Next Article in Journal
CLSQL: Improved Q-Learning Algorithm Based on Continuous Local Search Policy for Mobile Robot Path Planning
Previous Article in Journal
Two-Stage Channel Estimation for Semi-Passive RIS-Assisted Millimeter Wave Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs

1
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan 250014, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(15), 5909; https://doi.org/10.3390/s22155909
Submission received: 13 June 2022 / Revised: 16 July 2022 / Accepted: 25 July 2022 / Published: 7 August 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
Body to body networks (BBNs) are a kind of large-scaled sensor network that are composed of several wireless body area networks (WBANs) in the distributed structure, and in recent decades, BBNs have played a key role in medical, aerospace, and military applications. Compared with the traditional WBANs, BBNs have larger scales and longer transmission distances. The sensors within BBNs not only transmit the data they collect, but also forward the data sent by other nodes as relay nodes. Therefore, BBNs have high requirements in energy efficiency, data security, and privacy protection. In this paper, we propose a secure and efficient data transmission method for sensor nodes within BBNs that is based on the perception of chaotic compressive sensing. This method can simultaneously accomplish data compression, encryption, and critical information concealment during the data sampling process and provide various levels of reconstruction qualities according to the authorization level of receivers. Simulation and experimental results demonstrate that the proposed method could realize data compression, encryption, and critical information concealment for images that are transmitted within BBNs. Specifically, the proposed method could enhance the security level of data transmission by breaking the statistical patterns of original data, providing large key space and sensitivity of the initial values, etc.

1. Introduction

With the thriving of technologies that relate to telecommunications, sensors and networks, the traditional internet with servers, personal computers, and cell phones acting as interconnection entities have been gradually transforming into the Internet of things (IoT), which connects vehicles, electric appliances, even human bodies and aims to realize the interconnection of everything. In order to achieve telemedicine, wireless body area networks (WBANs), for example, which represent the internet of human beings, implant specific sensors on the surface of or even in the body of individuals [1,2,3,4].
Recently, apart from medical service and health care, WBANs also have the possibility of applications in military and aerospace fields, such as being applied to monitor vital signs of soldiers or astronauts and to implement first aid treatments. During routine training, WBANs could guard trainees by means of collecting training data and adjusting the training intensity. In military actions, WBANs could assist in developing attackers and defenders’ strategies through monitoring body postures of both our armies and the opponents. On battlefields, WBANs could contribute to communications between soldiers as well as to data deliveries to commanders in the base. In addition, WBANs could provide help in monitoring physical status and positions of soldiers by embedding monitor sensors into military uniforms. Generally speaking, WBANs play an essential role in enhancing the accuracy, survivability, and connectivity in virtually every aspect of military operations. In addition, WBANs could be deployed along with astronauts, and by equipping space capsules with WBAN sensors, important data that concern space research as well as physical status information are transmitted from space to control centers through satellite channels. Such space applications broaden the scope where WBANs may exert themselves.
The WBAN sensors embedded in human bodies can gather a wide range of vital signs, such as heart rates, blood pressures, electroencephalograms (EEGs), electrocardiograms (ECGs), and so forth [5], and some compressive sensing based methods have already been proposed to deal with such signals [6,7]. The WBAN sensors send data they collect to monitoring centers, and thus distant diagnosis could be carried out and proper solutions may be proposed based on the data received. Because the transmission distances of WBAN sensors are limited, commonly, WBANs need the aid of additional typical network infrastructures to transmit data. For example, sensor nodes within WBANs that are distributed in various parts of individual bodies first send the data they collect to mobile phones, computers, satellites, or other types of terminals, and then these terminals transmit these data to monitoring centers or remote databases through Internet or satellite channels. WBANs are also sought after as they have expanded the service scope of traditional medical services that need specific time and workplaces and helped to realize a real-time and mobile mode of medical services.
Apart from limited transmission distances, the WBANs that concern military or space technologies and medical applications often have a limited number of participant entities. When accompanied with the extension of application scopes, being applied in occasions such as major sport events, military actions, or disaster rescues, for instance, WBANs are required to be transferred from centralized data communication modes to distributed ones, and therefore body to body networks (BBNs) are gradually formed. BBNs can be regarded as extended WBANs, that is, multiple WBANs are interconnected with each other to generate a BBN. As a result, entities within WBANs could not only interact with other nodes in the same WBAN, but could also communicate across different WBANs, namely, WBANs can communicate with each other.
As shown in Figure 1, a BBN that consists of three WBANs is used to monitor vital signs of human beings, battlefield environment data, enemy intelligence, and other information, and such information could be exchanged between WBANs or to be sent to remote control centers. At the same time, in the light of the control signals and feedback commands that are transmitted from remote control centers, soldier nodes could be timely administered and arranged, so that efficient military operations are realized. The data gathered by BBNs vary along with the changes in environment and location. The information monitored by BBN sensors, such as human postures and vital signs, is sent by wireless networks and contributes to drawing up operation plans and making decisions, for example, timely evacuation commands could be instructed beforehand as a result of certain discoveries found in data transmitted by BBNs, so as to avoid unnecessary casualties or economic loss.
Moreover, compared with WBANs, BBNs often have larger network scales, longer transmission distances, and wider transmission ranges. Sensor nodes within BBNs not only transmit data caught by themselves, but also forward data collected by other nodes, and such a process causes massive energy consumption. However, BBN sensors are frequently battery-powered, and batteries that are installed on the surface of human bodies or even embedded in the body of individuals are inconvenient to be recharged or replaced. When battery power is exhausted, BBN nodes tend to lose efficiency. Therefore, it is critical to settle energy saving issues when designing data transmission schemes within BBNs, and a practical measure could be to reduce the amount of communication data by compressing the data to be transmitted.
Another difficulty to be overcome is to address eavesdropping problems within BBNs. Because BBNs commonly use wireless transmission technology, network links throughout BBNs may be open and vulnerable to eavesdropping. In particular, such networks are often teeming with private data related to human bodies or confidential information concerning militaries, space technologies, etc. Therefore, in the process of BBN data transmission, an encryption scheme is a must to prevent eavesdroppers from obtaining sensitive information so that the security level of data transmission is enhanced. Furthermore, in order to avoid the potential risk brought by the ownership of a master key that is solely possessed by a single node in the network of the cryptosystem, a certain security protection mechanism is needed. For example, it is necessary to ensure that the secret information carried by original signals will not be disclosed when the person who carries critical data is arrested by enemies. A feasible method is concealing critical information in original signals by means of hierarchical authorization for multilevel receivers. At present, the encryption and compression processes of common schemes are independent. Another issue is, when processing images or videos by sensor nodes within BBNs or WBANs, their storage or computing resources barely meet the requirements of the energy, computing, or other resource consumption level brought by the introduction of classical encryption algorithms. How to accomplish data compression, encryption, and critical information concealment efficiently becomes a burning issue to be addressed.

