Skip to main content

2019 | OriginalPaper | Buchkapitel

7. An Encryption Model for Data Processing in WSN

verfasst von : Mohamed Elhoseny, Aboul Ella Hassanien

Erschienen in: Dynamic Wireless Sensor Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Building a secure routing protocol in WSN is not trivial process. It looks like an optimization process through which we try to find the optimum solution that maximize the network performance in an environment with a set of complicated constraints. The main purpose is not only to design new routing protocol that guarantee the network efficiency, but also balancing between this efficiency and the security requirements. For that purpose, we designed and followed a general framework to simplify the process of building such that protocol. In this chapter, an overview of the working steps towards building the proposed protocol is described. Then the protocol objectives and methodology are discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1).CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1).CrossRef
2.
Zurück zum Zitat Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks and security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1). Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks and security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1).
3.
Zurück zum Zitat Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H. K., & Riad, A. M. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, PP(99), 1. Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H. K., & Riad, A. M. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, PP(99), 1.
7.
Zurück zum Zitat Farouk, A., Batle, J., Elhoseny, M., Naseri, M., Lone, M., Fedorov, A., Alkhambashi, M., Ahmed, S. H., & Abdel-Aty, M., (2018). Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states, Frontiers of Physics, 13, 130306. Springer. https://doi.org/10.1007/s11467-017-0717-3. Farouk, A., Batle, J., Elhoseny, M., Naseri, M., Lone, M., Fedorov, A., Alkhambashi, M., Ahmed, S. H., & Abdel-Aty, M., (2018). Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states, Frontiers of Physics, 13, 130306. Springer. https://​doi.​org/​10.​1007/​s11467-017-0717-3.
8.
Zurück zum Zitat Elhoseny, M., Elkhateb, A., Sahlol, A., & Hassanien, A. E. (2018) Multimodal biometric personal identification and verification. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, vol 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_12. Elhoseny, M., Elkhateb, A., Sahlol, A., & Hassanien, A. E. (2018) Multimodal biometric personal identification and verification. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, vol 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​12.
9.
Zurück zum Zitat Elhoseny, M., Essa, E., Elkhateb, A., Hassanien, A. E., & Hamad, A. (2018). Cascade multimodal biometric system using fingerprint and Iris patterns. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_55. Elhoseny, M., Essa, E., Elkhateb, A., Hassanien, A. E., & Hamad, A. (2018). Cascade multimodal biometric system using fingerprint and Iris patterns. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​55.
10.
Zurück zum Zitat Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016b). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016b). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.
11.
Zurück zum Zitat Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016a). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016a). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef
12.
Zurück zum Zitat Elsayed, W., Elhoseny, M., Riad, A., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In International conference on advanced intelligent systems and informatics, (pp. 151–160). Cham: Springer. Elsayed, W., Elhoseny, M., Riad, A., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In International conference on advanced intelligent systems and informatics, (pp. 151–160). Cham: Springer.
15.
Zurück zum Zitat Elhoseny, M., Farouk, A., Zhou, N., Wang, M., Abdalla, S., & Batle, J. (2017a). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, 1–21. Elhoseny, M., Farouk, A., Zhou, N., Wang, M., Abdalla, S., & Batle, J. (2017a). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, 1–21.
16.
Zurück zum Zitat Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017b). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4.CrossRef Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017b). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4.CrossRef
18.
Zurück zum Zitat Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of research on machine learning innovations and trends, (Chapter 45, pp. 1022–1040), IGI Global. https://doi.org/10.4018/978-1-5225-2229-4.ch045. Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of research on machine learning innovations and trends, (Chapter 45, pp. 1022–1040), IGI Global. https://​doi.​org/​10.​4018/​978-1-5225-2229-4.​ch045.
19.
Zurück zum Zitat Elhoseny, Mohamed, Elleithy, Khaled, Elminir, Hamdi, Yuan, Xiaohui, & Riad, Alaa. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252. Elhoseny, Mohamed, Elleithy, Khaled, Elminir, Hamdi, Yuan, Xiaohui, & Riad, Alaa. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252.
