SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 193
ENERGETIC KEY FOR PROTECTED COMMUNICATION IN WIRELESS
SENSOR NETWORK
S.Selvi1
, G.Sankareeswari2
, Vidhyalakshmi3
1, 2
Assistant Professor, CSE, 3
Assistant Professor, IT, Sri Vidya college of Engineering and Technology, Tamilnadu, India
sselvi201987@gmail.com, sankariram90@gmail.com, vidhyarajme@gmail.com
Abstract
The enormous world wide web and its application of sending data have caused a tremendous increase in stolen or attach the false
data with the original data while sending from one node to another node through the intermediate nodes for that we have to securely
send the data from source to destination. Virtual energy based encryption and keying has introduced an effective solution to the
problem of detection of false data over the network. In the virtual energy based encryption and keying technique we introduced an
concept is one time dynamic key (i.e.).The data which is to be send from source to destination is encrypted using the secret key and
the encryption algorithm. The secret key is generated, one time dynamic key is employed for one packet only and different keys are
used for the successive packets. Virtual energy based encryption and keying is a secure communication framework the data to be send
is encrypted using the AES algorithm. The intermediate nodes are verified the incoming packets if the incoming packet is false packet
injected in the network by the malicious outsiders those packets are detected and dropped otherwise the packet is forwarded to the
next node. In the virtual energy based encryption and keying there are two modes of operations they are virtual energy based
encryption and keying-I and virtual energy based encryption and keying- II. In the virtual energy based encryption and keying-I each
node monitors their neighbor node and in the virtual energy based encryption and keying-II each nodes randomly choose the nodes
and monitors those nodes. These two modes of operation monitor the nodes and detect the false packet and drop those false packets.
Keywords: Wireless sensor networks, security, one time dynamic key
--------------------------------------------------------------------***----------------------------------------------------------------------
1. OBJECTIVE
When the important data’s are send from one node to another
node through the wireless sensor networks some false packets
are attached with the original data by malicious outsiders. For
that we have to detect and drop those packets. Successful
implementation of this project solves those above problems.
2. INTRODUCTION
The explosive growth of networks offers enormous benefits in
terms of increased exchange of information. There are two
basic key management schemes for WSNs: fixed and active.
In fixed key management schemes, key management functions
(i.e., key generation and distribution) are handled statically.
That is, the sensors have a permanent number of keys loaded
either prior to or shortly after network deployment. On the
other hand, active key management schemes perform keying
functions (rekeying) either periodically or on demand as
needed by the network. The VEBEK structure based on the
two types of operational modes. The VEBEK means Virtual
Energy based encryption and key. They are VEBEK-I,
VEBEK-II[1]. These modes are suitable for different
scenarios. VEBEK-I nodes contain only one hop. VEBEK-II
contains full of downstream nodes. We easily analyze the
VEBEK’s possibility and performance in two ways. They are
1.Analytic process 2.Simulations.These two processes based
on the reception module and sink. Performance analysis also
checks the routing path from source to sink. It also analyzes
the performance of the nodes. During the rescue of the data
the path is stable or fixed. VEBEK [1] is a secure process
because the sensitive’s data’s are encoded using permutation
code through AES encryption process. The same key never
appears for the same data. It increases the packet size of the
sending data and it avoids the unnecessary data in an efficient
manner. Many encryption algorithms used to send only 40 bits
of message, through wireless network. So the message is not
fully secured that is the level of security is reduced. But the
VEBEK[1] overcome these types of problems. It has the
ability to transmit 64 bit data. It provides full security to the
whole message. It encrypts the whole data. The key generation
based on the 8 or 10 digits. Here sensor is used in between the
process of the crypto module and packet transmission. The
virtual energy of the sensor is dynamically changed through
AES encryption mechanism.
3. WIRELESS SENSOR NETWORK (WSN)
A wireless sensor network (WSN) consists of spatially spread
autonomous sensors to monitor physical or natural situation,
such as temperature, sound, pressure, etc. and to freely pass
their data through the network to a main location. The
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 194
expansion of wireless sensor networks was forced by military
applications such as battleground observation; today such
networks are used in many industrial and consumer
applications.
