Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks

Similar documents
Request-Response Interaction Model in Constrained Networks

A Comparison between RISC and CISC Microprocessor Architectures

A BRIEF SURVEY OF ACOUSTIC WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK MAC PROTOCOL SMAC AND TMAC

An Innovative Approach to Investigate Various Software Testing Techniques and Strategies

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 2, Mar - Apr 2016

A Systematic Overview of Routing Protocols in WSNs

Research Article Volume 6 Issue No. 6

***

A Study of Open Middleware for Wireless Sensor Networks

Call for Papers for Communication QoS, Reliability and Modeling Symposium

IoT Based Traffic Signalling System

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

Mobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

A Wireless Internet of Things Architecture Based on Mobile Internet

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Smart Organization. Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India

Application of Redundant Backup Technology in Network Security

The FIRST Project and the Future Internet National Research Programme

Remote Monitoring System of Ship Running State under Wireless Network

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1

Introduction to ITU and ITU-T activities. ITU-T, the Standardization Sector of ITU.

Review of Advanced Wireless Technologies and Mobile Internet

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

The Internet of Things

Are there any new or emerging trends in technology that will impact the scope and work activities of the TC? Please describe briefly.

Regulation and the Internet of Things

An Information Framework for Creating a Smart City through Internet of Things

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Ubiquitous services and applications: needs of mobile users

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

An IoT-Aware Architecture for Smart

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Wireless Sensor Networks --- Concepts and Challenges

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

An Energy Efficient Intrusion Detection System in MANET.

Smart Grid Communications and Networking

ITU-T Y Overview of ubiquitous networking and of its support in NGN

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Lecture 04 Introduction: IoT Networking - Part I

Wireless# Guide to Wireless Communications. Objectives

Networking Cyber-physical Applications in a Data-centric World

ScienceDirect. Advanced Object Monitoring Using Wireless Sensors Network

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Committed to connecting the world

Outcomes of the ITU Regional Workshop on the Internet of Things (IoT) and Future Networks. (19-20 June 2017, Saint Petersburg, Russia)

IEEE PROJECTS ON EMBEDDED SYSTEMS

Challenges for Future Networked Embedded Systems

Study on the Interconnection Architecture and Access Technology for Internet of Things

SMART WATER MANAGEMENT PROCESS ARCHITECTURE WITH IOT BASED REFERENCE

Overview of Challenges in VANET

ITS (Intelligent Transportation Systems) Solutions

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

Picasso Panel Thinking Beyond 5 G David Corman

Research Directions in Low-Power Wireless Networks

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD

What s 5G? Dr Dean Economou Chief Transport Strategist, Telstra

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6

PUBLICATIONS. Journal Papers

Energy-efficient Routing and Secure Communication in Wireless Sensor Networks

Ad Hoc Networks - Applications and System Design

M2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol

EMBEDDED SYSTEMS 2017 IEEE PROJECT

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

The Internet of Things

Optimal Path Selection Using Dijkstra s Algorithm in Cluster-based LEACH Protocol

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Ericsson networked society. 27 th of September 2017, Espoo

Keynote Speakers CyberC 2010

Introduction to Mobile Ad hoc Networks (MANETs)

Speed Effect on the Performance of Vertical Handover in Wifi-3G Network

2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN:

The challenges, opportunities and setting the framework for 5G EMF and Health

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

Introduction to Networked Embedded Systems and Course Description. Song Han Office: ITEB 355

Internet of things. F r o m t h e n e t w o r k t o. Ing. Patrizia Macrina Ericsson

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Introduction to Mobile Ubiquitous Computing Systems

IoT MTC, M2M or IoT- Communication between devices without human intervention. Connected things - smart phones, sensors, actuators, cameras,

Wireless Sensor Networks --- Concepts and Challenges

Progress ICT TRG 2016~17. Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain

R&D to shape the networks and services of the future

Networking. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps

System Performance of Adaptive Bandwidth Traffic Shaping Mechanism for Residential Safety System