2. Related Work

This section briefly summarizes the medical and military applications of BBNs, resource consumption and security problems faced by sensor nodes in BBNs, and recent progress in the research of compressive sensing (CS) theory.
In recent years, BBNs have already developed a number of applications for medical services and health care. The CodeBlue project launched by Harvard University attempted to achieve multi-hop transmission through routing nodes in WBANs [8]. A project called the Advanced Health and Disaster Aid Network [9], which applied WBANs in disaster rescues, could only allow a rather limited number of sensors taking part in the communication process due to restrictions of the bandwidth. A. Milenkovic et al. proposed a Wearable Health Monitor System [10], in which a large-scale WBAN for health monitoring was deployed, but the performance of this system was impacted by energy consumption issues.
There are also a number of research achievements in military applications of BBNs. At Walter Reed Army Medical Center (WRAMC), research on supplementary treatments involving cell phones as tools for diabetes treatment was conducted [11], and this could have a profound impact on the outcome of remedies for the elderly and patients with diabetes or other chronic diseases by introducing WBANs in remote health monitoring. Emeka E. Egbogah et al. proposed a cost-efficient data transmission method to meet the demands of monitoring soldiers’ vital signs [12]. This method reduced the energy consumption of WBANs worn by soldiers through the means of formulating and solving two optimization problems.
Currently, WBANs and BBNs offer new possibilities for improving the performance of individuals and teams in terms of military operations. For instance, WBANs could play a fundamental role in preventing critical information from being stolen by enemies [13]. In this paper, in order to avoid threats generated by the single node problem, a group of sensors were deployed to collect important information about the circumstances and nearby new actions, and, at the team level, the information gathered by sensors could enable commanders to coordinate tasks with team members. Singh D. et al. visualized a military health service platform and designed a model based on semantic edge [14]. Salayma M et al. proposed a new military medical application that could assess the level of soldier fatigue and combat readiness, so as to protect staff in uniform [15].
Aiming at secure and efficient data transmission within BBNs, some solutions are raised. Several energy harvesting methods are proposed in [16,17,18,19]. Energy harvesting means that nodes within BBNs collect or generate power from human bodies or other sources to supplement the batteries of sensors. The batteries may be charged by bioenergy or energies generated from body heat, vibration, or friction of movement, etc. However, such energy harvesting functions always add specific circuits to the hardware of BBN sensors, such as energy collectors or power management circuits. In this way, the costs of sensor nodes are increased, which may be detrimental to widespread deployment of BBNs. For energy saving, Zhang C et al. proposed a novel medium access control (MAC) protocol with the function of reducing power consumption [20]. In [21,22,23], efficient routing protocols suitable for BBNs were designed, and several energy optimization and control algorithms were proposed in [24,25].
To account for security, there have been several proposed schemes. S. Al-Janabi et al. presented a solution for encryption and authentication processes in the link layer of BBNs and proposed a security suite based on IEEE 802.15.6 standard [26]. X. Liu et al. offered an information security management system for WBANs to ensure data confidentiality and integrity [27]. A key generation method that introduced attributes of wireless channels of BBNs was raised in [28]. L. Wu et al. purveyed an anonymous authentication method for BBNs, which could resist man-in-the-middle attacks [29]. Finally, in [30], H. Zhu et al. applied homomorphic encryption to BBNs to realize data collection and query without the neglect of privacy protection.
The following paragraphs contain a brief introduction of the main research progress in (compressive sensing) CS. CS theory is a signal sampling and compression theory that was first proposed by Tao in 2006 [31,32,33]. Once put forward, this theory has been widely used in telecommunications, networks, signal processing, radars, aviation, biomedical applications, etc. CS does not merely address the problem of data compression. It also achieves data encryption simultaneously. Such characteristics may meet the requirements of data compression and encryption of sensor networks. Noticeably, CS can realize data compression and encryption in solely one step [34,35,36]. Peng et al. improved the generation process of the measurement matrix and enhanced the security level of data transmission by introducing chaotic systems, but concealing critical information was not considered [37]. Mehmet Yamaç et al. combined CS and data hiding, although their scheme has not achieved the acme of perfection in terms of resisting statistical attacks [38].
To the best of our knowledge, research on BBNs commonly considers data security, energy efficiency, and critical information concealment issues separately. Although a proportion of existing CS based schemes could accomplish data encryption and compression at the same time, or could realize efficient data transmission to a certain extent, they did not address the problems that concerns critical information concealment.
According to the characteristics of BBNs and the above-mentioned issues to be settled, this paper proposes a secure and efficient data transmission method based on the chaotic CS model and there are three main contributions.
(1) For the purpose of achieving energy efficiency, it should be considered that the capacity of batteries installed on BBN sensors is fairly limited, and recharging or replacing these batteries are often not convenient, especially when the batteries have been implanted into human bodies. And because of the expansion of network scales, the complexity of natural or external environments, or the huge volume of data to be transmitted, power of BBN batteries may consume fast. So, energy saving issues become a must while designing data transmission schemes applied in BBNs. Based on CS theory, this paper gives an efficient data transmission method, which completes data compression, encryption and critical information concealment simultaneously.
(2) For the purpose of realizing transmission security, it should be considered that the majority of data transmitted in BBNs may contain confidential sections, especially when the data concern vital signs of human beings or personal information. Especially, while being applied to medical care or military affairs, BBNs highly probably transmit a substantial amount of data involving critical or private information. On the one hand, under complex circumstances of the real world, open links may be vulnerable to be eavesdropped, which may lead to critical information leaking or other problems. Moreover, even if data are transmitted solely in internal channels, secure data transmission scheme is also imperative, since data may be forwarded several times and these processes may generate many copies of original signals involving critical information. Based on chaos theory, this paper designs a novel secure data transmission method, which could enhance the security level of data transmission by breaking the statistical patterns of original data, providing large key space and sensitivity of the initial values, etc.
(3) For the purpose of enhancing flexibility, the proposed method considers from two aspects. For data senders, the proposed method can flexibly control the proportion and the quantity of sections to be concealed which may contain critical information, according to different scenarios and application requirements. For example, the transmitted information can be concealed completely by senders without affecting the data recovery quality. In addition, senders could select independently only one or more sections to be concealed. For the data receivers, the information they could obtained varied according to their authorization levels. For instance, the receivers with the restricted authorization could only achieve the very part of data without critical information, while the receivers with the full authorization could recovery nearly intact original information.

3. Preliminaries

3.1. Compressive Sensing

Compressive sensing is a signal processing method that was proposed in [31]. It represents original signals in dimensionally reduced values that are called observational values. Suppose the original signal is s R N , and it has a sparse compressible representation in a basis Ψ R N × N , that is x = Ψ s , where x R N is a k-sparse vector, namely, there is at most k of its entries that are nonzero, and in this paper we consider that Ψ is an orthogonal matrix ( Ψ Ψ T = I N × N , Ψ T Ψ = I N × N ). The compressive sensing process is then taken as
y = A s
where A R M × N ( M < N ) is the measurement matrix and y R M consists of measurement values, also named observational values.
We then obtain
y = A Ψ Ψ T s = A Ψ T x = Φ x
where the matrix Φ = A Ψ T is the sensing matrix, and the sensing matrix should satisfy the condition proposed by Candès and Tao in [32,33].
A matrix Φ satisfies the restricted isometry property (RIP) of order k if there exists a δ k ( 0 , 1 ) such that
( 1 δ k ) x 2 2 Φ x 2 2 ( 1 + δ k ) x 2 2
holds for all x k , where k = { x : x 0 k } denotes the set of all k-sparse vectors in R n .
From Equation (3), we can also infer that, satisfying the rule of RIP with order 2 k , the measurement matrix Φ approximately preserves the distance between any two k-sparse vectors, which is essential to noise robustness [39].
There are many methods to reconstruct the original signal s from the measurement values, and orthogonal matching pursuit (OMP) [40] is one of the simplest greedy approaches to accomplish CS reconstruction. The OMP algorithm first finds the column of A that is most correlated with the measurements and then repeats this step by correlating the columns with the residual signal, which is achieved by subtracting the contribution of a partial estimate of the signal from the original measurement vector.

3.2. Chaotic System and Chaotic Compressive Sensing

Chaos, which is also called non-linear dynamics, is a seemingly irregular movement with internal randomness that occurs in a deterministic system. Chaotic systems are characteristic of internal randomness, sensitive dependence on initial conditions, boundedness, aperiodicity, and ergodicity. Tent and logistic systems are two typical chaotic systems and are defined as follows.
Based on tent system Equation (4), we can get a chaotic sequence z l , l = 1 , 2 , 3 ,
z l + 1 = z l / b , 0 < z l < b ( 1 z l ) / ( 1 b ) , b < z l < 1
where b , 0 < b < 1 is the chaotic parameter and z 0 is an initial value.
Simultaneously, another chaotic sequence z l , l = 1 , 2 , 3 , with the chaotic parameter μ and an initial value z 0 as inputs, could be generated by logistic system Equation (5),
z l + 1 = μ z l ( 1 z l ) , μ ( 0 , 4 ]
As we noted above, the compressive sensing measurement matrices should be chosen specifically, in order to guarantee the quality of reconstruction. L. Yu et al. presented that chaotic matrices could satisfy RIP and perform as well as Gaussian random matrices and Bernoulli random matrices when they act as compressive sensing measurement matrices [41].

