SlideShare a Scribd company logo
1 of 25
TITLE: HIGHLY SCALABLE KEY PRE-DISTRIBUTION
SCHEME FOR WIRELESS SENSOR NETWORKS
BATCH MEMBERS :
PROJECT GUIDE:
HIGHLY SCALABLE KEY PRE-DISTRIBUTION
SCHEME FOR WIRELESS SENSOR NETWORKS
ABSTRACT:
• We propose a new scalable key management scheme for
wireless sensor network which provides a good secure
connectivity coverage.
• The main purpose of this system is that it provides high
network scalability and good key sharing probability.
• Moreover for an equal network size, our solution reduces
significantly the storage overhead compared to those of
existing solutions
Network scalability at equal key ring size.
Key ring size at equal network size.
Energy consumption at equal network size.
Network connectivity at equal key ring size.
SCOPE OF PROJECT
EXISTING SYSTEM
Wireless sensor networks are increasingly used
in critical applications within several fields
including military, medical and industrial sectors.
Due to sensitivity of the existing system,
sophisticated security services are required.
On the other hand, because of the lack of
infrastructure in WSNs, we have usually no trust
on third party which can attribute pair wise secret
keys to neighboring nodes, that is why most
existing solutions are based on key pre-
distribution.
PROPOSED SYSTEM
Our aim is to tackle the scalability issue
without degrading the other network
performance metrics.
This design of scheme ensures a good secure
coverage of large scale networks with a low
key storage overhead and a good network
resiliency.
MODULE NAMES
• Node Deployment
• Key Generation
• Key Pre-distribution Technique
• Secure Transmission with Energy
USE CASE
DIAGRAM:
Source
Router
Key verification
View no.on Nodes
/Blocks
Destination
Browse a file
Send File
Node Deploy
Generate key
Destination Path
File Transfer
DATAFLOW
DIAGRAM:
Source
Destination
IP Address
View No.of Nodes/
Blocks
Router
Key genarate
IP Address
File Received
End
Browse Destination
Path
End
Browse a
File
no
yes
File
Verified
File Transferred
Key
Verification
waiting
for verification
File Transfer
Node Deployed
KeyVerify
N4
N5
N1
N2
N3
N6
STORAGE NODE
SYSTEM
ARCHITECTURE:
1. NODE DEPLOYMENT
• The first module is Node deployment, where
the node can be deployed by specifying the
number of nodes in the network.
• After specifying the number of nodes in the
network, the nodes are deployed.
• The nodes are deployed with unique ID
(Identity) number so that each can be
differentiated.
• And also nodes are deployed with their energy
levels.
2. KEY GENERATION
• After the Node deployment module, the key
generation module is developed, where the
number of nodes and number of blocks should
be specified, so that the key will be generated.
• The key is symmetric key and the key is
displayed in the text area given in the node.
•In this module, we generate blocks of m order
initial design, where each block corresponds to
a key set. We pre-load then each node with t
completely disjoint blocks where t is a protocol
parameter that we will discuss later in this
section.
•After the deployment step, each two neighbors
exchange the identifiers of their keys in order to
determine the common keys.
•This approach enhances the network
resiliency since the attackers have to
compromise more overlap keys to break a
secure link.
3. KEY PRE-DISTRIBUTION TECHNIQUE
4. Secure Transmission with Energy
• In this module, the node distance is configured
and then the nodes with their neighbor
information are displayed.
• So the nodes which is near by the node, is
selected and the energy level is first calculated
to verify the secure transmission.
• After that the data is uploaded and sent to the
destination node, where in the destination
node, the key is verified and then the data is
received.
MODULE SCREENSHOTS:
1. Securing wireless sensor networks: a survey
AUTHORS:
Y. Zhou, Y. Fang, and Y. Zhang
• The significant advances of hardware manufacturing
technology and the development of efficient software
algorithms make technically and economically feasible a
network composed of numerous, small, low-cost sensors
using wireless communications, that is, a wireless sensor
network. WSNs have attracted intensive interest from both
academia and industry due to their wide application in
civil and military scenarios.
2. Random key pre-distribution schemes for
sensor networks
AUTHORS:
H. Chan, A. Perrig, and D. Song
• Key establishment in sensor networks is a challenging
problem because asymmetric key cryptosystems are
unsuitable for use in resource constrained sensor nodes,
and also because the nodes could be physically
compromised by an adversary. We present three new
mechanisms for key establishment using the framework
of pre-distributing a random set of keys to each node
HARDWARE CONFIGURATION:-
•Processor - Pentium –IV
•Speed - 1.1 Ghz
•RAM - 256 MB(min)
•Hard Disk - 20 G
•Key Board - Standard Windows Keyboard
•Mouse - Two or Three Button Mouse
•Monitor - SVGA
SOFTWARE CONFIGURATION:-
•Operating system : Windows XP.
•Coding Language : C# , Net.
•Data Base : SQL Server 2005
•Tool : VISUAL STUDIO 2008.
•To achieve security in wireless sensor networks, it is
important to be able to encrypt messages sent among sensor
nodes.
•Recently, a random key pre-distribution scheme and its
improvements have been proposed.
•We show that the performance (including connectivity,
memory usage, and network resilience against node capture) of
sensor networks can he substantially improved with the use of
our proposed scheme. The scheme and its detailed performance
evaluation are presented in this paper.
CONCLUSION:
REFERENCE:
Walid Bechkit, Yacine Challal, Abdelmadjid
Bouabdallah, and Vahid Tarokh-“ A Highly Scalable
Key Pre-Distribution Scheme for Wireless Sensor
Networks”- IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS, VOL. 12, NO.
2, FEBRUARY 2013
Safest Way of Message or File Transfer using Key Distribution