20.
Zurück zum Zitat Yuan, X., Elhoseny, M., El-Minir, H., & Riad, A. (2017). A genetic algorithm-based, dynamic clustering method towards improved WSN longevity. Journal of Network and Systems Management, 25(1), 21–46.CrossRef Yuan, X., Elhoseny, M., El-Minir, H., & Riad, A. (2017). A genetic algorithm-based, dynamic clustering method towards improved WSN longevity. Journal of Network and Systems Management, 25(1), 21–46.CrossRef
21.
Zurück zum Zitat Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.CrossRef Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.CrossRef
22.
Zurück zum Zitat Ahmed, G., Khan, N. M., & Ramer, R. (2008). Cluster head selection using evolutionary computing in wireless sensor networks. In Progress in electromagnetics research symposium, (pp. 883–886). Ahmed, G., Khan, N. M., & Ramer, R. (2008). Cluster head selection using evolutionary computing in wireless sensor networks. In Progress in electromagnetics research symposium, (pp. 883–886).
23.
Zurück zum Zitat Bhaskar, N., Subhabrata, B., & Soumen, P. (2010). Genetic algorithm based optimization of clustering in ad-hoc networks. International Journal of Computer Science and Information Security, 7(1), 165–169. Bhaskar, N., Subhabrata, B., & Soumen, P. (2010). Genetic algorithm based optimization of clustering in ad-hoc networks. International Journal of Computer Science and Information Security, 7(1), 165–169.
24.
Zurück zum Zitat Asim, M., & Mathur, V. (2013). Genetic algorithm based dynamic approach for routing protocols in mobile ad hoc networks. Journal of Academia and Industrial Research, 2(7), 437–441. Asim, M., & Mathur, V. (2013). Genetic algorithm based dynamic approach for routing protocols in mobile ad hoc networks. Journal of Academia and Industrial Research, 2(7), 437–441.
25.
Zurück zum Zitat Karimi, A., Abedini, S., Zarafshan, F., & Al-Haddad, S. (2013). Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network. Journal of Basic and Applied Scientific Research, 3(4), 694–703. Karimi, A., Abedini, S., Zarafshan, F., & Al-Haddad, S. (2013). Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network. Journal of Basic and Applied Scientific Research, 3(4), 694–703.
29.
Zurück zum Zitat Rana, K., & Zaveri, M. (2013). Synthesized cluster head selection and routing for two tier wireless sensor network. Journal of Computer Networks and Communications, 13(3). Rana, K., & Zaveri, M. (2013). Synthesized cluster head selection and routing for two tier wireless sensor network. Journal of Computer Networks and Communications, 13(3).
30.
Zurück zum Zitat Bayrakl, S., & Erdogan, S. (2012). Genetic algorithm based energy efficient clusters in wireless sensor networks. Procedia Computer Science, 10, 247–254.CrossRef Bayrakl, S., & Erdogan, S. (2012). Genetic algorithm based energy efficient clusters in wireless sensor networks. Procedia Computer Science, 10, 247–254.CrossRef
31.
Zurück zum Zitat Attea, B. A., & Khalil, E. A. (2012). A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Applied Soft Computing, 12(7), 1950–1957.CrossRef Attea, B. A., & Khalil, E. A. (2012). A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Applied Soft Computing, 12(7), 1950–1957.CrossRef
32.
Zurück zum Zitat Wu, Y., & Liu, W. (2013). Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks. IET Wireless Sensor Systems, 3(2), 112–118.CrossRef Wu, Y., & Liu, W. (2013). Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks. IET Wireless Sensor Systems, 3(2), 112–118.CrossRef
33.
