You are on page 1of 6

REQUIREMENTS ANALYSIS FOR

SELECTIVE AUDIO ENCRYPTION FOR WMSN

Prerna Sharma(0925948)

Subikka G S (0925958) A wireless sensor network (WSN) consists of spatially distributed sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location.There are several major challenges in deploying acoustic sensors in a wireless multimedia sensor network. Small sensors have resource constraints in terms of memory, computation capability, bandwidth availability, and battery power. A good strategy is to reduce the amount of streaming audio data. The objective of our project is to do selective encryption of the audio files based on time slots. We encrypt only a particular part of the audio file which is specified by the user and send it to the client.

Proposed system
Here we propose a selective encryption scheme which encrypts only the important audio data in order to achieve both real-time performance and energy efcient transmission in WMSNs. This signicantly reduces the processing delay and energy consumption.Selective encryption comes into account because of the following reasons. First, it is not necessary to protect unimportant audio data in a resource-limited WMSN due to the fact that the audio information could not be recovered completely even if the non-encrypted portion were intercepted by a third party. Second, most traditional encryption algorithms, such as advanced encryption standard (AES) algorithm, are too complex and may induce a severe delay in small sensor nodes.

Literature survey
H. C. H. Cheng suggest that,Partial encryption, which uses a secure encryption algorithm is used to encrypt only part of the data. Thus resulting in a significant reduction in encryption and decryption time. This is not appropriate for JPEG and MPEG algorithm. The existing systems are inadequate for following reason.

1. The transmitted signal is digital. 2. Transmission rate is high. 3. The allowable band width is limited. Network concepts used: Encryption is the process of transforming information using an algorithm,called cipher, to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information called ciphertext. Decryption is the reverse of encryption. It makes the encrypted information readable again , i.e. to make it unencrypted. Data transfer is the transmission of data over point-to-point or point-to-multipoint communnication.

Requirements specifications
Functional requirements Input An audio file(with extensions MP3, MPEG2 AAC, MPEG4 AAC, Dolby AC3,etc) Process Selecting an audio file, getting the time slot from the user and clipping the file accordingly. Then the clipped part is encrypted and sent. The client will decrypt the received file to view the original data. Output The decrypted audio file, which was encrypted and sent. Non functional requirements Hardware requirements Processor RAM : : Intel Processor IV 128 MB

Hard disk Monitor Keyboard Mouse Software requirements Operating System Language used Front End used Back end used : : : :

: : : :

20 GB 15 Samtron color 108 mercury keyboard Logitech mouse

Windows XP/2000 Java / Core Java. Java Swing. sql server 2000

System model
There are two modules- server and client. Server Module In this module we have two sub modules, Clip Window: In this module, first we will browse and select any audio file. Then we have to cut that audio file to some particular milliseconds, which are got from the user. Encrypt: In this module, we should encrypt the particular clipped audio file. Client Module Clip Window Encrypt

In Client module we can decrypt the received file from server and get the original file. In client we have two sub modules, Receive file: In this module, we will receive the encrypted file from server. Decrypt: In this module, we should decrypt the received encrypted file, then view it. Receive file Decrypt

SERVER
Login Select Audio File

Audio Encryption

Encrypte d file Send the Encrypted File to Client

CLIEN T

Encrypted File Received From server

Receive the data

Decrypt Original File

You might also like