The WSN is built of "nodes" – from a little to a number of
hundreds or even thousands, where each node is related to one
(or sometimes several) sensors. Each such sensor network
node has usually several parts: a radio transceiver with an
interior antenna or link to an outside antenna, a
microcontroller, an electronic circuit for interfacing with the
sensors and an energy resource, usually a battery or an
surrounded form of energy harvesting. Size and cost constraint
on sensor nodes outcome in equivalent constraints on
resources. The topology of the WSNs can differ from a easy
star network to an superior multi-hop wireless mesh network.
The transmission technique between the hops of the network
can be routing or flooding.
3.1 Platforms
3.1.1 Software
Energy is the scarcest source of WSN nodes, and it determines
the life span of WSNs. WSNs are proposed to deployed in vast
number in a mixture of environments, jointly with distant and
destructive regions, where ad hoc communications are a key
component. For this basis, algorithms and protocols require to
address the following issues:
• Lifetime maximization
• Robustness and fault tolerance
• Self-configuration
Lifetime maximization: Energy/Power utilization of the
sensing device should be minimized and sensor nodes should
be energy efficient since their partial energy resource
determines their lifetime. To save power the node should shut
off the radio power supply when not in use.
3.1.2 Hardware
One main challenge in a WSN is to generate low cost and
small sensor nodes. There are an growing number of small
companies producing WSN hardware and the commercial
circumstances can be compared to home computing in the
1970s. Many of the nodes are still in the study and growth
stage, mainly their software. Also natural to sensor network
acceptance is the use of very low power methods for data
achievement.
In many applications, a WSN communicates with a Local
Area Network or Wide Area Network during a gateway. The
access acts as a link between the WSN and the other network.
4. EXISTING SYSTEM
Some of the drawbacks occurred in the existing system. RC4
algorithm is used. In that security is low and only 40 bit is
transmitted. It follows simple and ancient techniques. It will
encrypt the stream of bytes using Stream-Cipher technology.
5. PROPOSED SYSTEM
The complete project deals with the key process of WSN’s.
WSN’s is a technique to verify the data or message line by
line and give up the fake packets. It also maintain the
condition of the sensor. Here the proposed system uses AES
algorithm instead of using the RC4 algorithm. The proposed
system has some merits compared with the existing system.
The proposed system uses the recent and superior encryption
technique. The block of the data encrypted using the block-
cipher technique. Using WSN 64 bits of data are transmitted.
Based on the encryption technique the whole process is
completely secured.
6. OPERATIONS
The VEBEK contains the following four operations:
1. Virtual energy based keying module.
2. Encryption.
3. Packet transmission and reception module.
4. Performance analysis module.
6.1. Virtual Energy Based Keying Module
The virtual energy-based keying process involves the creation
of active keys. Opposite to other active keying schemes, it
does not exchange extra messages to create keys. A sensor
node computes keys based on its enduring virtual energy of
the sensor. The key is then feed into the next module.
6.2. Encryption
The encryption module in VEBEK employs a simple encoding
process, which is basically the process of variation of the bits
in the packet according to dynamism created variation code
generated via AES encryption technique. The encoding is a
simple encryption mechanism adopted for VEBEK. However,
VEBEK’s elastic architecture allows for adoption of stronger
encryption mechanisms.
6.3. Packet Transmission and Reception Module
The Packet transmission and reception module handles the
process of sending or receiving of encoded packets along the
path to the sink. And also get the acknowledgement from the
receiver side to conform the delivery status of the node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 195
6.4. Performance Analysis Module
In the performance analysis module we are going to consider
the false injection and eavesdropping of messages from an
outside malicious node. And also check a routing path is
established from the sources in the event region to the sink.
We assume that the path is permanent during the delivery of
the data and the route setup is secure. So the sensor network is
thickly occupied generate reports for the same event. This
module will help to analyze the performance of the nodes.
7. ARCHITECTURE
In our general architecture of implementation we use the
concept of AES encryption algorithm.
Fig 1.General architecture for Key management scheme for
wireless sensor networks
The dynamic key is generated from the base station. (i.e.) one
time dynamic key is employed for one packet only and
different keys are used for the successive packets. The original
message is encrypted using the AES encryption algorithm and