Zurück zum Zitat Hussain, S., Matin, A. W., & Islam, O. (2007). Genetic algorithm for energy efficient clusters in wireless sensor networks. In International conference on information technology. Hussain, S., Matin, A. W., & Islam, O. (2007). Genetic algorithm for energy efficient clusters in wireless sensor networks. In International conference on information technology.
34.
Zurück zum Zitat Lotf, J. J., Hossein, S., & Ghazan, N. (2011). Overview on wireless sensor networks. Journal of Basic and Applied Scientific Research, 11(1), 2811–2816. Lotf, J. J., Hossein, S., & Ghazan, N. (2011). Overview on wireless sensor networks. Journal of Basic and Applied Scientific Research, 11(1), 2811–2816.
35.
Zurück zum Zitat Lalitha, T., & Umarani, R. (2012). Energy efficient cluster based key management technique for wireless sensor network. International Journal of Advances in Engineering and Technology, 3(2), 186–190. Lalitha, T., & Umarani, R. (2012). Energy efficient cluster based key management technique for wireless sensor network. International Journal of Advances in Engineering and Technology, 3(2), 186–190.
36.
Zurück zum Zitat Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through snr based dynamic clustering mechanisms. Journal of Communications and Networks, 15(4), 422–429.CrossRef Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through snr based dynamic clustering mechanisms. Journal of Communications and Networks, 15(4), 422–429.CrossRef
37.
Zurück zum Zitat Huang, L., Jie, L., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef Huang, L., Jie, L., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef
38.
Zurück zum Zitat Xiao, W., Li, Y., & Ke, C. (2005). SLEACH secure lowenergy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan University Journal of Natural Sciences, 10(1), 127–131.CrossRef Xiao, W., Li, Y., & Ke, C. (2005). SLEACH secure lowenergy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan University Journal of Natural Sciences, 10(1), 127–131.CrossRef
39.
Zurück zum Zitat Zhou, Q., Yang, G., & He, L. (2014). A secure enhanced data aggregation based on ECC in wireless sensor network. Sensors Journal, 14(4), 6701–6721.CrossRef Zhou, Q., Yang, G., & He, L. (2014). A secure enhanced data aggregation based on ECC in wireless sensor network. Sensors Journal, 14(4), 6701–6721.CrossRef
40.
Zurück zum Zitat Girao, J., Westhoff, D., Mykletun, E., & Araki, T. (2007). TinyPEDS tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks, 5(7), 1073–1089.CrossRef Girao, J., Westhoff, D., Mykletun, E., & Araki, T. (2007). TinyPEDS tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks, 5(7), 1073–1089.CrossRef
41.
Zurück zum Zitat Oliveira, L., Ferreira, A., Vilaca, M., Wong, H., Bern, M., Dahab, R., et al. (2007). Secleach-on the security of clustered sensor networks. Signal Processing, 87(12), 2882–2895.CrossRef Oliveira, L., Ferreira, A., Vilaca, M., Wong, H., Bern, M., Dahab, R., et al. (2007). Secleach-on the security of clustered sensor networks. Signal Processing, 87(12), 2882–2895.CrossRef
42.
Zurück zum Zitat Boneh, D., Goh, E. J., & Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In The 2nd international conference on theory of cryptography, (pp. 325–341).CrossRef Boneh, D., Goh, E. J., & Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In The 2nd international conference on theory of cryptography, (pp. 325–341).CrossRef
43.
Zurück zum Zitat Mykletun, E., Girao, J., & Westhoff, D. (2006). Public key based cryptoschemes for data concealment in wireless sensor networks. In The IEEE international conference on communications, (pp. 2288–2295). Istanbul: IEEE. Mykletun, E., Girao, J., & Westhoff, D. (2006). Public key based cryptoschemes for data concealment in wireless sensor networks. In The IEEE international conference on communications, (pp. 2288–2295). Istanbul: IEEE.
44.
Zurück zum Zitat Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES. Advances in Cryptology, 7073, 344–371.MathSciNetMATH Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES. Advances in Cryptology, 7073, 344–371.MathSciNetMATH
45.