4. Proposed Method

This section presents the details of the proposed method, and Figure 2 illustrates its main processing procedures. On the senders’ side, to begin with, a chaotic matrix is generated, which acts as the CS measurement matrix. At the same time, a concealing matrix is generated according to the critical sections of the original signal. Next, CS is processed in order to accomplish data compression, encryption, and critical information concealment through a single step. Last, the encrypted and concealed signal is masked by a chaotic matrix for the preparation of transmission through an open or insecure channel. On the receivers’ side, reconstruction procedures are processed by restricted-authorized receivers and full-authorized receivers separately. Restricted-authorized receivers who merely possess key A can obtain signals with critical sections concealed. Full-authorized receivers who possess both key A and key H can achieve the entire original signals that contain critical information. In addition, it should be noted that eavesdroppers could obtain little useful information, even if they manage to catch the processed signals by some malicious means.
As shown in Figure 2, there are four roles in the proposed method.
  • Senders process data compression, encryption, and concealment procedures based on CS theory and then mask the processed data to be transmitted. A typical sender in the proposed method could be a sensor within BBNs, which is possibly mobile electronic equipment linked to local area networks (LANs) or wide area networks (WANs).
  • Receivers with restricted authorization only possess key A, that is to say, they could merely reconstruct the portions of the original signals without critical information.
  • Receivers with full authorization possess both key A and key H, in other words, they could realize the original signals that contain critical information after the reconstruction procedure.
    Characteristically, receivers in the proposed method could be sinks or fusion nodes within BBNs or servers that may be deployed in data centers, etc.
  • Eavesdroppers may listen to the transmission channels for the purpose of catching available information. Attackers between senders and receivers, for example, are likely to intercept network flows and obtain all or just part of transmitted data.
The details of operations are as follows.

4.1. On the Senders’ Side

The operations of senders enable data compression, encryption, critical information concealment, and masking before data transmission.

4.1.1. Generation of Chaotic Matrices

Chaotic sequences are used to generate measurement matrices and concealing matrices, and, to increase the security level of the proposed method, we use two heterogeneous chaotic systems to generate measurement matrices and concealment matrices separately. Here, we choose the tent system for measurement matrix generation and the logistic system for concealing matrix generation. Other chaotic systems, the Chebyshev system for instance, can also be used to generate such deterministic matrices.
Based on tent equation Equation (4), we get a chaotic sequence z l , l = 1 , 2 , 3 . Simultaneously, another chaotic sequence z l , l = 1 , 2 , 3 could be generated by logistic equation Equation (5).
Next, a measurement matrix teeming with chaotic sequences could be generated with the following two steps:
Step 1: After the chaotic sequence z l is generated, we sample this sequence using the sampling initial position n 0 and sampling distance d. Therefore, the sampled sequence x n is obtained as Equation (6).
x n = z n 0 + n d , n = 1 , 2 , 3
Step 2: We arrange the elements in the sampled sequence to generate a matrix whose order is M × N with some mapping relationships, and the formed matrix can be used as the CS measurement matrix. The following mapping function is available, but is not limited to,
a i j = x i ( n 1 ) + j , n = 1 , 2 , 3
where the measurement matrix is A R M × N ( M < N ) and a i j is the entity in matrix A with a position of row i th and column j th .
Similarly, a concealing matrix could be generated based on chaotic sequence z l , l = 1 , 2 , 3 . Suppose s R N is a k-sparse discrete signal that contains critical information, and j indicates the row number of elements in s. We define a set C that consists of the critical entities that are contained in s and then can get a concealing matrix H using the function as below:
h i j = 0 , i f s j C z i a i j , i f s j C
where the concealing matrix is H R M × N and h i j is the entity in H with a position of the ith row and the jth column.

4.1.2. Data Compression, Encryption, and Critical Information Concealment

The step given in Equation (9) simultaneously completes the processes including data compression, encryption, and critical information concealment.
y e = ( A + H ) s
where y e R M × 1 is the compressed, encrypted, and concealed signal.
Easily, it can be deduced that,
y e = ( A + H ) Ψ T x = Φ * x
where Φ * = ( A + H ) Ψ T acts as the sensing matrix that will be used to reconstruct the signal x through the OMP algorithm by receivers with full authorization.
We can also rewrite Equation (9) as below:
y e = A Ψ T x + H Ψ T x = Φ x + ϵ
where ϵ = H Ψ T x denotes noise. The matrix Φ = A Ψ T acts as the sensing matrix that will be used to reconstruct the signal x through the OMP algorithm by receivers with restricted authorization.

4.1.3. Masking

A chaotic masking method is introduced to ensure the processed signal meet mainstream security benchmarks concerning image encryption. As a result, the proposed method could prevent malicious attacks to some extent by breaking the statistical patterns of original data, providing large key space and sensitivity of the initial values, etc.
After the compressed, encrypted, and concealed signal y e is obtained, we mask it with a chaotic sequence before data transmission. Here the matrix A, which is generated by Equation (7), is suggested to be partially reused for masking with the consideration to save computing power and energy consumption.
The masking process is shown in Equation (12).
y c = α y e + β a
where parameters α , β are added to adjust masking magnitud, e and a is a column of matrix A. Apparently, the chaotic matrix A can be expanded using the chaotic sequence according to the method depicted in Equation (6) if the columns are exhausted when masking.

4.2. On the Receivers’ Side

The operations done by receivers rely on secret keys that contain generation information of matrix A and matrix H. The reconstruction processes of original signals with and without critical information are carried out, respectively, by full-authorized receivers and restricted-authorized receivers. Restricted-authorized receivers could merely obtain the data without critical sections, whereas the full-authorized receivers could recover the complete data.

4.2.1. Receivers with Restricted Authorization

For restricted-authorized receivers, they only possess key A that contains parameters to generate the measurement matrix A, and this key behaves as a symmetric decryption key. The details of the data reconstruction process are shown as below.
Step 1: To begin with, from Equations (11) and (12), we can get the transformed encrypted and concealed signal y c R M × 1 as Equation (13).
y c = y c β a α = Φ x + ϵ .
Step 2: The OMP algorithm could be exploited to obtain the estimate of x , and here x represents the concealed form of x.
x = a r g m i n x x 1 s u b j e c t t o y c = Φ x = A Ψ T x
Step 3: Finally, an inverse transformation of x = Ψ s is performed to obtain the estimate of the concealed form of s .
s = Ψ T x

4.2.2. Receivers with Full Authorization

For fully authorized receivers, they not only possess key A that contains parameters to generate the measurement matrix A, but also possess key H that contains parameters to generate the concealing matrix H, and these two keys work together as symmetric decryption keys. The details of data reconstruction process are shown as below.
Step 1: To begin with, from Equations (10) and (12), we can get the transformed encrypted and concealed signal y c R M × 1
y c = y c β a α = Φ * x .
Step 2: The OMP algorithm could be exploited to obtain the estimate of x.
x = a r g m i n x x 1 s u b j e c t t o y c = Φ x = ( A + H ) Ψ T x
Step 3: Finally, an inverse transformation of x = Ψ s is performed to obtain the estimate of the original signal s.
s = Ψ T x
Eavesdroppers may manage to complete the same operations as normal receivers after they capture transmission data that are processed by the proposed method. However, because they do not possess secret keys, which act as essential resource for reconstruction, they cannot obtain the available information sent by senders. When considering the key distribution issue that could be applied in IoT, there are several existing solutions [42,43,44]. Therefore, such issues are not discussed in this paper.

