SlideShare a Scribd company logo
1 of 25
TITLE: HIGHLY SCALABLE KEY PRE-DISTRIBUTION
SCHEME FOR WIRELESS SENSOR NETWORKS
BATCH MEMBERS :
PROJECT GUIDE:
HIGHLY SCALABLE KEY PRE-DISTRIBUTION
SCHEME FOR WIRELESS SENSOR NETWORKS
ABSTRACT:
• We propose a new scalable key management scheme for
wireless sensor network which provides a good secure
connectivity coverage.
• The main purpose of this system is that it provides high
network scalability and good key sharing probability.
• Moreover for an equal network size, our solution reduces
significantly the storage overhead compared to those of
existing solutions
Network scalability at equal key ring size.
Key ring size at equal network size.
Energy consumption at equal network size.
Network connectivity at equal key ring size.
SCOPE OF PROJECT
EXISTING SYSTEM
Wireless sensor networks are increasingly used
in critical applications within several fields
including military, medical and industrial sectors.
Due to sensitivity of the existing system,
sophisticated security services are required.
On the other hand, because of the lack of
infrastructure in WSNs, we have usually no trust
on third party which can attribute pair wise secret
keys to neighboring nodes, that is why most
existing solutions are based on key pre-
distribution.
PROPOSED SYSTEM
Our aim is to tackle the scalability issue
without degrading the other network
performance metrics.
This design of scheme ensures a good secure
coverage of large scale networks with a low
key storage overhead and a good network
resiliency.
MODULE NAMES
• Node Deployment
• Key Generation
• Key Pre-distribution Technique
• Secure Transmission with Energy
USE CASE
DIAGRAM:
Source
Router
Key verification
View no.on Nodes
/Blocks
Destination
Browse a file
Send File
Node Deploy
Generate key
Destination Path
File Transfer
DATAFLOW
DIAGRAM:
Source
Destination
IP Address
View No.of Nodes/
Blocks
Router
Key genarate
IP Address
File Received
End
Browse Destination
Path
End
Browse a
File
no
yes
File
Verified
File Transferred
Key
Verification
waiting
for verification
File Transfer
Node Deployed
KeyVerify
N4
N5
N1
N2
N3
N6
STORAGE NODE
SYSTEM
ARCHITECTURE:
1. NODE DEPLOYMENT
• The first module is Node deployment, where
the node can be deployed by specifying the
number of nodes in the network.
• After specifying the number of nodes in the
network, the nodes are deployed.
• The nodes are deployed with unique ID
(Identity) number so that each can be
differentiated.
• And also nodes are deployed with their energy
levels.
2. KEY GENERATION
• After the Node deployment module, the key
generation module is developed, where the
number of nodes and number of blocks should
be specified, so that the key will be generated.
• The key is symmetric key and the key is
displayed in the text area given in the node.
•In this module, we generate blocks of m order
initial design, where each block corresponds to
a key set. We pre-load then each node with t
completely disjoint blocks where t is a protocol
parameter that we will discuss later in this
section.
•After the deployment step, each two neighbors
exchange the identifiers of their keys in order to
determine the common keys.
•This approach enhances the network
resiliency since the attackers have to
compromise more overlap keys to break a
secure link.
3. KEY PRE-DISTRIBUTION TECHNIQUE
4. Secure Transmission with Energy
• In this module, the node distance is configured
and then the nodes with their neighbor
information are displayed.
• So the nodes which is near by the node, is
selected and the energy level is first calculated
to verify the secure transmission.
• After that the data is uploaded and sent to the
destination node, where in the destination
node, the key is verified and then the data is
received.
MODULE SCREENSHOTS:
1. Securing wireless sensor networks: a survey
AUTHORS:
Y. Zhou, Y. Fang, and Y. Zhang
• The significant advances of hardware manufacturing
technology and the development of efficient software
algorithms make technically and economically feasible a
network composed of numerous, small, low-cost sensors
using wireless communications, that is, a wireless sensor
network. WSNs have attracted intensive interest from both
academia and industry due to their wide application in
civil and military scenarios.
2. Random key pre-distribution schemes for
sensor networks
AUTHORS:
H. Chan, A. Perrig, and D. Song
• Key establishment in sensor networks is a challenging
problem because asymmetric key cryptosystems are
unsuitable for use in resource constrained sensor nodes,
and also because the nodes could be physically
compromised by an adversary. We present three new
mechanisms for key establishment using the framework
of pre-distributing a random set of keys to each node
HARDWARE CONFIGURATION:-
•Processor - Pentium –IV
•Speed - 1.1 Ghz
•RAM - 256 MB(min)
•Hard Disk - 20 G
•Key Board - Standard Windows Keyboard
•Mouse - Two or Three Button Mouse
•Monitor - SVGA
SOFTWARE CONFIGURATION:-
•Operating system : Windows XP.
•Coding Language : C# , Net.
•Data Base : SQL Server 2005
•Tool : VISUAL STUDIO 2008.
•To achieve security in wireless sensor networks, it is
important to be able to encrypt messages sent among sensor
nodes.
•Recently, a random key pre-distribution scheme and its
improvements have been proposed.
•We show that the performance (including connectivity,
memory usage, and network resilience against node capture) of
sensor networks can he substantially improved with the use of
our proposed scheme. The scheme and its detailed performance
evaluation are presented in this paper.
CONCLUSION:
REFERENCE:
Walid Bechkit, Yacine Challal, Abdelmadjid
Bouabdallah, and Vahid Tarokh-“ A Highly Scalable
Key Pre-Distribution Scheme for Wireless Sensor
Networks”- IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS, VOL. 12, NO.
2, FEBRUARY 2013
Safest Way of Message or File Transfer using Key Distribution