More Related Content

What's hot

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networksBrockanurag
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkGyanendra Prakash
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 

What's hot (20)

Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wsn1 ppt
Wsn1 pptWsn1 ppt
Wsn1 ppt
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wlan security
Wlan securityWlan security
Wlan security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Security issues
Security issuesSecurity issues
Security issues
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 

Similar to Safest Way of Message or File Transfer using Key Distribution

A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhaustingjpstudcorner
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.pptTekle12
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking moduleeSAT Journals
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEEMEMTECHSTUDENTPROJECTS
 

Similar to Safest Way of Message or File Transfer using Key Distribution (20)

A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Sem
SemSem
Sem
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhausting
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking module
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Safest Way of Message or File Transfer using Key Distribution

  • 1. TITLE: HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS BATCH MEMBERS : PROJECT GUIDE:
  • 2. HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS ABSTRACT: • We propose a new scalable key management scheme for wireless sensor network which provides a good secure connectivity coverage. • The main purpose of this system is that it provides high network scalability and good key sharing probability. • Moreover for an equal network size, our solution reduces significantly the storage overhead compared to those of existing solutions
  • 3. Network scalability at equal key ring size. Key ring size at equal network size. Energy consumption at equal network size. Network connectivity at equal key ring size. SCOPE OF PROJECT
  • 4. EXISTING SYSTEM Wireless sensor networks are increasingly used in critical applications within several fields including military, medical and industrial sectors. Due to sensitivity of the existing system, sophisticated security services are required. On the other hand, because of the lack of infrastructure in WSNs, we have usually no trust on third party which can attribute pair wise secret keys to neighboring nodes, that is why most existing solutions are based on key pre- distribution.
  • 5. PROPOSED SYSTEM Our aim is to tackle the scalability issue without degrading the other network performance metrics. This design of scheme ensures a good secure coverage of large scale networks with a low key storage overhead and a good network resiliency.
  • 6. MODULE NAMES • Node Deployment • Key Generation • Key Pre-distribution Technique • Secure Transmission with Energy
  • 7. USE CASE DIAGRAM: Source Router Key verification View no.on Nodes /Blocks Destination Browse a file Send File Node Deploy Generate key Destination Path File Transfer
  • 8. DATAFLOW DIAGRAM: Source Destination IP Address View No.of Nodes/ Blocks Router Key genarate IP Address File Received End Browse Destination Path End Browse a File no yes File Verified File Transferred Key Verification waiting for verification File Transfer Node Deployed KeyVerify
  • 10. 1. NODE DEPLOYMENT • The first module is Node deployment, where the node can be deployed by specifying the number of nodes in the network. • After specifying the number of nodes in the network, the nodes are deployed. • The nodes are deployed with unique ID (Identity) number so that each can be differentiated. • And also nodes are deployed with their energy levels.
  • 11. 2. KEY GENERATION • After the Node deployment module, the key generation module is developed, where the number of nodes and number of blocks should be specified, so that the key will be generated. • The key is symmetric key and the key is displayed in the text area given in the node.
  • 12. •In this module, we generate blocks of m order initial design, where each block corresponds to a key set. We pre-load then each node with t completely disjoint blocks where t is a protocol parameter that we will discuss later in this section. •After the deployment step, each two neighbors exchange the identifiers of their keys in order to determine the common keys. •This approach enhances the network resiliency since the attackers have to compromise more overlap keys to break a secure link. 3. KEY PRE-DISTRIBUTION TECHNIQUE
  • 13. 4. Secure Transmission with Energy • In this module, the node distance is configured and then the nodes with their neighbor information are displayed. • So the nodes which is near by the node, is selected and the energy level is first calculated to verify the secure transmission. • After that the data is uploaded and sent to the destination node, where in the destination node, the key is verified and then the data is received.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. 1. Securing wireless sensor networks: a survey AUTHORS: Y. Zhou, Y. Fang, and Y. Zhang • The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios.
  • 20. 2. Random key pre-distribution schemes for sensor networks AUTHORS: H. Chan, A. Perrig, and D. Song • Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the framework of pre-distributing a random set of keys to each node
  • 21. HARDWARE CONFIGURATION:- •Processor - Pentium –IV •Speed - 1.1 Ghz •RAM - 256 MB(min) •Hard Disk - 20 G •Key Board - Standard Windows Keyboard •Mouse - Two or Three Button Mouse •Monitor - SVGA
  • 22. SOFTWARE CONFIGURATION:- •Operating system : Windows XP. •Coding Language : C# , Net. •Data Base : SQL Server 2005 •Tool : VISUAL STUDIO 2008.
  • 23. •To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. •Recently, a random key pre-distribution scheme and its improvements have been proposed. •We show that the performance (including connectivity, memory usage, and network resilience against node capture) of sensor networks can he substantially improved with the use of our proposed scheme. The scheme and its detailed performance evaluation are presented in this paper. CONCLUSION:
  • 24. REFERENCE: Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”- IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 2, FEBRUARY 2013