5. Feasibility Analysis

This section contains two parts. First, we demonstrate the feasibility of the proposed method theoretically. Because the reconstruction process of full-authorized receivers is rather similar to the reconstruction process of traditional compressive sensing, in this section, we only discuss the feasibility of the reconstruction of restricted-authorized receivers. In the second part, we conduct experiments to verify that the proposed method is practically feasible.
To explicitly explain the processes of critical information concealment and retrieval, we expand Equation (9) in the following way, and assume that s p is the element that involves critical information.
y e 1 y e 2 y e 3 y e M = a 11 a 12 a 13 a 1 N a 21 a 22 a 23 a 2 N a M 1 a M 2 a M 3 a M N +
0 0 z 1 a 1 p 0 0 0 z 2 a 2 p 0 0 0 z M a M p 0 s 1 s 2 s p s N = a 11 a 12 ( 1 z 1 ) a 1 p a 1 N a 21 a 22 ( 1 z 2 ) a 2 p a 2 N a M 1 a M 2 ( 1 z M ) a M p a M N s 1 s 2 s p s N
Let w i = 1 z i = w + Δ i , i = 1 , 2 , 3 , M , then Equation (19) can be rewritten as follows:
y e 1 y e 2 y e 3 y e M = a 11 a 12 a 13 a 1 N a 21 a 22 a 23 a 2 N a M 1 a M 2 a M 3 a M N s 1 s 2 w s p s N +
0 0 Δ 1 w a 1 p 0 0 0 Δ 2 w a 2 p 0 0 0 Δ M w a M p 0 s 1 s 2 w s p s N
To further simplify the discussion, we assume that all Δ i = 0 , i = 1 , 2 , 3 , M , so we get,
y e = A s
where s = s 1 s 2 w s p s N , s R N × 1 . When restricted-authorized receivers use the OMP algorithm with the input y e and A, they obtain the signal s as a result.
For the normal case, if at least one Δ i 0 , then Equation (21) could be rewritten as,
y e = ( A + Δ A ) s
where Δ A = 0 0 Δ 1 w a 1 p 0 0 0 Δ 2 w a 2 p 0 0 0 Δ M w a M p 0 , and, as explained in [45], no reduction in the reconstruction can be achieved when the noise added to the measurement matrix is not arbitrarily large. Clearly, the boundedness characteristic of chaotic systems is an additional prerequisite of the successful reconstruction of signal s .
We conduct a substantial number of experiments to verify the feasibility of the proposed method from a practical perspective. The results of several experiments using pictures from MATLAB R2020b image library are reported in Figure 3, along with the values of peak signal-to-noise ratios (PSNRs, dB) recorded in Table 1.
By observing the second and fourth columns of Figure 3, it is crystal clear that the assumed critical information in the original images is concealed, and other information contained in the original signals is reconstructed successfully. Simultaneously, from the third and fifth columns of Figure 3, we can obtain vivid reconstructions of the entire image without any concealment.
The PSNR values that are calculated based on pixels of the original images and the reconstructed images from red, green, and blue channels are listed in Table 1. From these figures, we surmise that, although the values of PSNR varies due to the difference between images and compression rates, all the PSNR values exceed 30 dB, which could be regarded as a benchmark for acceptable image reconstruction qualities.
From Figure 4, we see that flexibility is achieved in terms of concealing portions and the number of concealed sections, and the related PSNR values in Table 2 all exceed 30 dB, which represents an acceptable quality of image reconstruction.

6. Robustness Analysis

To discuss the influence of noise during transmission and the robustness of the proposed method, the impact of random noise is analyzed. Here we assume that the noise in the transmission channel is white Gaussian noise, and from Equation (12) we get,
y c = α y e + β a j + δ G
where δ G R M × 1 is a vector conformed to white Gaussian noise.
Figure 5 reports the reconstruction results under the impact of white Gaussian noise with different values of noise power. Table 3 lists the PSNR values under the circumstance with white Gaussian noise.
From Figure 5 and Table 3, we find that noise does have an impact on the quality of image reconstruction as well as the PSNR values. With increasing noise power, the impact gradually becomes stronger. When the power of noise is below 15 dBW, the quality of image reconstruction is almost unaffected, and the PSNR values decrease slightly, although they are still above 30. When the power of noise has reached 35 dBW, the quality of image reconstruction is still tolerable, although the values of PSNR are noticeably below 30. When the power of noise is higher than 40, the quality of image reconstruction seriously decreases, and the PSNR values also reduce significantly.

7. Security Analysis

After original signals are processed by the proposed method, even if attackers obtain the transmitted data, that is Y c , by some sort of deviousness, it is highly likely that they cannot achieve the original signals under the current computing power level in a tolerable time duration, because in the proposed method signals are encrypted with a tremendous key space. Attackers could obtain very little useful information, because the signals operated by the proposed method leak very few statistics messages.

7.1. Chaotic Compressive Sensing Security Analysis

In a classical cryptosystem, assume the plaintext is p, the ciphertext is c, if P ( c ) = P ( c | p ) , then the cryptosystem is considered to be secure [46]. For modern cryptosystems, they are often designed to be computationally secure. Namely, the cryptosystem could not be broken by existing sophisticated tools within polynomial time. Specifically, if an encryption scheme is sensitive to initial conditions and has tremendous secret key space, then we regard such an encryption scheme as a secure encryption scheme [47].
Chaotic systems are famous for sensitive dependence on initial conditions. When this characteristic is applied to encryption, it behaves as an entirely different decryption result, even if the secret key changes only slightly.
Figure 6 shows that, after a slight change is applied on the initial value of the chaotic sequence, that is z 0 , the experimental reconstruction results greatly change.
In the proposed method, there are four parameters participating in generating chaotic measurement matrices. The secret key A, which must be used by either restricted-authorized receivers or full-authorized receivers, is determined by chaotic parameter b, initial value z 0 , initial position n 0 , and sampling distance d. Accordingly, we define K b , K z , K n , K d , and the key space K is,
K = K b × K z × K n × K d .
Suppose we use a 32-bit processor in which the data precision of a double-precision floating point type is 16 significant digits after the decimal point, and suppose K n and K d are 100 and 10, respectively, then we can calculate from Equation (24) that K 10 35 (See Table 4). Such a number could be enlarged by adjusting the value ranges of the parameters. For instance, if we change the value range of K d from [1, 10] to [1, 100], then the key space will be increased 10 times. In addition, increasing the precision of numbers that participate in operations could also be helpful to enlarge the key space of the proposed method. However, such an operation may increase the running time and complexity of the proposed method. Therefore, there should be a compromise when setting the range and number precision of parameters, according to the security and efficiency requirements.

7.2. Pixel Distribution Analysis

Statistical analysis attacks mean that attackers try to obtain the secret key by analyzing the statistical rules or patterns divulged from encrypted signals and their relevant original signals. In the Internet or wireless network environment, attackers might easily listen to the network flows to capture ciphertexts, which contain signal Y c of the proposed method. These malicious or just curious attackers might sum up the statistical laws and patterns revealed by the resource they have obtained and manage to extract the transformation relationships between plaintexts and ciphertexts, so as to analyze the encryption scheme. Figure 7 reports histograms of pixel distribution that are calculated based on pixels from red, green, and blue channels of original RGB images and histograms that are calculated based on pixels from red, green, and blue channels of signal Y c , which may be transmitted through open or insecure channels.
Figure 7 implies that the pixel distribution of the original images leaks obvious statistical laws and patterns, whereas the histograms generated based on signal Y c clearly show that the pixels in such signals are distributed uniformly. It is noticeable that the histograms of pixel distribution of the original images and of signal Y c have no internal connections to each other. As is well known, the more uniform the pixel distribution is, the less statistical information the signal reveals, and the more secure the encryption scheme is.