Zurück zum Zitat Xiao-Jun, T., Zhu, W., & Ke, Z. (2012). A novel block encryption scheme based on chaos and an Sbox for WSNs. Journal of Chinese Physics, 21(2). Xiao-Jun, T., Zhu, W., & Ke, Z. (2012). A novel block encryption scheme based on chaos and an Sbox for WSNs. Journal of Chinese Physics, 21(2).
46.
Zurück zum Zitat Eryümaz, E., Erturk, I., & Atmaca, S. (2009). Implementation of Skipjack cryptology algorithm for WSNs using FPGA. In International conference on application of information and communication technologies, (pp. 1–5). IEEE. Eryümaz, E., Erturk, I., & Atmaca, S. (2009). Implementation of Skipjack cryptology algorithm for WSNs using FPGA. In International conference on application of information and communication technologies, (pp. 1–5). IEEE.
47.
Zurück zum Zitat Biham, E., Biryukov, A., & Shamir, A. (2005). Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. Journal of Cryptology, 18(4), 291–311.MathSciNetCrossRef Biham, E., Biryukov, A., & Shamir, A. (2005). Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. Journal of Cryptology, 18(4), 291–311.MathSciNetCrossRef
48.
Zurück zum Zitat Suzaki, T., Minematsu, K., Morioka, S., & Kobayashi, E. (2013). TWINE: a lightweight block cipher for multiple platforms. Selected Areas in Cryptography, 7707, 339–354.MATH Suzaki, T., Minematsu, K., Morioka, S., & Kobayashi, E. (2013). TWINE: a lightweight block cipher for multiple platforms. Selected Areas in Cryptography, 7707, 339–354.MATH
49.
Zurück zum Zitat Karakoca, F., Demircia, H., & Harmancib, A. (2013). Biclique cryptanalysis of lblock and twine. Information Processing Letters, 113(12), 423–429.MathSciNetCrossRef Karakoca, F., Demircia, H., & Harmancib, A. (2013). Biclique cryptanalysis of lblock and twine. Information Processing Letters, 113(12), 423–429.MathSciNetCrossRef
50.
Zurück zum Zitat Isobe, T., & Shibutani, K. (2012). Security analysis of the lightweight block ciphers XTEA and LED and Piccolo. Information Security and Privacy, 7372, 71–86.MATH Isobe, T., & Shibutani, K. (2012). Security analysis of the lightweight block ciphers XTEA and LED and Piccolo. Information Security and Privacy, 7372, 71–86.MATH
51.
Zurück zum Zitat Biswas, K., Muthukkumarasamy, V., & Singh, K. (2015). An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, PP(99), 1. Biswas, K., Muthukkumarasamy, V., & Singh, K. (2015). An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, PP(99), 1.
52.
Zurück zum Zitat Liu, Y., & Tian, S. (2012). Design and statistical analysis of a new chaos block cipher for WSN. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3267–3278.MathSciNetCrossRef Liu, Y., & Tian, S. (2012). Design and statistical analysis of a new chaos block cipher for WSN. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3267–3278.MathSciNetCrossRef
53.
Zurück zum Zitat Saminathan, A., & Karthik, S. (2013). Development of an energyefficient and secure and reliable wireless sensor networks routing protocol based on data aggregation and user authentication. American Journal of Applied Sciences, 10(8), 832–843.CrossRef Saminathan, A., & Karthik, S. (2013). Development of an energyefficient and secure and reliable wireless sensor networks routing protocol based on data aggregation and user authentication. American Journal of Applied Sciences, 10(8), 832–843.CrossRef
54.
Zurück zum Zitat Singh, M., & Hussain, M. (2010). A top-down hierarchical multi-hop secure routing protocol for wireless sensor networks. International Journal of Ad hoc and Sensor and Ubiquitous Computing, 1(2). Singh, M., & Hussain, M. (2010). A top-down hierarchical multi-hop secure routing protocol for wireless sensor networks. International Journal of Ad hoc and Sensor and Ubiquitous Computing, 1(2).