Simulation and Realization of Wireless Emergency Communication System of Digital Mine

Part I: Future Internet Foundations: Architectural Issues

Wireless Ad-Hoc Networks

Mobile and Sensor Systems

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Transcription:

Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Inam Ullah Khan 1, Nazia Azim 2,Syed Bilal Hussain Shah, Yin Fuliang 4, Muhammad Sameen 5 1 Isra University, Islamabadad Campus, School of Engineering and Applied Sciences (SEAS) 2 Abdul Wali Khan University Mardan, Pakistan 2, School of information and communication engineering Dalian Univerrsity of technology P.R China 3 PhD scholar, School of information and communication engineering Dalian Univerrsity of technology P.R China 4 Centree for Advance Studies in Engineering (CASE) Email addresses: 1 inamullahkhan05@gmail.com, 2 n.azim@awkum.edu.pk, 3 bilalshah@mail.dlut.edu.cn, 4 flyin@dlut.edu.cn, 5 msameen4@gmail.com Abstract: A slowly and gradually technological change has resulted in many aspectss of our lives being connected and affected by modern communication. Millions and Billions of people connected to global system of interconnected computer networks today. According to a survey the number of connected devices will exceeds 50 billion by the year 2020. The internet of things I would say a major transformation in a modern day to day world that haveaffected everyone and business as well. The internet of things was defined by ITU (International Telecommunication Union). Internet of things has moved from being a futuristic vision from last year. Nowadays smart homes automation, smart water networks that connects our world. Normally a wireless sensor network is formed by large sensor workstations where each workstation or node having sensors that would detect heat, light etc. This paper will briefly explain the network security, cyber security, internet of things and wireless sensor networks. Keywords: ITU, IOT, WSN, Sensor 1. Introduction Achieving the goals of the smart world we are having five areas to work like Wireless sensor networks [1-9], Mobile Computing, Cyber Physical Systems, Mobile Computing, Pervasive Computing. Now a day s every field is merged with one another in the modern day today life. Further research in these areas www.ijmca.org often relies on real time technologies like computing, machine learning, internet of things, privacy, availability and others.internet of things is the revolution in the field of internet. In internet of things almost every object is having microchips inside them. Through these microchips we can track these objects and many objects sense the surrounding areas then report to other machines as well. In real time example we can monitor water quality in sea or oceans through sensors through GPRS networks. The internet of things is the future for technology that is linking physical and virtual objects through communication capabilities. This structure includes existing and evolving internet and network developments. Cyber security involves security mechanism that typically has more than a particular algorithm or protocol. Having some security mechanism that either lies in which layer of OSI model or TCP/IP. The idea of internet of things was developed in parallel of wireless sensor networks. The development of WSNs was inspired by military applications, notably surveillance in conflict zones. Today, they consist of distributed independent devices that use sensors to monitor the physical conditions with their applications extended to industrial infrastructure, automation, health, traffic, and many consumer areas. 2. International Telecommunication Union Network Structure for Internet of Things: 1) Layer of Sensing Page 439

2) Layer of Access 3) Layer of Network 4) Layer of Middleware 5) Layer of Application This Network structure is just like open system international model in data communication and networks [10-22]. Water Pipes: We can also use sensors in the water pipes through this we will know where is the damage in the pipe. 2. Three kinds of WSN topologies: The three wireless sensor network topologies are shown in the below figure 3 2.1 Structure of Internet of things: This structure is categorized in three parts which are show in figure 1 Figure 1.Structure of IoT 2.2 Internet of things as Interconnected Computer Network: Figure 2. Network Setup 2.3Internet of things Applications: Cows and Water Pipes: COW! In future cow will also be connected. Dutch Start-up Companyimplemented sensors in the ears of cattle. Through this farmer will track the health and moment of animals. 4. Technologies: Figure 3. Different Topologies 4.1Radio Frequency Identification (RFID): The internet of things was started by radio frequency identification community. Radio frequency identification is a system that transmits the person or object wirelessly using radio waves in the form of a serial number. RFID device was for the first time used in World War 2. Later this technology is founded at the center of MIT in 1999. This technology was classified into three categories like a) Active RFID b) Passive RFID c) Semi Passive RFID 4.2 Internet Architecture &Internet Protocol: Two computers, anywhere in the world having certain hardware, software, protocol can communicate even if they are not connected directly. Internet protocol is the primary network protocol used on the internet. Now a day s two versions of internet protocol is used one is IPV4 and another is IPV6. There are five classes in IPV4 like Class A, Class B, Class C, Class D, Class E while only three www.ijmca.org Page 440