7.3. Correlation Analysis

Correlation analysis refers to the analysis of values of two or more variables’ correlation, with the aim of measuring the correlation level between different variables. The correlation value is calculated by
r X Y = c o v ( X , Y ) D ( X ) ( D ( Y )
where X and Y represent two variables. The mathematical expectations of X and Y are E ( X ) = 1 N i = 1 N X i and E ( Y ) = 1 N i = 1 N Y i . The covariance between X and Y is c o v ( X , Y ) = 1 N i = 1 N ( X i E ( X ) ) ( Y i E ( Y ) ) . The variances of X and Y are D ( X ) = E ( X 2 ) ( E ( X ) ) 2 and D ( Y ) = E ( Y 2 ) ( E ( Y ) ) 2 .
Table 5, Table 6 and Table 7 list the correlation values of adjacent pixels of original images as well as of signal Y c . Values are calculated based on pixel pairs from horizontal, vertical, and diagonal directions, respectively.
Table 5, Table 6 and Table 7 indicate that the correlation values of adjacent pixels of original images are approximate to 1, which means that a pixel of an original image is highly likely to leak information about the pixels surround it. Taking advantage of this feature, attackers may infer or predict a pixel value according to a known pixel value next to it and then apply even more to the recovery of the whole image. In addition, it also can be seen that all the correlation values of adjacent pixels of signal Y c are nearly 0, which means that the strong correlations of pixels in the original images are broken, and, therefore, attackers could use little information about adjacent pixels to launch statistical attacks.
In addition, we randomly select 1000 pairs of adjacent pixels from the original image and related signal Y c , respectively, and record pixel values through the coordinate system to reveal the correlation of adjacent pixels in another form. Figure 8 shows the results drawn based on image llama, which implies that the correlation of adjacent pixels in the original image is rather tough and the correlation of adjacent pixels in signal Y c is very weak. Figure 9 and Figure 10 exhibit the results generated by pixel pairs of image car, image football, and their related signal Y c . Similarly, points drawn according to original pictures are distributed unevenly, which indicates a high value of pixel correlation, whereas points drawn from signal Y c are distributed arbitrarily, which means the value of pixel correlation of signal Y c is rather low.
Furthermore, we calculate the correlation of the pixels with exactly the same position chosen from the critical section of the original image and from its concealed form, and the results are reported in Table 8. All the values in Table 8 are extremely close to 0, which implies that the correlations of pixels between the original and concealed sections are low. In other words, the critical information in the original image is well protected.

7.4. Image Entropy Analysis

Commonly, entropy is defined to judge whether the complexity or randomness is strong enough. Information entropy plays an essential role in measuring randomness of information. Image entropy can act as a reference index of information randomness of an image. Each pixel in either channel r, channel g, or channel b of an RGB image has an intensity value or gray value between 0 to 255, and the ideal entropy value of such encrypted message is 8, which means that the information that is contained in such a massage is arbitrary. High values of image entropy also represent that the ability to resist statistical analysis. We use Equation (26) to calculate image entropy.
H ( x ) = i = 1 L P ( x i ) log 2 P ( x i )
where x i 1 , 2 , 3 , , L represents the gray value of pixels, and P ( x i ) , 0 P ( x i ) 1 , i = 1 L P ( x i ) = 1 is the probability of gray value x i .
Table 9 lists the experimental results of information entropy of both original images and signal Y c , and it implies that all the values calculated based on signal Y c are approaching 8, albeit with various entropy values of original images.

8. Discussion

In this section, we compare the compression performance of the proposed method with some recently proposed CS-based image processing methods [48,49,50]. It is worth noting that here we select methods that use chaotic measurement matrices or other types of measurement matrices that are generated by deterministic means, similar to the proposed methods.
We conduct experiments using the same images used by [48,49,50]. The original images and their reconstruction results are exhibited in Figure 11. The related PSNR values are listed in Table 10. From data shown in Table 10, we can infer that, although the PSNR values vary when using different original images, the proposed method could archive similar reconstruction quality as Refs. [48,49,50], when the compression ratios reach 0.5. More importantly, the proposed method could achieve multi-level reconstruction for users in different groups. Namely, restricted-authorized users could merely reconstruct images with concealed critical information, whereas full-authorized users could reconstruct the entire images.

9. Conclusions

In this paper, we propose a secure and efficient BBN data transmission method that could accomplish critical information concealment and retrieval. Generally, BBN sensors are resource constrained, and CS-based methods are naturally suitable for these sensors, as CS can accomplish data compression while sampling, and this process just needs simple operations of addition and multiplication, which could achieve the aim of reducing energy consumption of sensors during data processing and transmitting. The experimental results show that the proposed methods could compress and encrypt the original data and render different reconstruction results to users in different authorization groups. Namely, users in restricted-authorized groups could only obtain reconstruction results with critical sectors concealed, whereas users in full-authorized groups could reconstruct entire data.
Moreover, in the proposed method, chaotic systems are introduced to generate measurement matrices, so the senders and receivers do not need to transmit the entire measurement matrices to one another, which further saves transmission energy. Specifically, the proposed method could enhance the security level of data transmission by breaking the statistical patterns of original data, providing large key space and sensitivity of the initial values, etc. The key space of the proposed method is discussed, and simulation results show that when even a slight change is applied to the initial value of the chaotic sequences, 10–15 to 10–17, for example, the experimental reconstruction results greatly change.
Last but not least, experimental results also show that the proposed method enables the senders to conceal critical information with flexibility in terms of proportions and quantities of the concealed sectors. In summary, the proposed method realizes the protection of critical information that may be transmitted within BBNs. In the future, the combination of information concealment and semi-tensor compressive sensing could be studied, in order to enhance efficiency and flexibility levels of data transmission catering to the coming requirements of appliances in BBNs and even in IoT.

Author Contributions

Conceptualization, H.P. and W.W.; methodology, W.W. and H.P.; software, W.W., H.P. and B.X.; validation, W.W., H.P., F.T., L.L. and B.X.; formal analysis, W.W., F.T., B.X. and L.L.; writing—original draft preparation, W.W. and H.P.; writing—review and editing, L.L., F.T. and B.X. All authors have read and agreed to the published version of the manuscript. Please see the CRediT taxonomy for the term explanation.

Funding

This research was funded in part by the National Key Research and Development Program of China (Grant no. 2020YFB1805402), the National Natural Science Foundation of China (Grant nos. 61972051, 62032002), BUPT Excellent Ph.D. Students Foundation (CX2022139), the Natural Science Foundation of Beijing Municipality (Grant no. M21034), the 111 Project (Grant no. B21049) and the Young innovation team of colleges and universities in Shandong province (2021KJ001).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BBNBody to Body Network
IoTInternet of Things
WBANWireless Body Area Network
EEGsElectroencephalograms
ECGsElectrocardiograms
CSCompressive Censing
WRAMCWalter Reed Army Medical Center
MACMedium Access Control
RIPRestricted Isometry Property
OMPOrthogonal Matching Pursuit
LANLocal Area Network
WANWide Area Network
PSNRPeak Signal-to-Noise Ratio

References

  1. Meharouech, A.; Elias, J.; Mehaoua, A. Future body-to-body networks for ubiquitous healthcare: A survey, taxonomy and challenges. In Proceedings of the 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), Beijing, China, 28–30 May 2015; pp. 1–6. [Google Scholar]
  2. Ullah, S.; Higgins, H.; Braem, B.; Latre, B.; Blondia, C.; Moerman, I.; Saleem, S.; Rahman, Z.; Kwak, K.S. A comprehensive survey of wireless body area networks. J. Med. Syst. 2012, 36, 1065–1094. [Google Scholar] [CrossRef] [Green Version]
  3. Albahri, O.S.; Albahri, A.S.; Mohammed, K.I.; Zaidan, A.A.; Zaidan, B.B.; Hashim, M.; Salman, O.H. Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation and recommendations. J. Med. Syst. 2018, 42, 1–27. [Google Scholar] [CrossRef] [PubMed]
  4. Ullah, S.; Shen, B.; Riazul Islam, S.M.; Khan, P.; Saleem, S.; Sup Kwak, K. A Study of MAC Protocols for WBANs. Sensors 2010, 10, 128–145. [Google Scholar] [CrossRef] [Green Version]
  5. Tobn, D.P.; Falk, T.H.; Maier, M. Context awareness in WBANS: A survey on medical and non-medical applications. IEEE Wireless Commun. 2013, 20, 30–37. [Google Scholar] [CrossRef]
  6. Daponte, P.; De Vito, L.; Iadarola, G.; Picariello, F. ECG Monitoring Based on Dynamic Compressed Sensing of Multi-Lead Signals. Sensors 2021, 21, 7003. [Google Scholar] [CrossRef]
  7. Burel, G.; Fiche, A.; Gautier, R.; Martin-Guennou, A. A Modulated Wideband Converter Calibration Technique Based on a Single Measurement of a White Noise Signal with Advanced Resynchronization Preprocessing. Electronics 2022, 11, 774. [Google Scholar] [CrossRef]
  8. Cao, H.; Leung, V.; Chow, C.; Chan, H. Enabling technologies for wireless body area networks: A survey and outlook. IEEE Commun. Mag. 2009, 47, 84–93. [Google Scholar] [CrossRef]
  9. Gao, T.; Massey, T.; Selavo, L.; Crawford, D.; Chen, B.R.; Lorincz, K.; Shnayder, V.; Hauenstein, L.; Dabiri, F.; Jeng, J.; et al. The advanced health and disaster aid network: A light-weight wireless medical system for triage. IEEE Trans. Biomed. Circuits Syst. 2007, 1, 203–216. [Google Scholar] [CrossRef] [PubMed]
  10. Milenkovic, A.; Otto, C.; Jovanov, E. Wireless sensor networks for personal health monitoring: Issues and an implementation. Comput. Commun. 2006, 29, 2521–2533. [Google Scholar] [CrossRef]
  11. Poropatich, R.; Pavliscsak, H.H.; Rasche, J.; Barrigan, C.; Vigersky, R.A.; Fonda, S.J.; Bell, A. Mobile healthcare in the US army. In Proceedings of the Wireless Health, San Diego, CA, USA, 5–7 October 2010. [Google Scholar]
  12. Egbogah, E.E.; Fapojuwo, A.O. Achieving energy efficient transmission in wireless body area networks for the physiological monitoring of military soldiers. In Proceedings of the Military Communications Conference, San Diego, CA, USA, 18–20 November 2013; pp. 1371–1376. [Google Scholar]
  13. Cavallari, R.; Martelli, F.; Rosini, R.; Buratti, C.; Verdone, R. A survey on wireless body area networks: Technologies and design challenge. IEEE Commun. Surv. Tuts 2014, 16, 1635–1657. [Google Scholar] [CrossRef]
  14. Singh, D.; Tripathi, G.; Alberti, A.M.; Jara, A. Semantic edge computing and IoT architecture for military health services in battlefield. In Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 185–190. [Google Scholar]
  15. Salayma, M.; Al-Dubai, A.; Romdhani, I.; Nasser, Y. Wireless body area network (WBAN) a survey on reliability, fault tolerance, and technologies coexistence. ACM Comput. Surv. (CSUR) 2017, 50, 1–38. [Google Scholar] [CrossRef] [Green Version]
  16. Goudar, V.; Ren, Z.; Brochu, P.; Potkonjak, M.; Pei, Q. Optimizing the output of a human-powered energy harvesting system with miniaturization and integrated control. IEEE Sens. J. 2014, 14, 2084–2091. [Google Scholar] [CrossRef] [Green Version]
  17. Khaligh, A.; Zeng, P.; Zheng, C. Kinetic energy harvesting using piezoelectric and electromagnetic technologies—State of the art. IEEE Trans. Ind. Electron. 2010, 57, 850–860. [Google Scholar] [CrossRef]
  18. Ibarra, E.; Antonopoulos, A.; Kartsakli, E.; Rodrigues, J.J.P.C.; Verikoukis, C. QoS-aware energy management in body sensor nodes powered by human energy harvesting. IEEE Sens. J. 2016, 16, 542–549. [Google Scholar] [CrossRef] [Green Version]
  19. Mosavat-Jahromi, H.; Maham, B.; Tsiftsis, T.A. Maximizing spectral efficiency for energy harvesting-aware WBAN. IEEE J. Biomed. Health Inform. 2017, 21, 732–742. [Google Scholar] [CrossRef] [PubMed]
  20. Zhang, C.; Wang, Y.; Liang, Y.; Shu, M.; Chen, C. An Energy-Efficient MAC Protocol for Medical Emergency Monitoring Body Sensor Networks. Sensors 2016, 16, 385. [Google Scholar] [CrossRef]
  21. Rajagopalan, R. Energy efficient routing algorithm for patient monitoring in body sensor networks. In Proceedings of the 13th International Conference on Wearable and Implantable Body Sensor Networks (BSN), San Francisco, CA, USA, 14–17 June 2016; pp. 141–146. [Google Scholar]
  22. Ayatollahitafti, V.; Ngadi, M.A.; Sharif, J.B.M.; Abdullahi, M. An efficient next hop selection algorithm for multi-hop body area networks. PLoS ONE 2016, 11, e0146464. [Google Scholar]
  23. Liao, Y.; Leeson, M.S.; Higgins, M.D.; Bai, C. An incremental relay based cooperative routing protocol for wireless in-body sensor networks. In Proceedings of the 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, NY, USA, 17–19 October 2016; pp. 1–6. [Google Scholar]
  24. Liu, D.; Geng, Y.; Pahlavan, K. March. End-to-end power optimization in non-homogenous relay environment for wireless body area networks (WBANs). In Proceedings of the 10th International Symposium on Medical Information and Communication Technology (ISMICT), Worcester, MA, USA, 20–23 March 2016; pp. 1–5. [Google Scholar]
  25. Sodhro, A.H.; Li, Y.; Shah, M.A. Energy-efficient adaptive transmission power control for wireless body area networks. IET Commun. 2016, 10, 81–90. [Google Scholar] [CrossRef]
  26. Al-Janabi, S.; Al-Shourbaji, I.; Shojafar, M.; Shamshirband, S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 2017, 18, 113–122. [Google Scholar] [CrossRef] [Green Version]
  27. Liu, X.; Zhu, Y.; Ge, Y.; Wu, D.; Zou, B. A secure medical information management system for wireless body area networks. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 221–237. [Google Scholar]
  28. Salehi, S.A.; Razzaque, M.A.; Tomeo-Reyes, I.; Hussain, N.; Kaviani, V. Efficient high-rate key management technique for wireless body area networks. In Proceedings of the 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, Indonesia, 25–27 August 2016; pp. 529–534. [Google Scholar]
  29. Wu, L.; Zhang, Y.; Li, L.; Shen, J. Efficient and anonymous authentication scheme for wireless body area networks. J. Med. Syst. 2016, 40, 1–12. [Google Scholar] [CrossRef] [PubMed]
  30. Zhu, H.; Gao, L.; Li, H. Secure and privacy-preserving body sensor data collection and query scheme. Sensors 2016, 16, 179. [Google Scholar] [CrossRef] [PubMed]
  31. Candes, E.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theory 2006, 52, 489–509. [Google Scholar] [CrossRef] [Green Version]
  32. Candes, E.J.; Tao, T. Decoding by linear programming. IEEE Trans. Inform. Theory 2005, 51, 4203–4215. [Google Scholar] [CrossRef] [Green Version]
  33. Candès, E.J. The restricted isometry property and its implications for compressed sensing. C. R. Math. 2008, 346, 589–592. [Google Scholar] [CrossRef]
  34. Zhou, N.; Pan, S.; Cheng, S.; Zhou, Z. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 2016, 82, 121–133. [Google Scholar] [CrossRef]
  35. Zhou, N.; Jiang, H.; Gong, L.; Xie, X. Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt. Lasers Eng. 2018, 110, 72–79. [Google Scholar] [CrossRef]
  36. Xie, D.; Li, L.; Peng, H.; Yang, Y. A secure and effificient scalable secret image sharing scheme with flflexible shadow sizes. PLoS ONE 2017, 12, e0168674. [Google Scholar]
  37. Peng, H.; Tian, Y.; Kurths, J.; Li, L.; Yang, Y.; Wang, D. Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans. Biomed. Circuits Syst. 2017, 11, 558–573. [Google Scholar] [CrossRef]
