SlideShare a Scribd company logo
1 of 23
Lower Complexity
of secured WSN
Networks
Realized by
AISSA BEN YAHYA
PLAN
Introduction
Error Control Scheme basics
Interleaving techniques
Cryptography using chaos
Chaotic interleaver
conclusion
2
Introduction
Introduction
data-length complexity and the computational
complexity of processed data and error control
schemes, are essential points in system design
4
Error control schemes
Channel Error
6
Automatic Repeat Request
(ARQ)
Packet is retransmitted if it
is found to have errors.
Error control schemes
Forward Error Correction
(FEC)
FEC or channel coding is a
method used to increase
the performance of error
control
7
Interleaving techniques
Interleaving techniques
 The interleaving idea is utilized to limiting the need
of complex error control schemes
 In addition to FEC it keeps the channel security
9
Interleaving definition
 Interleaving is a periodic and reversible reordering of blocks of L
transmitted symbols
 Interleaving is used to disperse error bursts that may occur
because of non-stationary channel noise that may be localized
to a few dimensions
10
Interleaving latency
 the latency parameter is defined as the difference
between maximum and minimum delay of the interleaver
𝑑 = 𝑑 𝑚𝑎𝑥 − 𝑑 𝑚𝑖𝑛
11
Cryptography using
Chaos
The propertie of Chaos
Sensetivity to initial conditions (butterfly effect)
means that when a chaotic map is iteratively applied
to two initially close points, it iterates quickly diverge,
and become uncorrelated in the long term
13
One Dimensional Chaotic Map
the logistic map is given by as:
𝑋 𝑛+1 = 𝑟𝑋 𝑛 (1 − 𝑋 𝑛)
14
Two Dimensional Chaotic Map
The discretized map can be represented for an RxR matrix
as follows:
𝐵 𝑟1, 𝑟2
=
𝑅
𝑛𝑖
𝑟1 − 𝑅𝑖 + 𝑟2 𝑚𝑜𝑑
𝑅
𝑛𝑖
,
𝑛𝑖
𝑅
𝑟2 − 𝑟2 𝑚𝑜𝑑
𝑅
𝑛𝑖
+ 𝑅𝑖
15
Place your screenshot here
16
Chaotic encryption of an
8x8 square matrix
R = 8
The secret key
𝑆 𝑘𝑒𝑦 = 𝑛1, 𝑛2, 𝑛3 = 2,4,2
Chaotic interleaver
Row-Column
interleaver
18
In this interleaver, data are written to
its memories row-by-row and then
read from them column-by-column
Chaotic interleaver
In the following, the two dimensional
chaotic Baker map based is utilized as
an efficient interleaving technique.
19
Conclusion
The interleaving techniques which are based on
the encryption data tools. presents powerful
randomizing engine, furthermore, it enhances the
wireless link security.
References
• M. E. Abd Elhameed, M. A. M. El-Bendary, E. O. Begheet, H. M. Abd Elkader, “An Efficient Chaotic Interleaving with
Convolution Encoder and Decoder for Simplicity in LTE System”, International Journal of Networks and
Communications
• Mohsen A.M. El-Bendary , “Developing Security Tools of WSN and WBAN Networks Applications”, Springer Japan
2015
• O Eriksson, “Error Control in Wireless Sensor Networks A Process Control Perspective ”, UPPSALA UNIVERSITY
22
Thanks for
attention!
23

More Related Content

What's hot

What's hot (13)

Hdlc ppt..
Hdlc ppt..Hdlc ppt..
Hdlc ppt..
 
Integrating research and e learning in advance computer architecture
Integrating research and e learning in advance computer architectureIntegrating research and e learning in advance computer architecture
Integrating research and e learning in advance computer architecture
 
HDLC
HDLCHDLC
HDLC
 
Ocr using tensor flow
Ocr using tensor flowOcr using tensor flow
Ocr using tensor flow
 
Term paper presentation
Term paper presentationTerm paper presentation
Term paper presentation
 
Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...
 
TDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor NetworkTDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor Network
 
Sparse inverse covariance estimation
Sparse inverse covariance estimationSparse inverse covariance estimation
Sparse inverse covariance estimation
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
High-level Data Link Control
High-level Data Link Control High-level Data Link Control
High-level Data Link Control
 
Glsv00dare
Glsv00dareGlsv00dare
Glsv00dare
 
PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation
PointNet: Deep Learning on Point Sets for 3D Classification and SegmentationPointNet: Deep Learning on Point Sets for 3D Classification and Segmentation
PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 

Similar to Lower complexity of secured WSN

Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
IAEME Publication
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication system
Iaetsd Iaetsd
 

Similar to Lower complexity of secured WSN (20)

Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Co35503507
Co35503507Co35503507
Co35503507
 
Compressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor NetworkCompressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor Network
 
IRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA Cryptography
 
DSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps ModemDSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps Modem
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKPERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication system
 
Neural network based identification of multimachine power system
Neural network based identification of multimachine power systemNeural network based identification of multimachine power system
Neural network based identification of multimachine power system
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Lower complexity of secured WSN

  • 1. Lower Complexity of secured WSN Networks Realized by AISSA BEN YAHYA
  • 2. PLAN Introduction Error Control Scheme basics Interleaving techniques Cryptography using chaos Chaotic interleaver conclusion 2
  • 4. Introduction data-length complexity and the computational complexity of processed data and error control schemes, are essential points in system design 4
  • 7. Automatic Repeat Request (ARQ) Packet is retransmitted if it is found to have errors. Error control schemes Forward Error Correction (FEC) FEC or channel coding is a method used to increase the performance of error control 7
  • 9. Interleaving techniques  The interleaving idea is utilized to limiting the need of complex error control schemes  In addition to FEC it keeps the channel security 9
  • 10. Interleaving definition  Interleaving is a periodic and reversible reordering of blocks of L transmitted symbols  Interleaving is used to disperse error bursts that may occur because of non-stationary channel noise that may be localized to a few dimensions 10
  • 11. Interleaving latency  the latency parameter is defined as the difference between maximum and minimum delay of the interleaver 𝑑 = 𝑑 𝑚𝑎𝑥 − 𝑑 𝑚𝑖𝑛 11
  • 13. The propertie of Chaos Sensetivity to initial conditions (butterfly effect) means that when a chaotic map is iteratively applied to two initially close points, it iterates quickly diverge, and become uncorrelated in the long term 13
  • 14. One Dimensional Chaotic Map the logistic map is given by as: 𝑋 𝑛+1 = 𝑟𝑋 𝑛 (1 − 𝑋 𝑛) 14
  • 15. Two Dimensional Chaotic Map The discretized map can be represented for an RxR matrix as follows: 𝐵 𝑟1, 𝑟2 = 𝑅 𝑛𝑖 𝑟1 − 𝑅𝑖 + 𝑟2 𝑚𝑜𝑑 𝑅 𝑛𝑖 , 𝑛𝑖 𝑅 𝑟2 − 𝑟2 𝑚𝑜𝑑 𝑅 𝑛𝑖 + 𝑅𝑖 15
  • 16. Place your screenshot here 16 Chaotic encryption of an 8x8 square matrix R = 8 The secret key 𝑆 𝑘𝑒𝑦 = 𝑛1, 𝑛2, 𝑛3 = 2,4,2
  • 18. Row-Column interleaver 18 In this interleaver, data are written to its memories row-by-row and then read from them column-by-column
  • 19. Chaotic interleaver In the following, the two dimensional chaotic Baker map based is utilized as an efficient interleaving technique. 19
  • 21. The interleaving techniques which are based on the encryption data tools. presents powerful randomizing engine, furthermore, it enhances the wireless link security.
  • 22. References • M. E. Abd Elhameed, M. A. M. El-Bendary, E. O. Begheet, H. M. Abd Elkader, “An Efficient Chaotic Interleaving with Convolution Encoder and Decoder for Simplicity in LTE System”, International Journal of Networks and Communications • Mohsen A.M. El-Bendary , “Developing Security Tools of WSN and WBAN Networks Applications”, Springer Japan 2015 • O Eriksson, “Error Control in Wireless Sensor Networks A Process Control Perspective ”, UPPSALA UNIVERSITY 22