SlideShare a Scribd company logo
1 of 10
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



   A Survey on Cluster-Based Group Key Agreement
                               Protocols for WSNs

Abstract:-
The scope of this survey is to examine and thoroughlyevaluate the
cluster-based Group Key Agreement (GKA)protocols for Wireless
Sensor Networks (WSNs). Towards thisgoal, we have grouped the
WSNs application environments intotwo major categories (i.e.,
infrastructure-based and infrastructure less)and have examined: a) which
of the cluster-basedGroup Key Agreement (GKA) protocols that appear
in theliterature are applicable to each category, and b) to whichdegree
these protocols will impact the systems’ performance andenergy
consumption. In order to answer these questions we havecalculated the
complexity of each protocol and the energy cost itwill add to the system.
The evaluation of all discussed protocolsis presented in a generalized
way and can therefore serve as areference point for future evaluations
and for the design of new,improved GKA protocols.



Algorithm

Group Key Agreement Algorithm (ClusterKeyAgreement)




 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



Detail Algorithm Explanation

GKA protocols areconsidered to be more efficient than pair wise key
establishmentschemes for WSNs because devices do not waste
energyevery time they wish to communicate with another device
byestablishing a new shared secret key. Most of the traditionalgroup key
agreement protocols reported in the literature cannotcope with the
dynamic nature and limitations of wireless adhoc networks.




Architecture




 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306




 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306




Existing System

Existing issue that affects the use of WSNs is security. Bynature WSNs
are vulnerable to a number of threats alreadyidentified in several works,.
Every security solutionadopted for the protection against these threats
requires theemployment and management of cryptographic keys.
Disadvantages:
    No support for collaborative operations.
    No node is guaranteed to have common key with all of its
      neighbors; there is a chance that some nodes are unreachable.
    Fails to satisfy security requirement authentication and operational
      requirement accessibility.


Proposed System

Proposes two authenticated cluster-based groupkey agreement protocols
and reviews the main characteristicsof only four well known cluster-
based GKA protocols.However, the performance of all these protocols
isnot evaluated. The authors in present a survey of keymanagement
schemes in WSNs. This paper also outlines thatkey distribution
techniques are not suitable for many WSNapplications. The paper
describes the basic key managementschemes and overviews the main

 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



characteristics as well asthe limitations and security threats of each
scheme. Work inanalyses the security issues and requirements of
WSNs.Authors describe the most important WSN applications
andscenarios and emphasize on the specific requirements for
eachapplication.


The paper also proposes a security frameworkand architecture to
integrate existing technologies with WSNsin order to provide secure and
private communications to itsusers.
Advantages

    The protocol must establish a key between all sensor nodes that
      must exchange data securely

    Node addition / deletion should be supported

    It should work in undefined deployment environment

    Unauthorized nodes should not be allowed to establish
      communication with network nodes

    Key chain authentication as well as key revocation and key
      refreshing.

    Scalability



 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



    Able to perform cluster communications.




Implemented Modules

   1. Group Key Agreement Protocols
   2. HKAP Protocol
   3. GKA WSNs
   4. Key Generation Center (KGC)
   5. Secureeffective key management




1.Group Key Agreement Protocols



Cluster-based        GKA        protocols,only         and      provide       authentication.
Authenticationensures that only valid group members participate in
thekey setup phase and therefore provides a way for protectionagainst
man-in-the-middle attacks during the key agreementphase. In works and

 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



the authors proposea way for turning their protocol into an authenticated
one,     butthey        do      not      specifically        analyze        the      additional
communicationand computation cost introduced in the protocol by
authenticatingevery message
2.HKAP Protocol

The protocolfirst groups the nodes into clusters and applies an
existingGKA protocol to the members of each cluster in order togenerate
a cluster key. Then, a GKA protocol is applied toall CHs to generate the
group key. Finally, the group keyis distributed to all the group members
with the use of akey distribution protocol. The protocol assumes a
hierarchicalstructure of the network where all nodes are grouped
intoone-hop clusters.
The HKAP protocol assumes thatnodes’ mobility will only affect the
group key if there is a change in the logical topology of the network




3. GKA WSNs

Group Key Maintenance (GKM) phase for themanagement of dynamic
events like member join, leave andrefresh. The protocol assumes that if
the nodes’ mobility doesnot change the cluster tree structure, there is no
need to updatethe group key. We will only examine the procedures for
 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



theestablishment of the shared group key, so we will focus on
thedescription of the IKA phase. In this phase, we can distinguishtwo
different procedures for the establishment of the groupkey. The first
procedure, namely IKA-ClusterKeyAgreementspecifies the algorithm
for the establishment of a clusterkey in every cluster.