with the secret key (dynamic key).Then the encrypted message
is given to the sensor.
In the sensor, it will decrypt the message and verify the
packets whether the message is came from correct source or it
is send by the malicious outsider. If the message is send by the
malicious outsider it is detected and dropped by the sensor.
Otherwise it is forwarded to the mobile sink i.e. to the
receiver.
8. ALGORITHM
1. Cipher (byte in[4*Nb], byte out[4*Nb], word
w[Nb*(Nr+1)])
2. begin
3. byte state[4,Nb]
4. State = in
5. AddRoundKey (state, w)
6. for round = 1 step 1 to Nr-1
7. SubBytes(state)
8. ShiftRows(state)
9. MixColumns(state)
10. AddRoundKey(state, w+round*Nb)
11. end for
12. SubBytes(state)
13. ShiftRows(state)
14. AddRoundKey(state, w+Nr*Nb)
15. out = state
16. end
AES is based on a design principle known as a substitution-
permutation network, and is fast in both software and
hardware. AES is a adjustment of Rijndael which has a preset
block size of 128 bits, and an input size of 128, 192, or 256
bits. By difference, the Rijndael arrangement per se is
specified with block and key sizes that may be any multiple of
32 bits, both with a least of 128 and a greatest of 256 bits.
AES operates on a 4×4 column matrix of bytes, termed the
position, although some versions of Rijndael have a larger
chunk size and have additional columns in the position. Most
AES calculations are done in a special finite field.
The input size used for an AES cipher specifies the number of
repetitions of change rounds that change the input, called the
plaintext, into the last output, called the cipher text.
Each round consists of several processing steps, each
containing four related but dissimilar stages, as well as one
that depends on the encryption input itself. A set of reverse
rounds are applied to convert cipher text back into the unique
plaintext using the same encryption key.
High-level Description of the Algorithm
1. KeyExpansion—round keys are resulting from the
cipher key using Rijndael's input plan. AES requires
a separate 128-bit round key block for each round
plus one more.
DYNAMIC KEY
GENERATION
AES
ENCRYPTION,
MESSAGE
DYNAMIC
KEY, AES
DECRYPTION,
MESSAGE
ORIGINAL
MESSAGE
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 196
2. InitialRound
1. AddRoundKey—each byte of the position is
combined with a block of the round key
using bitwise xor.
3. Rounds
1. SubBytes—a non-linear substitution step
where each byte is replaced with another
according to a lookup table.
2. ShiftRows—a transposition step where each
row of the state is shifted cyclically a certain
number of steps.
3. MixColumns—a mixing operation which
operates on the columns of the position,
merge the four bytes in each column.
4. AddRoundKey
4. Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey.
CONCLUSIONS
This paper describes the concept of One time dynamic key
structure used for only one packet and variant keys are used
for the successive packets. It protects the entire data against
the unauthorized users or hackers. It protects the data by
generating different keys for each time and it shows the path
and size of the file in the text box. It helps to send the message
in highly secure manner.
REFERENCES
[1]. Arif Selcuk Uluagac, Student Member, IEEE, Raheem A.
Beyah, Senior Member, IEEE,Yingshu Li, Member, IEEE,
and John A. Copeland, Fellow, IEEE” VEBEK: Virtual
Energy-Based Encryption and Keying for Wireless Sensor
Networks” IEEE TRANSACTIONS ON MOBILE
COMPUTING, VOL. 9, NO. 7, JULY 2010
[2]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci,“Wireless Sensor Networks: A Survey,” Computer
Networks,vol. 38, no. 4, pp. 393-422, Mar. 2002.
[3]. C. Kraub, M. Schneider, K. Bayarou, and C. Eckert,
“STEF: A Secure Ticket-Based En-Route Filtering Scheme for
Wireless Sensor Networks,” Proc. Second Int’l Conf.
Availability, Reliability and Security (ARES ’07), pp. 310-
317, Apr. 2007.
[4]. Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for
Filtering False Data Injection in Wireless Sensor Networks,”
Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.
[5]. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route
Filtering of Injected False Data in Sensor Networks,” IEEE J.
Selected Areas in Comm., vol. 23, no. 4, pp. 839-850, Apr.
2005.
BIOGRAPHIES
Ms. S. Selvi Working as a assistant
professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
Coimbatore Institute of Engineering &
Technology,Coimbatore. Her under graduation in computer
science and Engineering at PSR Engineering
College,Sivakasi.Her area of interest is Network Security.
Ms. G. Sankareeswari Working as a
assistant professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
Mohamed Sathak Engineering College at
Kilakarai. Her under graduation in Information Technology
at Raja College of Engineering Technology, Madurai. Her
area of interest is Cloud Computing and Networks security.
Ms. R. Vidhyalakshmi Working as a
assistant professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
P.S.R Engineering College at Sivakasi.
Her under graduation in Information Technology at P.S.R
Engineering College at Sivakasi. Her area of interest is Cloud
Computing and Networks security.

