An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)


With rapid growth of multimedia applications, secure image transmission over Wireless Sensor Network (WSN) is a challenging task. So, image encryption techniques are used to meet the demand for real-time image security over wireless networks. In the proposed research, the security of Digital Images (DI) in wireless sensor network is enhanced using Light Weight Ciphers (LWC) which encrypts the input image through encryption process. To improve DI privacy and confidentiality, an innovative security model is proposed i.e. Lightweight SIMON block cipher. The proposed LWC encrypted the image along with optimal key selection and enhanced the image security level in the cloud. For key optimization, a meta-heuristic algorithm called Opposition-based Particle Swarm Optimization (OPSO) algorithm was presented. The proposed SIMON-OPSO achieved the minimum time in generating key value to decrypt the image. The simulation result demonstrated that the SIMON-OPSO algorithm improves the accuracy of DI security for all input images (Lena, Barbara, Baboon, and House) compared to existing algorithms.


Digital image security WSN Encryption LWC SIMON block cipher Key optimization OPSO algorithm 


  1. 1.
    Riad, A. M., El-Minir, H. K., & El-hoseny, M. (2013). Secure routing in wireless sensor networks: A state of the art. International Journal of Computer Applications, 67(7).Google Scholar
  2. 2.
    Sathesh Kumar, K., Shankar, K., Ilayaraja, M., & Rajesh, M. (2017). Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 9(18), 2888–2899.Google Scholar
  3. 3.
    Shankar, K. (2018). An optimal RSA encryption algorithm for secret images. International Journal of Pure and Applied Mathematics, 118(20), 2491–2500.Google Scholar
  4. 4.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In Neural computing and applications (pp. 1–15).Google Scholar
  5. 5.
    Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.Google Scholar
  6. 6.
    Elhoseny, M., & Hassanien A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp 115–143). Cham: Springer.Google Scholar
  7. 7.
    Elhoseny M., & Hassanien A. E. (2019). Extending homogeneous WSN lifetime in dynamic environments using the clustering model. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp. 73–92). Cham: Springer.Google Scholar
  8. 8.
    Somaraj, S., & Hussain, M. A. (2015). Performance and security analysis for image encryption using key image. Indian Journal of Science and Technology, 8(35).Google Scholar
  9. 9.
    Karthikeyan, K., Sunder, R., Shankar, K., Lakshmanaprabu, S. K., Vijayakumar, V., Elhoseny, M., et al. (2018). Energy consumption analysis of virtual machine migration in cloud using hybrid swarm optimization (ABC–BA). The Journal of Supercomputing, 1–17.Google Scholar
  10. 10.
    Ramya Princess Mary, Eswaran, P., & Shankar, K. (2018). Multi secret image sharing scheme based on DNA cryptography with XOR. International Journal of Pure and Applied Mathematics, 118(7), 393–398.Google Scholar
  11. 11.
    Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on Boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.Google Scholar
  12. 12.
    Zhang, X., Seo, S. H., & Wang, C. (2018). A lightweight encryption method for privacy protection in surveillance videos. Algorithm. Journal of Medical Systems, 42(11), 208.CrossRefGoogle Scholar
  13. 13.
    Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A. (2017). Sit: A lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688.
  14. 14.
    Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRefGoogle Scholar
  15. 15.
    Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 1–13.Google Scholar
  16. 16.
    Praneeta, G., & Pradeep, B. (2014). Security analysis of digital stegno images using genetic algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277–283). Cham: Springer.Google Scholar
  17. 17.
    Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRefGoogle Scholar
  18. 18.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  19. 19.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  20. 20.
    Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks, 146, 151–158.CrossRefGoogle Scholar
  21. 21.
    Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE sensors letters, 1(4), 1–4.CrossRefGoogle Scholar
  22. 22.
    Bhoyar, P., Dhok, S. B., & Deshmukh, R. B. (2018). Hardware implementation of secure and lightweight Simeck32/64 cipher for IEEE 802.15.4 transceiver. AEU—International Journal of Electronics and Communications, 90, 147–154.CrossRefGoogle Scholar
  23. 23.
    Dos Santos Júnior, J. G., & do Monte Lima, J. P. S. (2018). Particle swarm optimization for 3D object tracking in RGB-D images. Computers & Graphics, 76.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations