2017
DOI: 10.1155/2017/8158465
|View full text |Cite
|
Sign up to set email alerts
|

Semitensor Product Compressive Sensing for Big Data Transmission in Wireless Sensor Networks

Abstract: Big data transmission in wireless sensor network (WSN) consumes energy while the node in WSN is energy-limited, and the data transmitted needs to be encrypted resulting from the ease of being eavesdropped in WSN links. Compressive sensing (CS) can encrypt data and reduce the data volume to solve these two problems. However, the nodes in WSNs are not only energy-limited, but also storage and calculation resource-constrained. The traditional CS uses the measurement matrix as the secret key, which consumes a huge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Currently, the NPCR and UACI [51] are two quantitative indicators that can effectively appraise the capability of encryption scheme to withstand the differential attacks. Their mathematical definitions are displayed in equation (23), where the matrices As pointed out in [15], the closer the NPCR and UACI are to 99.6094% and 33.4635%, respectively, for a cryptosystem, the stronger it is in withstanding the differential attacks. In this experiment, the asymmetric embedding phase is first removed, and seven plain images with different scales are adopted to analyze the performance of the proposed privacy-preserving scheme against the differential analysis.…”
Section: Differential Attack Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, the NPCR and UACI [51] are two quantitative indicators that can effectively appraise the capability of encryption scheme to withstand the differential attacks. Their mathematical definitions are displayed in equation (23), where the matrices As pointed out in [15], the closer the NPCR and UACI are to 99.6094% and 33.4635%, respectively, for a cryptosystem, the stronger it is in withstanding the differential attacks. In this experiment, the asymmetric embedding phase is first removed, and seven plain images with different scales are adopted to analyze the performance of the proposed privacy-preserving scheme against the differential analysis.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…Actually, it has been certified that the measurement matrix as the secret key can provide sufficient computational security to withstand some security attack models, such as brute-force attack and ciphertext only attack [20]. Therefore, various compressive sensing models including parallel CS [21,22], semi-tensor product CS [23], Kronecker CS [24], etc were applied to image encryption. For example, the 2D compressive sensing combined with fractional-order Chen hyperchaotic system was adopted by Yang et al [25] to encrypt private images.…”
Section: Introductionmentioning
confidence: 99%
“…However, the traditional data compression sensing technology has strict restrictions on the dimension of signal matrices, which is not conducive to dealing with ubiquitous heterogeneous medical signals. Peng et al [36] proposed an STPCS algorithm to save computing resources, and applied it to the communication of wireless sensor networks. Ping et al [23] leveraged STPCS to reduce computational and spatial resources when designing a visually secure image encryption scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Column number in matrix A must be equal to row number in matrix x. The theory of semitensor product (STP) breaks through this limitation, able to perform matrix multiplication when two matrices do not meet the dimension-matching condition [31].…”
Section: Semitensor-product Compressed Sensingmentioning
confidence: 99%
“…An application of STP-CS was presented to reduce calculation energy consumption, and it was applied to the communication of wireless sensor networks (WSNs) [31]. In terms of recovery quality, STP-CS is almost equal to conventional CS and CCS.…”
Section: Semitensor-product Compressed Sensingmentioning
confidence: 99%