4. Key Generation Center (KGC)


The authenticated version of the protocol alsoassumes that a Key
Generation Center (KGC) exists andparticipates in the generation of the
public/private keys foreach member. However, this operation is held
once, duringthe setup phase and thus can be considered as offline.
Theprotocol is consisted of 3 main phases and a setup phase.During the
setup phase every node has to obtain a long termprivate key from the
KGC. In order to do so, every node sendsits long-term public key to the
KGC. This key is calculatedbased on node’s identity. The KGC
calculates and sends backthe private key. During the first phase of the
authenticationprocedure             every       member         calculates        two      scalar
multiplicationsand sends the resulting points towards the other
membersof its cluster.


5. Secureeffective key management

 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306



Effective key management mechanisms must beemployed and that
efficient ways for the distribution andmanagement of these keys should
be established. Work inoutlines the basic characteristics of the various
secretkey schemes, in relation to the basic security requirementsfor
WSNs. It also reviews and evaluates five representativeprotocols for
each keying model, in terms of some generalperformance requirements,
like simplicity, scalability, robustnessand storage efficiency. However,
without considering thespecific requirements of the application or the
environmentthat WSN technology is used, we can only be led to
generalconclusions for the evaluation of the protocols. The authors of
also state that beyond the fact that the use of a group key is necessary for
multicast communication, cluster-basedgroup keying schemes is more
robust than network-widekeys because the compromise of a node, will
lead to thecompromise of the cluster, but not the entire group.
Moreover,these schemes are more scalable since additions and
removalsof nodes are managed in a more efficient way.




System Requirements:

   Hardware Requirements:

 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306




   • System                   : Pentium IV 2.4 GHz.
   • Hard Disk                : 40 GB.
   • Floppy Drive             : 1.44 Mb.
   • Monitor                  : 15 VGA Colour.
   • Mouse                    : Logitech.
   • Ram                      : 256 Mb.




   Software Requirements:




              •       Operating system :- Windows XP Professional
              •       JDK                      :-1.5/ 1.6 and above
              •       Front End              :- JAVA, Swing(JFC),
              •       Database               :MS-Access
              •        Tool                   :Eclipse 3.3




