Secure image transmissions in wireless multimedia sensor networks

Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Hsiao Hwa Chen

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The strong need for secure wireless multimedia services such as privacy and confidentiality, integrity and authenticity, has driven the development of an emerging research area in low cost wireless multimedia sensor networks. However, traditional security (encryption/authentication) techniques cannot be directly applied to secure multimedia over wireless sensor networks due to the inborn challenges such as limited energy, computing and bandwidth resources, as well as the error prone wireless channel which provides an open media vulnerable to malicious interception and packet injection attacks. This chapter presents an overview of the state-of-the-art research progresses for resource-quality-driven secure multimedia (using digital image as an illustrative example) over wireless sensor networks. The existing security techniques for multimedia services and their applications to secure wireless multimedia sensor networks are reviewed. Furthermore, frontier researches on digital image selective encryption and image stream authentication and their optimizations within energy-constrained wireless sensor networks are reviewed and discussed in depth. Finally, the interactive encryption/authentication and cross layer resource allocation schemes are investigated and advocated to achieve energy efficiency, multimedia security and media quality jointly.

Original languageEnglish
Title of host publicationHandbook on Sensor Networks
PublisherWorld Scientific Publishing Co.
Pages675-688
Number of pages14
ISBN (Electronic)9789812837318
ISBN (Print)9812837302, 9789812837301
DOIs
Publication statusPublished - 2010 Jan 1

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure image transmissions in wireless multimedia sensor networks'. Together they form a unique fingerprint.

Cite this