55.
Zurück zum Zitat Elhoseny, M., Yuan, X., ElMinir, H., & Riad, A. (2014). Extending self-organizing network availability using genetic algorithm. In ICCCNT. China: Hefei. Elhoseny, M., Yuan, X., ElMinir, H., & Riad, A. (2014). Extending self-organizing network availability using genetic algorithm. In ICCCNT. China: Hefei.
57.
60.
Zurück zum Zitat El Aziz, M. A., Hemdan, A. M., Ewees, A. A., Elhoseny, M., Shehab, A., Hassanien, A. E., & Xiong, S. (2017). Prediction of biochar yield using adaptive neuro-fuzzy inference system with particle swarm optimization. In 2017 IEEE PES PowerAfrica conference, (pp. 115–120), June 27–30, 2017. Accra-Ghana: IEEE. https://doi.org/10.1109/PowerAfrica.2017.7991209. El Aziz, M. A., Hemdan, A. M., Ewees, A. A., Elhoseny, M., Shehab, A., Hassanien, A. E., & Xiong, S. (2017). Prediction of biochar yield using adaptive neuro-fuzzy inference system with particle swarm optimization. In 2017 IEEE PES PowerAfrica conference, (pp. 115–120), June 27–30, 2017. Accra-Ghana: IEEE. https://​doi.​org/​10.​1109/​PowerAfrica.​2017.​7991209.
61.
Zurück zum Zitat Ewees, A. A., El Aziz, M. A., & Elhoseny, M. (2017). Social-spider optimization algorithm for improving ANFIS to predict biochar yield. In 8th International conference on computing, communication and networking technologies (8ICCCNT), July 3–5, 2017. Delhi-India: IEEE. Ewees, A. A., El Aziz, M. A., & Elhoseny, M. (2017). Social-spider optimization algorithm for improving ANFIS to predict biochar yield. In 8th International conference on computing, communication and networking technologies (8ICCCNT), July 3–5, 2017. Delhi-India: IEEE.
62.
Zurück zum Zitat Metawa, N., Elhoseny, M., Hassan, M. K., & Hassanien, A. E. (2016). Loan portfolio optimization using genetic algorithm: A case of credit constraints. In Proceedings of 12th international computer engineering conference (ICENCO), (pp. 59–64). IEEE.https://doi.org/10.1109/ICENCO.2016.7856446. Metawa, N., Elhoseny, M., Hassan, M. K., & Hassanien, A. E. (2016). Loan portfolio optimization using genetic algorithm: A case of credit constraints. In Proceedings of 12th international computer engineering conference (ICENCO), (pp. 59–64). IEEE.https://​doi.​org/​10.​1109/​ICENCO.​2016.​7856446.
63.
Zurück zum Zitat Shehab, A., Elhoseny, M., El Aziz, M. A., & Hassanien, A. E. (2018). Efficient schemes for playout latency reduction in P2P-VoD systems. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_22. Shehab, A., Elhoseny, M., El Aziz, M. A., & Hassanien, A. E. (2018). Efficient schemes for playout latency reduction in P2P-VoD systems. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​22.
64.
Zurück zum Zitat Elhoseny M., Nabil A., Hassanien A. E., & Oliva, D. (2018). Hybrid rough neural network model for signature recognition. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_14. Elhoseny M., Nabil A., Hassanien A. E., & Oliva, D. (2018). Hybrid rough neural network model for signature recognition. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​14.
65.
Zurück zum Zitat Abdeldaim, A. M., Sahlol, A. T., Elhoseny, M., & Hassanien, A. E. (2018). Computer-aided acute lymphoblastic Leukemia diagnosis system based on image analysis. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9. Abdeldaim, A. M., Sahlol, A. T., Elhoseny, M., & Hassanien, A. E. (2018). Computer-aided acute lymphoblastic Leukemia diagnosis system based on image analysis. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in Computational Intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9.
