3, pp. 450465, 2011.
[4] M. A. Jan, Energy-efcient routing and secure communication in [28] F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, Hierarchical trust man-
wireless sensor networks, Ph.D. dissertation, 2016. agement for wireless sensor networks and its applications to trust-based
[5] S. Das, D. M. Bull, and P. N. Whatmough, Error-resilient design tech- routing and intrusion detection, Network and Service Management,
niques for reliable and dependable computing, Device and Materials IEEE Transactions on, vol. 9, no. 2, pp. 169183, 2012.
Reliability, IEEE Transactions on, vol. 15, no. 1, pp. 2434, 2015. [29] K. Lin, X. Ge, X. Wang, C. Zhu, and H.-G. Ryu, Research on secure
[6] E. P. Kim, J. Choi, N. R. Shanbhag, and R. A. Rutenbar, Error resilient data collection in wireless multimedia sensor networks, Computer
and energy efcient mrf message-passing-based stereo matching. Communications, vol. 35, no. 15, pp. 19021909, 2012.
[7] D. E. Boubiche, S. Boubiche, and A. Bilami, A cross-layer [30] W. Wang, C. Wang, and M. Zhao, Resource optimized ttsh-ura for
watermarking-based mechanism for data aggregation integrity in het- multimedia stream authentication in swallowable-capsule-based wireless
erogeneous wsns, Communications Letters, IEEE, vol. 19, no. 5, pp. body sensor networks, Biomedical and Health Informatics, IEEE Jour-
823826, 2015. nal of, vol. 18, no. 2, pp. 404410, 2014.
[8] K.-A. Shim, A survey of public-key cryptographic primitives issues in [31] X. Zhu and C. W. Chen, A joint source-channel adaptive scheme for
wireless sensor networks. wireless h. 264/avc video authentication, Information Forensics and
Security, IEEE Transactions on, vol. 11, no. 1, pp. 141153, 2016.

596
[32] M. Fallahpour, S. Shirmohammadi, M. Semsarzadeh, and J. Zhao,
Tampering detection in compressed digital video using watermarking,
Instrumentation and Measurement, IEEE Transactions on, vol. 63, no. 5,
pp. 10571072, 2014.
[33] C.-Y. Lin, K. Muchtar, C.-H. Yeh, and C.-S. Lu, Secure multicasting
of images via joint privacy-preserving ngerprinting, decryption, and
authentication, Journal of Visual Communication and Image Represen-
tation, 2016.
[34] T. Dutta and H. P. Gupta, A robust watermarking framework for high
efciency video coding (hevc)encoded video with blind extraction
process, Journal of Visual Communication and Image Representation,
vol. 38, pp. 2944, 2016.
[35] D. Xu, R. Wang, and Y. Q. Shi, An improved scheme for data hiding
in encrypted h. 264/avc videos, Journal of Visual Communication and
Image Representation, vol. 36, pp. 229242, 2016.
[36] J. Wu, Y. Shang, B. Cheng, B. Wu, and J. Chen, Loss tolerant band-
width aggregation for multihomed video streaming over heterogeneous
wireless networks, Wireless personal communications, vol. 75, no. 2,
pp. 12651282, 2014.
[37] M. Usman, X. He, M. Xu, and K. M. Lam, Survey of error concealment
techniques: Research directions and open issues, in Picture Coding
Symposium (PCS), 2015. IEEE, 2015, pp. 233238.
[38] Y. Zhou, W. Xiang, and G. Wang, Frame loss concealment for mul-
tiview video transmission over wireless multimedia sensor networks,
Sensors Journal, IEEE, vol. 15, no. 3, pp. 18921901, 2015.
[39] J. Nightingale, Q. Wang, C. Grecos, and S. Goma, The impact of
network impairment on quality of experience (qoe) in h. 265/hevc video
streaming, Consumer Electronics, IEEE Transactions on, vol. 60, no. 2,
pp. 242250, 2014.
[40] M. Usman, X. He, K. Lam, M. Xu, S. Bokhari, and J. Chen, Frame
interpolation for cloud-based mobile video streaming, Multimedia,
IEEE Transactions on, vol. 18, no. 5, pp. 831839, 2016.
[41] G. J. Sullivan, J.-R. Ohm, W.-J. Han, and T. Wiegand, Overview of
the high efciency video coding (hevc) standard, Circuits and Systems
for Video Technology, IEEE Transactions on, vol. 22, no. 12, pp. 1649
1668, 2012.
[42] D. He, S.-C. Chan, and S. Tang, A novel and lightweight system
to secure wireless medical sensor networks, Biomedical and Health
Informatics, IEEE Journal of, vol. 18, no. 1, pp. 316326, 2014.
[43] Hm 16.6, a test model of h.265/hevc standard, https://hevc.hhi.
fraunhofer.de/svn/svn HEVCSoftware/trunk/, accessed: 2016-04-13.
[44] Lotus mote, multimedia wireless sensor node, http://www.memsic.
com/wireless-sensor-networks/, accessed: 2016-04-13.

597

You might also like