Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques

نویسندگان

  • M. A. Mohamed
  • F. W. Zaki
  • A. M. El - Mohandes
چکیده

Mobile WiMax security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMax presents a range of security design and integration challenges. In this paper, two proposed chaos encryption techniques were described for image transmission over Mobile WiMax network as an enhancement of image security problem in Mobile WiMax. At first, a global overview of the Mobile WiMax security sublayer was given to determine the disadvantages of recently used encryption technique. Then three selected traditional techniques and our proposed encryption techniques were presented. Next, these techniques were applied to image to examine their robustness against cipher-image attacks such as cropping, noising, and JPEG compression. It was found that our techniques are more robust than AES and the selected techniques in the presence of cipher-image attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

AES Based Security Architecture Of WIMAX Using OMNET++

Although WiMAX is considered to be the last mile protocol but its security still remains a question because it neither encrypts the MAC (Media access control) headers nor the media MAC management messages. Therefore, an attacker can easily launch passive attacks to monitor WiMAX traffic and can retrieve valuable information from unencrypted MAC management messages. This research paper focuses o...

متن کامل

Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks

Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and the network service provider. Worldwide Interoperability for Microwave Access (WiMax...

متن کامل

Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks

As a promising broadband wireless technology, WiMax has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMax but it still exposes to various attacks in. In this paper, three proposed chaos encryption techniques were described for video transmission...

متن کامل

A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013