In wireless sensor networks, sensor nodes are deployed in open environments to gather and send collected data to a remote server. During the data transmission process, the collected data is vulnerable to security risks, making it crucial to encrypt the data to prevent it from falling into the wrong hands. This paper proposes a new approach that integrates homomorphic encryption (HE) algorithms into the sensor devices, allowing the data collected by the sensors to be encrypted before transmission. By utilizing HE in the sensor networks, the server can execute calculations on the encrypted data without requiring decryption. To implement the HE function, we use the Simple Encrypted Arithmetic Library (SEAL), which the Microsoft Cryptography Research Group developed. We evaluated the HE-based data collection scheme in IoT sensor networks with various network topologies to assess network lifetime, communication distance, and data collection latency.
This paper presents a video surveillance-based face image security system that utilizes post-quantum cryptography algorithm for enhanced security. The system accurately extracts face images from the surveillance video using the multi-task cascaded convolutional neural network (MTCNN) and subsequently encrypts them using the ring learning with errors (ring-LWE) algorithm. The encrypted facial images are then transmitted to a remote server for secure storage. The proposed system is implemented on a central processing unit (CPU) platform and its operations are accelerated using a graphics processing unit (GPU). The evaluation results on an NVIDIA GeForce RTX 3090 Ti GPU for videos from the standard reference database of National Institute of Science and Technology (NIST) show that the proposed system can perform face image encryption and decryption as fast as 1.33 ms and 0.51 ms on GPU platform for parameter set n = 256 and q = 7681, respectively. Moreover, the analysis of security parameters such as histogram, correlation coefficients, and entropy proves that the proposed system outperforms its predecessors in terms of confidentiality. The proposed system is also assessed using various security parameter sets to showcase its compatibility with diverse computational resources.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.