More Related Content

What's hot

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
Brockanurag
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Imran Khan
 

What's hot (20)

Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wsn1 ppt
Wsn1 pptWsn1 ppt
Wsn1 ppt
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wlan security
Wlan securityWlan security
Wlan security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Security issues
Security issuesSecurity issues
Security issues
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 

Similar to Safest Way of Message or File Transfer using Key Distribution

Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking module
eSAT Journals
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 

Similar to Safest Way of Message or File Transfer using Key Distribution (20)

A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Sem
SemSem
Sem
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhausting
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking module
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Safest Way of Message or File Transfer using Key Distribution

  • 1. TITLE: HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS BATCH MEMBERS : PROJECT GUIDE:
  • 2. HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS ABSTRACT: • We propose a new scalable key management scheme for wireless sensor network which provides a good secure connectivity coverage. • The main purpose of this system is that it provides high network scalability and good key sharing probability. • Moreover for an equal network size, our solution reduces significantly the storage overhead compared to those of existing solutions
  • 3. Network scalability at equal key ring size. Key ring size at equal network size. Energy consumption at equal network size. Network connectivity at equal key ring size. SCOPE OF PROJECT
  • 4. EXISTING SYSTEM Wireless sensor networks are increasingly used in critical applications within several fields including military, medical and industrial sectors. Due to sensitivity of the existing system, sophisticated security services are required. On the other hand, because of the lack of infrastructure in WSNs, we have usually no trust on third party which can attribute pair wise secret keys to neighboring nodes, that is why most existing solutions are based on key pre- distribution.
  • 5. PROPOSED SYSTEM Our aim is to tackle the scalability issue without degrading the other network performance metrics. This design of scheme ensures a good secure coverage of large scale networks with a low key storage overhead and a good network resiliency.
  • 6. MODULE NAMES • Node Deployment • Key Generation • Key Pre-distribution Technique • Secure Transmission with Energy
  • 7. USE CASE DIAGRAM: Source Router Key verification View no.on Nodes /Blocks Destination Browse a file Send File Node Deploy Generate key Destination Path File Transfer
  • 8. DATAFLOW DIAGRAM: Source Destination IP Address View No.of Nodes/ Blocks Router Key genarate IP Address File Received End Browse Destination Path End Browse a File no yes File Verified File Transferred Key Verification waiting for verification File Transfer Node Deployed KeyVerify
  • 10. 1. NODE DEPLOYMENT • The first module is Node deployment, where the node can be deployed by specifying the number of nodes in the network. • After specifying the number of nodes in the network, the nodes are deployed. • The nodes are deployed with unique ID (Identity) number so that each can be differentiated. • And also nodes are deployed with their energy levels.
  • 11. 2. KEY GENERATION • After the Node deployment module, the key generation module is developed, where the number of nodes and number of blocks should be specified, so that the key will be generated. • The key is symmetric key and the key is displayed in the text area given in the node.
  • 12. •In this module, we generate blocks of m order initial design, where each block corresponds to a key set. We pre-load then each node with t completely disjoint blocks where t is a protocol parameter that we will discuss later in this section. •After the deployment step, each two neighbors exchange the identifiers of their keys in order to determine the common keys. •This approach enhances the network resiliency since the attackers have to compromise more overlap keys to break a secure link. 3. KEY PRE-DISTRIBUTION TECHNIQUE
  • 13. 4. Secure Transmission with Energy • In this module, the node distance is configured and then the nodes with their neighbor information are displayed. • So the nodes which is near by the node, is selected and the energy level is first calculated to verify the secure transmission. • After that the data is uploaded and sent to the destination node, where in the destination node, the key is verified and then the data is received.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. 1. Securing wireless sensor networks: a survey AUTHORS: Y. Zhou, Y. Fang, and Y. Zhang • The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios.
  • 20. 2. Random key pre-distribution schemes for sensor networks AUTHORS: H. Chan, A. Perrig, and D. Song • Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the framework of pre-distributing a random set of keys to each node
  • 21. HARDWARE CONFIGURATION:- •Processor - Pentium –IV •Speed - 1.1 Ghz •RAM - 256 MB(min) •Hard Disk - 20 G •Key Board - Standard Windows Keyboard •Mouse - Two or Three Button Mouse •Monitor - SVGA
  • 22. SOFTWARE CONFIGURATION:- •Operating system : Windows XP. •Coding Language : C# , Net. •Data Base : SQL Server 2005 •Tool : VISUAL STUDIO 2008.
  • 23. •To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. •Recently, a random key pre-distribution scheme and its improvements have been proposed. •We show that the performance (including connectivity, memory usage, and network resilience against node capture) of sensor networks can he substantially improved with the use of our proposed scheme. The scheme and its detailed performance evaluation are presented in this paper. CONCLUSION:
  • 24. REFERENCE: Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”- IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 2, FEBRUARY 2013