classes are commonly used Class A, Class B, Class C. Class D address will begin with binary 1110 in the first octet. And first octet having range 224 to 239. In Class E first octet of internet protocol address will begin with 111. Its first octet range is 240 to 255. E class is used for experimental purposes. work in homes and industries. These systems are characterized by the following a) Embedded devices: Many devices are interconnected with one another, these are integrated in to the environment. b) Aware Devices: These devices can recognize you in every situation. c) Personal: They are mostly used for personal use. d) Change due to Environment: These devices are so smart and intelligent that they are adaptive. 5. Challenges to Internet of things: Figure4. IP classes 4.3 Wireless Fidelity (Wi-Fi): Wireless Fidelity is a networking technology that allows devices to communicate over a signal. Now a day s Wi-Fi delivers high speed Wireless Local Area Networks (WLAN) connectivity to billion schools, colleges, universities, offices, homes, public locations, hotels, internet café and airports. Now a day s every mobile and handed electronic devices uses Wi-Fi. Now a day s in every city everyone communicate through Wi-Fi. 4.4 Bluetooth: This is a inexpensive wireless technology also called radio technology. Normally PDAs, handed electronic devices, notebook PCs, cameras, and printers communicate these devices with one another through Bluetooth in a short range of 10-100 meters. It is used for data sharing like video, text, numbers, and audio. More than 1000 companies use this technology. 4.5 Artificial Intelligence: AI refers to that electronic environment that is sensible due to the presence of peoples. In this intelligent world robots are used for day to day life There are several challenges that slow down the potential of internet of things. Some of the challenges are as under. 5.1 Internet Protocol Version 6 (IPv6): The following figure: 1.5 shows the IP Crises Figure 5.Pic chart of Classes IP version 6 uses 128 bits rather than 32 bits currently used in IPv4. IPv6 uses hexadecimal numbers for representation. This is also called IP- the Next Generation. This is very slow process to arrive. Ipv6 needs new software s and IT staff must be trained. Some experts believe IPv4 will remain for more than 10 years. Due to this situation that will slow the potential and progress of Internet of things since potentially billions of new sensors will require for unique IP addresses. 5.2 Sensor Energy: www.ijmca.org Page 441

Internet of things [23-43] to reach the full potential and level sensors will be needed to auto generate and charge through nano-generators. Through these we can generate power electricity. 6. Conclusion: In Future for making our life simple and easy internet of things will bring change in the field of technology.internet of things having applications in many domains like education, health, Engineering, mining, habit, transportation and in many other areas as well. There are some flaws in Internet of things in implementation level like there is no definition available worldwide. There must be some standardized techniques available in architectural level. And for better governance we must have to build some standard protocols. Hoping for the better future of internet of things. REFERENCES: [1]. InamUllah khan and Muhammad abulhassan Network layer attacks mechanisms in MANETS-A Survey IJRCCT VOl 5,ISSUE-6 June [2]. Engr. Alamgir Safi, InamUllah Khan, Muhammad Abul Hassan, Engr. Muhammad Asghar Mobile Ad hoc networks in the Global system of Interconnected Computer Networks IJSEAT, Vol. 4, Issue 9 ISSN 2321-6905September - [3]. InamUllah Khan, Faheem Numan, Shaheen Ahmad Mobile Ad Hoc Networks Challenges IJSEAT, Vol. 4, Issue 9 ISSN 2321-6905 September - [4]. InamUllah Khan, Muhammad Abul Hassan Transport Layer Protocols And Services IJRCCT, Vol 5, Issue- 9, September- ISSN (Online) 2278-5841ISSN (Print) 2320-515 [5]. Fida, N., Khan, F., Jan, M. A., & Khan, Z., (2017). Performance Analysis of Vehicular Adhoc Network using different Highway Traffic Scenarios in Cloud Computing. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press. [6]. Khan, F., Khan, M., Iqbal. Z., Rahman, I., & Alam, M. (2017). Secure and Safe Surveillance System using Sensors Networks - Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press. [7]. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, A robust authentication scheme for observing resources in the internet of things environment in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE. [8]. M. A. Jan, P. Nanda and X. He, Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN, in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154 167, Springer, Berlin, Germany, 2013. [9]. Khan, F., Rahman, I., Khan, M., Iqbal, N., & Alam, M., (2017). CoAP -based Request- Response Interaction Model for the Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press. [10]. Younas, N., Asghar, Z., Qayyum, M., & Khan. F., (2017). Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press. [11]. Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8). IEEE. [12]. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE. [13]. Khan, F., Kamal, S. A., & Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE. [14]. Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE. [15]. Khan, S., & Khan, F. (2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. In 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW ) (pp. 1- www.ijmca.org Page 442

8). [16]. Khan, F., Jan, S. R., Tahir, M., Khan, S., & Ullah, F. (). Survey: Dealing Non - Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13. [17]. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE. [18]. Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92. [19]. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE. [20]. Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan, S. A. (). Performance Improvement in Wireless Sensor and Actor Networks. Journal of Applied Environmental and Biological Sciences, 6(4S), 191-200. [21]. Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE. [22]. Younas. N, Asghar, Z, Qayyum. M, & Khan. F. Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis [23]. Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., & Ullah, F. (). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990. [24]. Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., () Framework for Better Reusability in Component Based Software Engineering.In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81. [25]. Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67 [26]. Shabana, K., Fida, N., Khan, F., Jan, S. R., & Rehman, M. U. (). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81. [27]. Zeeshan, M., Khan, F., & Jan, S. R. (). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology [28]. M. A. Jan, P. Nanda, X. He and R. P. Liu, Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013. [29]. M. A. Jan, P. Nanda, X. He and R. P. Liu, PASCCC: Priority-based application-specific congestion control clustering protocol Computer Networks, Vol. 74, PP-92-102, 2014. [30]. M. A. Jan, P. Nanda, X. He and R. P. Liu, A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE. [31]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, August). DPBSV--An Efficient and Secure Scheme for Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 246-253). IEEE. [32]. Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (). R eview of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre [33]. Zeeshan, M., Khan, F., & Jan, S. R. (). Review of various Congestion Detection and Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre [34]. Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (). A Systematic Overview of Routing Protocols in WSNs. International www.ijmca.org Page 443

Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088. [35].Khan.W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048. [36]. Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053. [37]. Alam, M., Yang, D., Huq, K., Saghezchi, F., Mumtaz, S., & Rodriguez, J. (2015). Towards 5G: Context Aware Resource Allocation for Energy Saving. Journal of Signal Processing Systems, 83(2), 279 291. doi:10.1007/s11265-015-1061-x [38]. Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. doi:10.1007/s11235-016-0171-5 [39]. Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: context -aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861 875. doi:10.1002/ett.2763 [40]. Alam, M., Mumtaz, S., Saghezchi, F. B., Radwan, A., Rodriguez, J. (2013). Energy and Throughput Analysis of Reservation Protocols of Wi Media MAC. Journal of Green Engineering, 3(4), 363 382. doi:10.13052/jge1904-4720.341 [41]. M. Usman, M. A. Jan, and X. He, Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds, Elsevier Information sciences, accepted,. [42]. Jan, M., Nanda, P., Usman, M. and He, X.,. PAWN: a payload based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience. [43]. M. Usman, M. A. Jan, X. He and P. Nanda, Data Sharing in Secure Multimedia Wireless Sensor Networks, in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), accepted,. www.ijmca.org Page 444