More Related Content

What's hot

Network security ppt
Network security pptNetwork security ppt
Network security pptvidyapol01
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking moduleeSAT Journals
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...IRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksIRJET Journal
 

What's hot (17)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking module
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
574 501-507
574 501-507574 501-507
574 501-507
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
 
complet finalised
complet finalisedcomplet finalised
complet finalised
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
A0320105
A0320105A0320105
A0320105
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
 

Viewers also liked

Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
Improvement of energy absorption of thin walled
Improvement of energy absorption of thin walledImprovement of energy absorption of thin walled
Improvement of energy absorption of thin walledeSAT Publishing House
 
Comparison of used metadata elements in digital libraries in iran with dublin...
Comparison of used metadata elements in digital libraries in iran with dublin...Comparison of used metadata elements in digital libraries in iran with dublin...
Comparison of used metadata elements in digital libraries in iran with dublin...eSAT Publishing House
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger imageseSAT Publishing House
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
Stability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wallStability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear walleSAT Publishing House
 
Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Publishing House
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 
Performance analysis of sobel edge filter on heterogeneous system using opencl
Performance analysis of sobel edge filter on heterogeneous system using openclPerformance analysis of sobel edge filter on heterogeneous system using opencl
Performance analysis of sobel edge filter on heterogeneous system using opencleSAT Publishing House
 
Coupling the bionic surface friction contact performance and wear resistance ...
Coupling the bionic surface friction contact performance and wear resistance ...Coupling the bionic surface friction contact performance and wear resistance ...
Coupling the bionic surface friction contact performance and wear resistance ...eSAT Publishing House
 
Treatment of solid waste leachate by
Treatment of solid waste leachate byTreatment of solid waste leachate by
Treatment of solid waste leachate byeSAT Publishing House
 
Novel method to find the parameter for noise removal
Novel method to find the parameter for noise removalNovel method to find the parameter for noise removal
Novel method to find the parameter for noise removaleSAT Publishing House
 
Classification accuracy of sar images for various land
Classification accuracy of sar images for various landClassification accuracy of sar images for various land
Classification accuracy of sar images for various landeSAT Publishing House
 
Modeling cogeneration power plants using neural networks
Modeling cogeneration power plants using neural networksModeling cogeneration power plants using neural networks
Modeling cogeneration power plants using neural networkseSAT Publishing House
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmeSAT Publishing House
 
Study of vibration and its effects on health of a two
Study of vibration and its effects on health of a twoStudy of vibration and its effects on health of a two
Study of vibration and its effects on health of a twoeSAT Publishing House
 

Viewers also liked (20)

Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Improvement of energy absorption of thin walled
Improvement of energy absorption of thin walledImprovement of energy absorption of thin walled
Improvement of energy absorption of thin walled
 
Comparison of used metadata elements in digital libraries in iran with dublin...
Comparison of used metadata elements in digital libraries in iran with dublin...Comparison of used metadata elements in digital libraries in iran with dublin...
Comparison of used metadata elements in digital libraries in iran with dublin...
 
Studies on stabilised adobe blocks
Studies on stabilised adobe blocksStudies on stabilised adobe blocks
Studies on stabilised adobe blocks
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
 
Ijret 110307001
Ijret 110307001Ijret 110307001
Ijret 110307001
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Stability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wallStability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wall
 
Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
Performance analysis of sobel edge filter on heterogeneous system using opencl
Performance analysis of sobel edge filter on heterogeneous system using openclPerformance analysis of sobel edge filter on heterogeneous system using opencl
Performance analysis of sobel edge filter on heterogeneous system using opencl
 
Coupling the bionic surface friction contact performance and wear resistance ...
Coupling the bionic surface friction contact performance and wear resistance ...Coupling the bionic surface friction contact performance and wear resistance ...
Coupling the bionic surface friction contact performance and wear resistance ...
 
