Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
A survey on cluster based group key agreement protocols for ws ns
1. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
A Survey on Cluster-Based Group Key Agreement
Protocols for WSNs
Abstract:-
The scope of this survey is to examine and thoroughlyevaluate the
cluster-based Group Key Agreement (GKA)protocols for Wireless
Sensor Networks (WSNs). Towards thisgoal, we have grouped the
WSNs application environments intotwo major categories (i.e.,
infrastructure-based and infrastructure less)and have examined: a) which
of the cluster-basedGroup Key Agreement (GKA) protocols that appear
in theliterature are applicable to each category, and b) to whichdegree
these protocols will impact the systems’ performance andenergy
consumption. In order to answer these questions we havecalculated the
complexity of each protocol and the energy cost itwill add to the system.
The evaluation of all discussed protocolsis presented in a generalized
way and can therefore serve as areference point for future evaluations
and for the design of new,improved GKA protocols.
Algorithm
Group Key Agreement Algorithm (ClusterKeyAgreement)
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
2. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
Detail Algorithm Explanation
GKA protocols areconsidered to be more efficient than pair wise key
establishmentschemes for WSNs because devices do not waste
energyevery time they wish to communicate with another device
byestablishing a new shared secret key. Most of the traditionalgroup key
agreement protocols reported in the literature cannotcope with the
dynamic nature and limitations of wireless adhoc networks.
Architecture
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
3. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
4. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
Existing System
Existing issue that affects the use of WSNs is security. Bynature WSNs
are vulnerable to a number of threats alreadyidentified in several works,.
Every security solutionadopted for the protection against these threats
requires theemployment and management of cryptographic keys.
Disadvantages:
No support for collaborative operations.
No node is guaranteed to have common key with all of its
neighbors; there is a chance that some nodes are unreachable.
Fails to satisfy security requirement authentication and operational
requirement accessibility.
Proposed System
Proposes two authenticated cluster-based groupkey agreement protocols
and reviews the main characteristicsof only four well known cluster-
based GKA protocols.However, the performance of all these protocols
isnot evaluated. The authors in present a survey of keymanagement
schemes in WSNs. This paper also outlines thatkey distribution
techniques are not suitable for many WSNapplications. The paper
describes the basic key managementschemes and overviews the main
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
5. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
characteristics as well asthe limitations and security threats of each
scheme. Work inanalyses the security issues and requirements of
WSNs.Authors describe the most important WSN applications
andscenarios and emphasize on the specific requirements for
eachapplication.
The paper also proposes a security frameworkand architecture to
integrate existing technologies with WSNsin order to provide secure and
private communications to itsusers.
Advantages
The protocol must establish a key between all sensor nodes that
must exchange data securely
Node addition / deletion should be supported
It should work in undefined deployment environment
Unauthorized nodes should not be allowed to establish
communication with network nodes
Key chain authentication as well as key revocation and key
refreshing.
Scalability
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
6. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
Able to perform cluster communications.
Implemented Modules
1. Group Key Agreement Protocols
2. HKAP Protocol
3. GKA WSNs
4. Key Generation Center (KGC)
5. Secureeffective key management
1.Group Key Agreement Protocols
Cluster-based GKA protocols,only and provide authentication.
Authenticationensures that only valid group members participate in
thekey setup phase and therefore provides a way for protectionagainst
man-in-the-middle attacks during the key agreementphase. In works and
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
7. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
the authors proposea way for turning their protocol into an authenticated
one, butthey do not specifically analyze the additional
communicationand computation cost introduced in the protocol by
authenticatingevery message
2.HKAP Protocol
The protocolfirst groups the nodes into clusters and applies an
existingGKA protocol to the members of each cluster in order togenerate
a cluster key. Then, a GKA protocol is applied toall CHs to generate the
group key. Finally, the group keyis distributed to all the group members
with the use of akey distribution protocol. The protocol assumes a
hierarchicalstructure of the network where all nodes are grouped
intoone-hop clusters.
The HKAP protocol assumes thatnodes’ mobility will only affect the
group key if there is a change in the logical topology of the network
3. GKA WSNs
Group Key Maintenance (GKM) phase for themanagement of dynamic
events like member join, leave andrefresh. The protocol assumes that if
the nodes’ mobility doesnot change the cluster tree structure, there is no
need to updatethe group key. We will only examine the procedures for
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
8. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
theestablishment of the shared group key, so we will focus on
thedescription of the IKA phase. In this phase, we can distinguishtwo
different procedures for the establishment of the groupkey. The first
procedure, namely IKA-ClusterKeyAgreementspecifies the algorithm
for the establishment of a clusterkey in every cluster.
4. Key Generation Center (KGC)
The authenticated version of the protocol alsoassumes that a Key
Generation Center (KGC) exists andparticipates in the generation of the
public/private keys foreach member. However, this operation is held
once, duringthe setup phase and thus can be considered as offline.
Theprotocol is consisted of 3 main phases and a setup phase.During the
setup phase every node has to obtain a long termprivate key from the
KGC. In order to do so, every node sendsits long-term public key to the
KGC. This key is calculatedbased on node’s identity. The KGC
calculates and sends backthe private key. During the first phase of the
authenticationprocedure every member calculates two scalar
multiplicationsand sends the resulting points towards the other
membersof its cluster.
5. Secureeffective key management
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
9. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
Effective key management mechanisms must beemployed and that
efficient ways for the distribution andmanagement of these keys should
be established. Work inoutlines the basic characteristics of the various
secretkey schemes, in relation to the basic security requirementsfor
WSNs. It also reviews and evaluates five representativeprotocols for
each keying model, in terms of some generalperformance requirements,
like simplicity, scalability, robustnessand storage efficiency. However,
without considering thespecific requirements of the application or the
environmentthat WSN technology is used, we can only be led to
generalconclusions for the evaluation of the protocols. The authors of
also state that beyond the fact that the use of a group key is necessary for
multicast communication, cluster-basedgroup keying schemes is more
robust than network-widekeys because the compromise of a node, will
lead to thecompromise of the cluster, but not the entire group.
Moreover,these schemes are more scalable since additions and
removalsof nodes are managed in a more efficient way.
System Requirements:
Hardware Requirements:
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in
10. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
Call Us On 7385665306
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 256 Mb.
Software Requirements:
• Operating system :- Windows XP Professional
• JDK :-1.5/ 1.6 and above
• Front End :- JAVA, Swing(JFC),
• Database :MS-Access
• Tool :Eclipse 3.3
Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
E-Mail: info@ocularsystems.in