66.
Zurück zum Zitat Elhoseny, H., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). A framework for big data analysis in smart cities. In A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018). Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://doi.org/10.1007/978-3-319-74690-6_40.CrossRef Elhoseny, H., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). A framework for big data analysis in smart cities. In A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018). Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-74690-6_​40.CrossRef
67.
Zurück zum Zitat Elhoseny, M., Shehab, A., & Osman, L. (2018). An empirical analysis of user behavior for P2P IPTV workloads. In A. Hassanien, M. Tolba, M. Elhoseny, & Mostafa M. (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018). Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://doi.org/10.1007/978-3-319-74690-6_25.CrossRef Elhoseny, M., Shehab, A., & Osman, L. (2018). An empirical analysis of user behavior for P2P IPTV workloads. In A. Hassanien, M. Tolba, M. Elhoseny, & Mostafa M. (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018). Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-74690-6_​25.CrossRef
69.
Zurück zum Zitat Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_14. Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​14.
70.
Zurück zum Zitat Abdelaziz, A., Elhoseny, M., Salama, A. S., Riad, A. M., & Hassanien, A. E. (2018). Intelligent algorithms for optimal selection of virtual machine in cloud environment, towards enhance healthcare services. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_27. Abdelaziz, A., Elhoseny, M., Salama, A. S., Riad, A. M., & Hassanien, A. E. (2018). Intelligent algorithms for optimal selection of virtual machine in cloud environment, towards enhance healthcare services. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​27.
71.
Zurück zum Zitat Shehab A., Ismail A., Osman L., Elhoseny M., & El-Henawy I. M. (2018). Quantified self using IoT wearable devices. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_77. Shehab A., Ismail A., Osman L., Elhoseny M., & El-Henawy I. M. (2018). Quantified self using IoT wearable devices. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, AISI 2017. Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​77.
72.
Zurück zum Zitat Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., & Sangaiah, A. K. (2018). A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems. Elsevier. (in Press). Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., & Sangaiah, A. K. (2018). A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems. Elsevier. (in Press).
74.
Zurück zum Zitat Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing. Springer. https://doi.org/10.1007/s12652-017-0659-1. Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing. Springer. https://​doi.​org/​10.​1007/​s12652-017-0659-1.
76.
77.
Zurück zum Zitat Elhoseny, M., Hosny, A., Hassanien, A. E., Muhammad, K., & Sangaiah, A. K. (2017). Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable Computing, PP(99). https://doi.org/10.1109/TSUSC.2017.2782737. Elhoseny, M., Hosny, A., Hassanien, A. E., Muhammad, K., & Sangaiah, A. K. (2017). Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable Computing, PP(99). https://​doi.​org/​10.​1109/​TSUSC.​2017.​2782737.
78.
Zurück zum Zitat Houssain, H., Badra, M., & Somani, T. (2012). Software implementations of elliptic curve cryptography in wireless sensor networks. Journal of Communication and Computer, 9, 712–720. Houssain, H., Badra, M., & Somani, T. (2012). Software implementations of elliptic curve cryptography in wireless sensor networks. Journal of Communication and Computer, 9, 712–720.
79.
Zurück zum Zitat De Meulenaer, G., Gosset, F., Standaert, F. X., & Pereira, O. (2008). On the energy cost of communication and cryptography in wireless sensor networks. In IEEE international conference on wireless and mobile computing and networking and communications, (pp. 580–585). IEEE. De Meulenaer, G., Gosset, F., Standaert, F. X., & Pereira, O. (2008). On the energy cost of communication and cryptography in wireless sensor networks. In IEEE international conference on wireless and mobile computing and networking and communications, (pp. 580–585). IEEE.
Metadaten
Titel
An Encryption Model for Data Processing in WSN
verfasst von
Mohamed Elhoseny
Aboul Ella Hassanien
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-92807-4_7

Premium Partner