Treatment of solid waste leachate by
Treatment of solid waste leachate byTreatment of solid waste leachate by
Treatment of solid waste leachate by
 
Novel method to find the parameter for noise removal
Novel method to find the parameter for noise removalNovel method to find the parameter for noise removal
Novel method to find the parameter for noise removal
 
Classification accuracy of sar images for various land
Classification accuracy of sar images for various landClassification accuracy of sar images for various land
Classification accuracy of sar images for various land
 
Modeling cogeneration power plants using neural networks
Modeling cogeneration power plants using neural networksModeling cogeneration power plants using neural networks
Modeling cogeneration power plants using neural networks
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithm
 
Study of vibration and its effects on health of a two
Study of vibration and its effects on health of a twoStudy of vibration and its effects on health of a two
Study of vibration and its effects on health of a two
 

Similar to Energetic key for protected communication in wireless

A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
 

Similar to Energetic key for protected communication in wireless (20)

A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
G0933443
G0933443G0933443
G0933443
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
D0371028039
D0371028039D0371028039
D0371028039
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

Energetic key for protected communication in wireless

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 193 ENERGETIC KEY FOR PROTECTED COMMUNICATION IN WIRELESS SENSOR NETWORK S.Selvi1 , G.Sankareeswari2 , Vidhyalakshmi3 1, 2 Assistant Professor, CSE, 3 Assistant Professor, IT, Sri Vidya college of Engineering and Technology, Tamilnadu, India sselvi201987@gmail.com, sankariram90@gmail.com, vidhyarajme@gmail.com Abstract The enormous world wide web and its application of sending data have caused a tremendous increase in stolen or attach the false data with the original data while sending from one node to another node through the intermediate nodes for that we have to securely send the data from source to destination. Virtual energy based encryption and keying has introduced an effective solution to the problem of detection of false data over the network. In the virtual energy based encryption and keying technique we introduced an concept is one time dynamic key (i.e.).The data which is to be send from source to destination is encrypted using the secret key and the encryption algorithm. The secret key is generated, one time dynamic key is employed for one packet only and different keys are used for the successive packets. Virtual energy based encryption and keying is a secure communication framework the data to be send is encrypted using the AES algorithm. The intermediate nodes are verified the incoming packets if the incoming packet is false packet injected in the network by the malicious outsiders those packets are detected and dropped otherwise the packet is forwarded to the next node. In the virtual energy based encryption and keying there are two modes of operations they are virtual energy based encryption and keying-I and virtual energy based encryption and keying- II. In the virtual energy based encryption and keying-I each node monitors their neighbor node and in the virtual energy based encryption and keying-II each nodes randomly choose the nodes and monitors those nodes. These two modes of operation monitor the nodes and detect the false packet and drop those false packets. Keywords: Wireless sensor networks, security, one time dynamic key --------------------------------------------------------------------***---------------------------------------------------------------------- 1. OBJECTIVE When the important data’s are send from one node to another node through the wireless sensor networks some false packets are attached with the original data by malicious outsiders. For that we have to detect and drop those packets. Successful implementation of this project solves those above problems. 2. INTRODUCTION The explosive growth of networks offers enormous benefits in terms of increased exchange of information. There are two basic key management schemes for WSNs: fixed and active. In fixed key management schemes, key management functions (i.e., key generation and distribution) are handled statically. That is, the sensors have a permanent number of keys loaded either prior to or shortly after network deployment. On the other hand, active key management schemes perform keying functions (rekeying) either periodically or on demand as needed by the network. The VEBEK structure based on the two types of operational modes. The VEBEK means Virtual Energy based encryption and key. They are VEBEK-I, VEBEK-II[1]. These modes are suitable for different scenarios. VEBEK-I nodes contain only one hop. VEBEK-II contains full of downstream nodes. We easily analyze the VEBEK’s possibility and performance in two ways. They are 1.Analytic process 2.Simulations.These two processes based on the reception module and sink. Performance analysis also checks the routing path from source to sink. It also analyzes the performance of the nodes. During the rescue of the data the path is stable or fixed. VEBEK [1] is a secure process because the sensitive’s data’s are encoded using permutation code through AES encryption process. The same key never appears for the same data. It increases the packet size of the sending data and it avoids the unnecessary data in an efficient manner. Many encryption algorithms used to send only 40 bits of message, through wireless network. So the message is not fully secured that is the level of security is reduced. But the VEBEK[1] overcome these types of problems. It has the ability to transmit 64 bit data. It provides full security to the whole message. It encrypts the whole data. The key generation based on the 8 or 10 digits. Here sensor is used in between the process of the crypto module and packet transmission. The virtual energy of the sensor is dynamically changed through AES encryption mechanism. 