  38. Yamac, M.; Ahishali, M.; Passalis, N.; Raitoharju, J.; Sankur, B.; Gabbouj, M. Multilevel reversible data anonymization via compressive sensing and data hiding. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1014–1028. [Google Scholar] [CrossRef]
  39. Eldar, Y.C.; Kutyniok, G. Compressed Sensing (Theory and Applications); Cambridge University Press: Cambridge, UK, 2012; pp. 19–21. [Google Scholar]
  40. Mallat, S.G.; Zhang, Z. Matching pursuits with time-frequency dictionaries. IEEE Trans. Signal Process. 1993, 41, 3397–3415. [Google Scholar] [CrossRef] [Green Version]
  41. Yu, L.; Barbot, J.P.; Zheng, G.; Sun, H. Compressive sensing with chaotic sequence. IEEE Signal Process. Lett. 2010, 17, 731–734. [Google Scholar]
  42. Sun, F.; Zang, W.; Huang, H.; Farkhatdinov, I.; Li, Y. Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices. IEEE Internet Things J. 2021, 8, 1636–1650. [Google Scholar] [CrossRef]
  43. Yıldız, H.; Cenk, M.; Onur, E. PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol. IEEE Internet Things J. 2021, 8, 5682–5696. [Google Scholar] [CrossRef]
  44. Dammak, M.; Senouci, S.-M.; Messous, M.A.; Elhdhili, M.H.; Gransart, C. Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1742–1757. [Google Scholar] [CrossRef]
  45. Davenport, M. Random Observations on Random Observations: Sparse Signal Acquisition and Processing. Ph.D. Thesis, Rice University, Houston, TX, USA, 2010. [Google Scholar]
  46. Shannon, C.E. Communication theory of secrecy systems. Bell. Syst. Technol. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  47. Bansal, R.; Gupta, S.; Sharma, G. An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed. Tools Appl. 2017, 76, 16529–16562. [Google Scholar] [CrossRef]
  48. Zhou, N.R.; Zhang, A.D.; Zheng, F.; Gong, L.H. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt. Laser Technol. 2014, 62, 152–160. [Google Scholar] [CrossRef]
  49. Chai, X.; Zheng, X.; Gan, Z.; Han, D.; Chen, Y. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 2018, 148, 124–144. [Google Scholar] [CrossRef]
  50. Gong, L.; Qiu, K.; Deng, C.; Zhou, N. An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 2019, 115, 257–267. [Google Scholar] [CrossRef]
Figure 1. The network structure of a BBN. Each WBAN consists of a number of person nodes with sensors on or in their bodies. Three WBANs form a BBN and could interact with one another.
Figure 1. The network structure of a BBN. Each WBAN consists of a number of person nodes with sensors on or in their bodies. Three WBANs form a BBN and could interact with one another.
Sensors 22 05909 g001
Figure 2. The main workflow of the proposed method. The left side shows the data compression, encryption, and concealing and masking processes done by a sender. The right side shows the data demasking, decryption, and retrieving processes done by receivers. The red part in the middle represents an open or insecure channel that might leak information to eavesdroppers.
Figure 2. The main workflow of the proposed method. The left side shows the data compression, encryption, and concealing and masking processes done by a sender. The right side shows the data demasking, decryption, and retrieving processes done by receivers. The red part in the middle represents an open or insecure channel that might leak information to eavesdroppers.
Sensors 22 05909 g002
Figure 3. The first column shows the original images named trailer, hallway, kids, llama, car, and football, respectively. The second column shows the reconstructed images obtained by restricted-authorized receivers under compression rate 0.7. The third column shows the reconstructed images obtained by full-authorized receivers under compression rate 0.7. The fourth column shows the reconstructed images obtained by restricted-authorized receivers under compression rate 0.8. The fifth column shows the reconstructed images obtained by full-authorized receivers under compression rate 0.8.
Figure 3. The first column shows the original images named trailer, hallway, kids, llama, car, and football, respectively. The second column shows the reconstructed images obtained by restricted-authorized receivers under compression rate 0.7. The third column shows the reconstructed images obtained by full-authorized receivers under compression rate 0.7. The fourth column shows the reconstructed images obtained by restricted-authorized receivers under compression rate 0.8. The fifth column shows the reconstructed images obtained by full-authorized receivers under compression rate 0.8.
Sensors 22 05909 g003
Figure 4. The concealed sections in the first and second rows are 50% and 100%, respectively, and the last row shows the results of concealing two independent sections of the original image. The first column contains the original image, the second and third columns show the reconstruction results of restricted-authorized receivers and full-authorized receivers under compression rate 0.7. The fourth and fifth columns show the reconstruction results under compression rate 0.8.
Figure 4. The concealed sections in the first and second rows are 50% and 100%, respectively, and the last row shows the results of concealing two independent sections of the original image. The first column contains the original image, the second and third columns show the reconstruction results of restricted-authorized receivers and full-authorized receivers under compression rate 0.7. The fourth and fifth columns show the reconstruction results under compression rate 0.8.
Sensors 22 05909 g004
Figure 5. Reconstruction results with the impact of white Gaussian noise. The first column shows the noise with power values of 0, 5, 15, 25, 35, 40, and 50 in dBW, respectively. The second and third columns show the reconstruction results under compression rate 0.7, and the fourth and fifth columns show the reconstruction results under compression rate 0.8.
Figure 5. Reconstruction results with the impact of white Gaussian noise. The first column shows the noise with power values of 0, 5, 15, 25, 35, 40, and 50 in dBW, respectively. The second and third columns show the reconstruction results under compression rate 0.7, and the fourth and fifth columns show the reconstruction results under compression rate 0.8.
Sensors 22 05909 g005
Figure 6. The first row shows the reconstruction results using the right initial value. The second row shows the reconstruction results using the initial value that is modified 10 15 . The third row shows the reconstruction results using the initial value that is modified 10 16 . The fourth row shows the reconstruction results using the initial value that is modified 10 17 .
Figure 6. The first row shows the reconstruction results using the right initial value. The second row shows the reconstruction results using the initial value that is modified 10 15 . The third row shows the reconstruction results using the initial value that is modified 10 16 . The fourth row shows the reconstruction results using the initial value that is modified 10 17 .
Sensors 22 05909 g006
Figure 7. The first, second, and third columns show the histograms of pixel distribution that are calculated based on pixels from red, green, and blue channels of original RGB images that are named llama, car, and football, respectively. Correspondingly, the fourth, fifth, and sixth columns show the histograms of pixel distribution that are calculated based on pixels from signal Y c . The compression rate is 0.7.
Figure 7. The first, second, and third columns show the histograms of pixel distribution that are calculated based on pixels from red, green, and blue channels of original RGB images that are named llama, car, and football, respectively. Correspondingly, the fourth, fifth, and sixth columns show the histograms of pixel distribution that are calculated based on pixels from signal Y c . The compression rate is 0.7.
Sensors 22 05909 g007