 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in

More Related Content

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

A survey on cluster based group key agreement protocols for ws ns

  • 1. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 A Survey on Cluster-Based Group Key Agreement Protocols for WSNs Abstract:- The scope of this survey is to examine and thoroughlyevaluate the cluster-based Group Key Agreement (GKA)protocols for Wireless Sensor Networks (WSNs). Towards thisgoal, we have grouped the WSNs application environments intotwo major categories (i.e., infrastructure-based and infrastructure less)and have examined: a) which of the cluster-basedGroup Key Agreement (GKA) protocols that appear in theliterature are applicable to each category, and b) to whichdegree these protocols will impact the systems’ performance andenergy consumption. In order to answer these questions we havecalculated the complexity of each protocol and the energy cost itwill add to the system. The evaluation of all discussed protocolsis presented in a generalized way and can therefore serve as areference point for future evaluations and for the design of new,improved GKA protocols. Algorithm Group Key Agreement Algorithm (ClusterKeyAgreement) Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 2. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Detail Algorithm Explanation GKA protocols areconsidered to be more efficient than pair wise key establishmentschemes for WSNs because devices do not waste energyevery time they wish to communicate with another device byestablishing a new shared secret key. Most of the traditionalgroup key agreement protocols reported in the literature cannotcope with the dynamic nature and limitations of wireless adhoc networks. Architecture Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 3. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 4. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Existing System Existing issue that affects the use of WSNs is security. Bynature WSNs are vulnerable to a number of threats alreadyidentified in several works,. Every security solutionadopted for the protection against these threats requires theemployment and management of cryptographic keys. Disadvantages:  No support for collaborative operations.  No node is guaranteed to have common key with all of its neighbors; there is a chance that some nodes are unreachable.  Fails to satisfy security requirement authentication and operational requirement accessibility. Proposed System Proposes two authenticated cluster-based groupkey agreement protocols and reviews the main characteristicsof only four well known cluster- based GKA protocols.However, the performance of all these protocols isnot evaluated. The authors in present a survey of keymanagement schemes in WSNs. This paper also outlines thatkey distribution techniques are not suitable for many WSNapplications. The paper describes the basic key managementschemes and overviews the main Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 5. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 characteristics as well asthe limitations and security threats of each scheme. Work inanalyses the security issues and requirements of WSNs.Authors describe the most important WSN applications andscenarios and emphasize on the specific requirements for eachapplication. The paper also proposes a security frameworkand architecture to integrate existing technologies with WSNsin order to provide secure and private communications to itsusers. Advantages  The protocol must establish a key between all sensor nodes that must exchange data securely  Node addition / deletion should be supported  It should work in undefined deployment environment  Unauthorized nodes should not be allowed to establish communication with network nodes  Key chain authentication as well as key revocation and key refreshing.  Scalability Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 6. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306  Able to perform cluster communications. Implemented Modules 1. Group Key Agreement Protocols 2. HKAP Protocol 3. GKA WSNs 4. Key Generation Center (KGC) 5. Secureeffective key management 1.Group Key Agreement Protocols Cluster-based GKA protocols,only and provide authentication. Authenticationensures that only valid group members participate in thekey setup phase and therefore provides a way for protectionagainst man-in-the-middle attacks during the key agreementphase. In works and Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 7. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 the authors proposea way for turning their protocol into an authenticated one, butthey do not specifically analyze the additional communicationand computation cost introduced in the protocol by authenticatingevery message 2.HKAP Protocol The protocolfirst groups the nodes into clusters and applies an existingGKA protocol to the members of each cluster in order togenerate a cluster key. Then, a GKA protocol is applied toall CHs to generate the group key. Finally, the group keyis distributed to all the group members with the use of akey distribution protocol. The protocol assumes a hierarchicalstructure of the network where all nodes are grouped intoone-hop clusters. The HKAP protocol assumes thatnodes’ mobility will only affect the group key if there is a change in the logical topology of the network 3. GKA WSNs Group Key Maintenance (GKM) phase for themanagement of dynamic events like member join, leave andrefresh. The protocol assumes that if the nodes’ mobility doesnot change the cluster tree structure, there is no need to updatethe group key. We will only examine the procedures for Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 8. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 theestablishment of the shared group key, so we will focus on thedescription of the IKA phase. In this phase, we can distinguishtwo different procedures for the establishment of the groupkey. The first procedure, namely IKA-ClusterKeyAgreementspecifies the algorithm for the establishment of a clusterkey in every cluster. 4. Key Generation Center (KGC) The authenticated version of the protocol alsoassumes that a Key Generation Center (KGC) exists andparticipates in the generation of the public/private keys foreach member. However, this operation is held once, duringthe setup phase and thus can be considered as offline. Theprotocol is consisted of 3 main phases and a setup phase.During the setup phase every node has to obtain a long termprivate key from the KGC. In order to do so, every node sendsits long-term public key to the KGC. This key is calculatedbased on node’s identity. The KGC calculates and sends backthe private key. During the first phase of the authenticationprocedure every member calculates two scalar multiplicationsand sends the resulting points towards the other membersof its cluster. 5. Secureeffective key management Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 9. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Effective key management mechanisms must beemployed and that efficient ways for the distribution andmanagement of these keys should be established. Work inoutlines the basic characteristics of the various secretkey schemes, in relation to the basic security requirementsfor WSNs. It also reviews and evaluates five representativeprotocols for each keying model, in terms of some generalperformance requirements, like simplicity, scalability, robustnessand storage efficiency. However, without considering thespecific requirements of the application or the environmentthat WSN technology is used, we can only be led to generalconclusions for the evaluation of the protocols. The authors of also state that beyond the fact that the use of a group key is necessary for multicast communication, cluster-basedgroup keying schemes is more robust than network-widekeys because the compromise of a node, will lead to thecompromise of the cluster, but not the entire group. Moreover,these schemes are more scalable since additions and removalsof nodes are managed in a more efficient way. System Requirements: Hardware Requirements: Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 10. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 256 Mb. Software Requirements: • Operating system :- Windows XP Professional • JDK :-1.5/ 1.6 and above • Front End :- JAVA, Swing(JFC), • Database :MS-Access • Tool :Eclipse 3.3 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in