3. WIRELESS SENSOR NETWORK (WSN) A wireless sensor network (WSN) consists of spatially spread autonomous sensors to monitor physical or natural situation, such as temperature, sound, pressure, etc. and to freely pass their data through the network to a main location. The
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 194 expansion of wireless sensor networks was forced by military applications such as battleground observation; today such networks are used in many industrial and consumer applications. The WSN is built of "nodes" – from a little to a number of hundreds or even thousands, where each node is related to one (or sometimes several) sensors. Each such sensor network node has usually several parts: a radio transceiver with an interior antenna or link to an outside antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy resource, usually a battery or an surrounded form of energy harvesting. Size and cost constraint on sensor nodes outcome in equivalent constraints on resources. The topology of the WSNs can differ from a easy star network to an superior multi-hop wireless mesh network. The transmission technique between the hops of the network can be routing or flooding. 3.1 Platforms 3.1.1 Software Energy is the scarcest source of WSN nodes, and it determines the life span of WSNs. WSNs are proposed to deployed in vast number in a mixture of environments, jointly with distant and destructive regions, where ad hoc communications are a key component. For this basis, algorithms and protocols require to address the following issues: • Lifetime maximization • Robustness and fault tolerance • Self-configuration Lifetime maximization: Energy/Power utilization of the sensing device should be minimized and sensor nodes should be energy efficient since their partial energy resource determines their lifetime. To save power the node should shut off the radio power supply when not in use. 3.1.2 Hardware One main challenge in a WSN is to generate low cost and small sensor nodes. There are an growing number of small companies producing WSN hardware and the commercial circumstances can be compared to home computing in the 1970s. Many of the nodes are still in the study and growth stage, mainly their software. Also natural to sensor network acceptance is the use of very low power methods for data achievement. In many applications, a WSN communicates with a Local Area Network or Wide Area Network during a gateway. The access acts as a link between the WSN and the other network. 4. EXISTING SYSTEM Some of the drawbacks occurred in the existing system. RC4 algorithm is used. In that security is low and only 40 bit is transmitted. It follows simple and ancient techniques. It will encrypt the stream of bytes using Stream-Cipher technology. 5. PROPOSED SYSTEM The complete project deals with the key process of WSN’s. WSN’s is a technique to verify the data or message line by line and give up the fake packets. It also maintain the condition of the sensor. Here the proposed system uses AES algorithm instead of using the RC4 algorithm. The proposed system has some merits compared with the existing system. The proposed system uses the recent and superior encryption technique. The block of the data encrypted using the block- cipher technique. Using WSN 64 bits of data are transmitted. Based on the encryption technique the whole process is completely secured. 6. OPERATIONS The VEBEK contains the following four operations: 1. Virtual energy based keying module. 2. Encryption. 3. Packet transmission and reception module. 4. Performance analysis module. 6.1. Virtual Energy Based Keying Module The virtual energy-based keying process involves the creation of active keys. Opposite to other active keying schemes, it does not exchange extra messages to create keys. A sensor node computes keys based on its enduring virtual energy of the sensor. The key is then feed into the next module. 6.2. Encryption The encryption module in VEBEK employs a simple encoding process, which is basically the process of variation of the bits in the packet according to dynamism created variation code generated via AES encryption technique. The encoding is a simple encryption mechanism adopted for VEBEK. However, VEBEK’s elastic architecture allows for adoption of stronger encryption mechanisms. 6.3. Packet Transmission and Reception Module The Packet transmission and reception module handles the process of sending or receiving of encoded packets along the path to the sink. And also get the acknowledgement from the receiver side to conform the delivery status of the node.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 195 6.4. Performance Analysis Module In the performance analysis module we are going to consider the false injection and eavesdropping of messages from an outside malicious node. And also check a routing path is established from the sources in the event region to the sink. We assume that the path is permanent during the delivery of the data and the route setup is secure. So the sensor network is thickly occupied generate reports for the same event. This module will help to analyze the performance of the nodes. 7. ARCHITECTURE In our general architecture of implementation we use the concept of AES encryption algorithm. Fig 1.General architecture for Key management scheme for wireless sensor networks The dynamic key is generated from the base station. (i.e.) one time dynamic key is employed for one packet only and different keys are used for the successive packets. The original message is encrypted using the AES encryption algorithm and with the secret key (dynamic key).Then the encrypted message is given to the sensor. In the sensor, it will decrypt the message and verify the packets whether the message is came from correct source or it is send by the malicious outsider. If the message is send by the malicious outsider it is detected and dropped by the sensor. Otherwise it is forwarded to the mobile sink i.e. to the receiver. 8. ALGORITHM 1. Cipher (byte in[4*Nb], byte out[4*Nb], word w[Nb*(Nr+1)]) 2. begin 3. byte state[4,Nb] 4. State = in 5. AddRoundKey (state, w) 6. for round = 1 step 1 to Nr-1 7. SubBytes(state) 8. ShiftRows(state) 9. MixColumns(state) 10. AddRoundKey(state, w+round*Nb) 11. end for 12. SubBytes(state) 13. ShiftRows(state) 14. AddRoundKey(state, w+Nr*Nb) 15. out = state 16. end AES is based on a design principle known as a substitution- permutation network, and is fast in both software and hardware. AES is a adjustment of Rijndael which has a preset block size of 128 bits, and an input size of 128, 192, or 256 bits. By difference, the Rijndael arrangement per se is specified with block and key sizes that may be any multiple of 32 bits, both with a least of 128 and a greatest of 256 bits. AES operates on a 4×4 column matrix of bytes, termed the position, although some versions of Rijndael have a larger chunk size and have additional columns in the position. Most AES calculations are done in a special finite field. The input size used for an AES cipher specifies the number of repetitions of change rounds that change the input, called the plaintext, into the last output, called the cipher text. Each round consists of several processing steps, each containing four related but dissimilar stages, as well as one that depends on the encryption input itself. A set of reverse rounds are applied to convert cipher text back into the unique plaintext using the same encryption key. High-level Description of the Algorithm 1. KeyExpansion—round keys are resulting from the cipher key using Rijndael's input plan. AES requires a separate 128-bit round key block for each round plus one more. DYNAMIC KEY GENERATION AES ENCRYPTION, MESSAGE DYNAMIC KEY, AES DECRYPTION, MESSAGE ORIGINAL MESSAGE
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 196 2. InitialRound 1. AddRoundKey—each byte of the position is combined with a block of the round key using bitwise xor. 3. Rounds 1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. ShiftRows—a transposition step where each row of the state is shifted cyclically a certain number of steps. 3. MixColumns—a mixing operation which operates on the columns of the position, merge the four bytes in each column. 4. AddRoundKey 4. Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey. CONCLUSIONS This paper describes the concept of One time dynamic key structure used for only one packet and variant keys are used for the successive packets. It protects the entire data against the unauthorized users or hackers. It protects the data by generating different keys for each time and it shows the path and size of the file in the text box. It helps to send the message in highly secure manner. REFERENCES [1]. Arif Selcuk Uluagac, Student Member, IEEE, Raheem A. Beyah, Senior Member, IEEE,Yingshu Li, Member, IEEE, and John A. Copeland, Fellow, IEEE” VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 7, JULY 2010 [2]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,“Wireless Sensor Networks: A Survey,” Computer Networks,vol. 38, no. 4, pp. 393-422, Mar. 2002. [3]. C. Kraub, M. Schneider, K. Bayarou, and C. Eckert, “STEF: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks,” Proc. Second Int’l Conf. Availability, Reliability and Security (ARES ’07), pp. 310- 317, Apr. 2007. [4]. Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006. [5]. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 23, no. 4, pp. 839-850, Apr. 2005. BIOGRAPHIES Ms. S. Selvi Working as a assistant professor in Sri Vidya College of Engineering and Technology . She has completed Master of Engineering in computer science and Engineering at Coimbatore Institute of Engineering & Technology,Coimbatore. Her under graduation in computer science and Engineering at PSR Engineering College,Sivakasi.Her area of interest is Network Security. Ms. G. Sankareeswari Working as a assistant professor in Sri Vidya College of Engineering and Technology . She has completed Master of Engineering in computer science and Engineering at Mohamed Sathak Engineering College at Kilakarai. Her under graduation in Information Technology at Raja College of Engineering Technology, Madurai. Her area of interest is Cloud Computing and Networks security. Ms. R. Vidhyalakshmi Working as a assistant professor in Sri Vidya College of Engineering and Technology . She has completed Master of Engineering in computer science and Engineering at P.S.R Engineering College at Sivakasi. Her under graduation in Information Technology at P.S.R Engineering College at Sivakasi. Her area of interest is Cloud Computing and Networks security.