Figure 8. Correlation values of adjacent pixels of image llama. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Figure 8. Correlation values of adjacent pixels of image llama. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Sensors 22 05909 g008
Figure 9. Correlation values of adjacent pixels of image car. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Figure 9. Correlation values of adjacent pixels of image car. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Sensors 22 05909 g009
Figure 10. Correlation values of adjacent pixels of image football. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Figure 10. Correlation values of adjacent pixels of image football. The first, second, and third columns are drawn based on adjacent pixels from the red, green, and blue channels of the original image, and the fourth, fifth, and sixth columns are drawn based on adjacent pixels of signal Y c . The three rows show the results calculated from horizontal, vertical, and diagonal directions, respectively. The compression rate is 0.7.
Sensors 22 05909 g010
Figure 11. The first column shows the original images named lena, cameraman, peppers, and woman, respectively. The second, fourth, and sixth columns show the reconstructed images obtained by restricted-authorized receivers under compression rates 0.75, 0.5, and 0.25, respectively. The third, fifth, and seventh columns show the reconstructed images obtained by full-authorized receivers under compression rates 0.75, 0.5, and 0.25, respectively.
Figure 11. The first column shows the original images named lena, cameraman, peppers, and woman, respectively. The second, fourth, and sixth columns show the reconstructed images obtained by restricted-authorized receivers under compression rates 0.75, 0.5, and 0.25, respectively. The third, fifth, and seventh columns show the reconstructed images obtained by full-authorized receivers under compression rates 0.75, 0.5, and 0.25, respectively.
Sensors 22 05909 g011
Table 1. PSNR values under compression rates 0.7 and 0.8 (Unit: dB).
Table 1. PSNR values under compression rates 0.7 and 0.8 (Unit: dB).
Compression Rate 0.7
ImageChannel rChannel gChannel bAverage
trailer30.5356231.5047132.4874331.50925
hallway35.4624935.7070337.1862536.11859
kids33.4134233.7325233.9856933.71054
llama32.2781932.2534432.3961632.30926
car31.8282231.7515831.7901731.78999
football31.6754131.5955431.2766831.51588
Compression Rate 0.8
ImageChannel rChannel gChannel bAverage
trailer30.1044830.3208331.7412130.72217
hallway34.8519035.3043436.4546935.53697
kids32.7323833.0613233.3781133.05727
llama31.4551231.5122831.6159931.52780
car31.4467931.2657331.2601531.32422
football30.7848630.8727330.5841330.74724
Table 2. PSNR values for various concealing sections (Unit: dB).
Table 2. PSNR values for various concealing sections (Unit: dB).
Compression Rate 0.7
Concealing SectionChannel rChannel gChannel bAverage
50%32.5979833.1396833.2380732.99191
100%36.1185836.1185836.1185836.11858
two sectors33.4134233.7325233.9856933.71054
Compression Rate 0.8
ImageChannel rChannel gChannel bAverage
50%33.3048033.6727933.9334533.63701
100%33.3325233.7515233.8650833.64971
two sectors33.4134133.7325233.9856933.71054
Table 3. PSNR values with the impact of white Gaussian noise (Unit: dB).
Table 3. PSNR values with the impact of white Gaussian noise (Unit: dB).
Compression Rate 0.7
Concealing SectionChannel rChannel gChannel bAverage
none31.45512431.51228231.61598731.527797
531.31954831.43534131.66029131.471726
1531.2228631.28454631.35715531.288187
2529.36713529.35661429.02363829.249129
3520.06142619.88126918.98806719.643587
4014.41734414.17523313.89540914.162662
508.0009548.068328.1509558.073409
Compression Rate 0.8
ImageChannel rChannel gChannel bAverage
none32.27818732.25343632.39616432.309262
532.22120432.17852432.44794132.282556
1532.01880632.04082232.22033132.093319
2530.019168p30.05869629.81634329.937519
3520.11019119.99935718.65251419.587354
4013.60266713.48005313.18343613.422052
507.630137.6792597.7808477.696745
Table 4. Secret key space analysis.
Table 4. Secret key space analysis.
Parameter NameParameter TypeValue RangeKey Space
bdouble-precision floating point ( 0 , 1 ) K b 1 × 10 16
z 0 double-precision floating point ( 0 , 1 ) K z 1 × 10 16
n 0 positive integer [ 100 , 199 ] K n = 100
dpositive integer [ 1 , 10 ] K d = 10
Table 5. Correlation values of adjacent pixels in image llama.
Table 5. Correlation values of adjacent pixels in image llama.
Pixels from Original Image
DirectionChannel rChannel gChannel bAverage
horizontal0.9764680.9622310.9483010.962333
vertical0.9835660.9791460.9745020.979071
diagonal0.9836070.9791490.9746440.979133
Pixels from Y c
DirectionChannel rChannel gChannel bAverage
horizontal0.0137420.0042580.0016690.006556
vertical0.0186400.0252890.0252030.023044
diagonal0.0247110.0301400.0303430.028398
Table 6. Correlation values of adjacent pixels in image car.
Table 6. Correlation values of adjacent pixels in image car.
Pixels from Original Image
horizontal0.9825150.9790780.9779040.979832
vertical0.9791570.9748940.9744560.976169
diagonal0.9790920.9748660.9744780.976145
pixels from Y c
DirectionChannel rChannel gChannel bAverage
horizontal0.0039770.0027920.0006890.002486
vertical0.0222640.0260530.0299630.026093
diagonal0.0275550.0311700.0348900.031205
Table 7. Correlation values of adjacent pixels in image football.
Table 7. Correlation values of adjacent pixels in image football.
Pixels from Original Image
DirectionChannel rChannel gChannel bAverage
horizontal0.9817400.9442250.9516330.9591993
vertical0.9796660.9406940.9484860.956282
diagonal0.9797440.9407880.9486520.956395
Pixels from Y c
DirectionChannel rChannel gChannel bAverage
horizontal0.0057810.0042870.0027080.004259
vertical0.0349300.0260710.0294720.030501
diagonal0.0396110.0307450.0341060.034821
Table 8. Correlation values for concealing analysis. The compression rate is 0.7.
Table 8. Correlation values for concealing analysis. The compression rate is 0.7.
ImageChannel rChannel gChannel bAverage
trailer0.0786440.0993050.0886720.088874
hallway0.0529720.0588630.0517430.054526
kids0.0941720.1126760.1207740.109207
llama0.0909180.0811030.1276260.099882
car0.1077370.0496030.0638370.073726
football0.0484350.0684050.0517920.056211
Table 9. Experimental results of image entropy. The compression rate is 0.7.
Table 9. Experimental results of image entropy. The compression rate is 0.7.
Entropy of Original Image
ImageChannel rChannel gChannel bAverage
trailer7.61327.34577.17527.3780
hallway7.14817.23746.7047.0298
kids7.24447.04816.84187.0447
llama7.65997.22387.32757.4037
car7.67157.62857.60617.6353
football6.53506.64376.97856.7190
Entropy of Signal Y c
ImageChannel rChannel gChannel bAverage
trailer7.98907.98867.98917.9889
hallway7.98817.98857.98897.9885
kids7.98797.98827.98867.9882
llama7.98777.98847.98867.9882
car7.98837.98837.98807.9882
football7.98877.98827.98837.9884
Table 10. Compression performance comparison via PSNR values (Unit: dB).
Table 10. Compression performance comparison via PSNR values (Unit: dB).
Compression Rate 0.75
ImageProposed MethodRef. [48]Ref. [49]Ref. [50]
lena31.2334.1929.56-
cameraman28.9030.8528.93-
peppers32.51--31.25
woman36.16--33.92
ImageProposed MethodRef. [48]Ref. [49]Ref. [50]
lena25.7929.8229.82-
cameraman22.9126.7129.43-
peppers26.03--24.85
woman31.16--30.82
Compression Rate 0.25
ImageProposed MethodRef. [48]Ref. [49]Ref. [50]
lena13.9525.9326.06-
cameraman15.0722.6425.23-
peppers17.80--19.16
woman17.47--25.05
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, W.; Peng, H.; Tong, F.; Li, L.; Xie, B. A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs. Sensors 2022, 22, 5909. https://doi.org/10.3390/s22155909

AMA Style

Wu W, Peng H, Tong F, Li L, Xie B. A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs. Sensors. 2022; 22(15):5909. https://doi.org/10.3390/s22155909

Chicago/Turabian Style

Wu, Wei, Haipeng Peng, Fenghua Tong, Lixiang Li, and Binzhu Xie. 2022. "A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs" Sensors 22, no. 15: 5909. https://doi.org/10.3390/s22155909

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop