SlideShare a Scribd company logo
1 of 4
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3209
Markle Tree Based Authentication Protocol for
Lifetime Enhancement in Wireless Sensor
Networks
Mallikarjunaswamy N J 1
Assistant Professor, S.I.E.T, Tumkur
Research Scholar,
Visvesvaraya Technological University, Belgaum,
mallikarjuna2010@gmail.com
Latha Yadav T R 2
Assistant Professor, A.I.T, Tumkur
Research Scholar,
Visvesvaraya Technological,University, Belgaum,
chethusavi3@gmail.com
Dr. Keshava Prasanna 3
Professor, Dept of CSE,
C.I.T, Gubbi,
Tumkur
keshava2011@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable,
reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic
operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes
more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based
Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a
famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the
proposed method are more effective than the existing methodologies.
Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN).
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. Introduction
Wireless sensor network(WSN) is an Adhoc like
infrastructure less network that work like self organizing,
self healing, autonomous, each and every node cooperate
with each other. sensor nodes are unattended devices
that are severely constrained in terms of processing
power, memory size and energy levels and tradeoff
between security and energy consumption are major
concerns for all application.
Since WSN are resource constrained networks, we
propose a pragmatic approach where we try to balance
these two opposing design elements: security and
energy. We evaluate our proposal achieve more energy
efficient compare to previous.
Code dissemination protocol (eg., MNP[1], MOAP[2],
Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have
been improved recently to propagate code images using
the wireless network created by the wireless nodes.
Originally these proposed protocols generally will not
give any security without using a hash function. In this,
common question raises is that, how we apply hash
function to the piece of data which traverse throughout
the network widely. assume well-behaves (i.e.,non
malicious) sensors of all the reprogramming protocol in
the literature Deluge[6] is the benchmark. Also it has
been included in the tinyOS distributions.
In order to provide authentication to the entire data is
normally based on signature of hash tree. The generating
hash tree signature is of two types, one is by using chain
operation and other is markle tree. To generate hash
chain, each packet gives its hash value to its upstream
packets until to reach end of packet with the signature.
As in markle tree each packet generates its own hash
value independently and produces hash tree with the
signature (top of the node).
In the recent years much progress has been made in the
design of practical one way hashing algorithms which is
efficient for implementation by both hardware and
software. The message digest family which consist of
various algorithms such as MD5, SHA1, and 2AMD
which produces standard output of 128bit, 160bit and
160bit respectively.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3210
Fig 1, States that the previous affairs of message
authentication which deals with the balancing nature
between security and energy. When security increases
along with the energy so challenging task is to provide
high security with the minimum energy.
Fig 1: Previous affairs of message authentication
The main purpose of this research is to produce a
signature at receiver by using partial hash tree
information by the base station and validate the each
packet by using one way hashing algorithm of 160 bit
output to enhance the security and energy consumption.
The proposed paper gives improved version of security
with a less execution/run time at receiver end. The result
shows that proposed scheme provides better security
than the existing one.
This paper is organized as follows: Section II presents
the related work and section III presents the proposed
methodology. Section IV presents the Experimental
analysis. Section V contains the conclusion and future
work.
II. Related Work
Wireless sensor networking is a wide technology to
observe and extract data from the environment and has
an important role in ubiquitous computing. However,
these benefits come with various limitations,
vulnerabilities, and risks.
To distinguish legitimate data from intruder's data,
authentication techniques are frequently used to verify
the integrity of the received data in a communication
system. There are several message authentication
schemes in wireless sensor networks have been
proposed. The authentication techniques used in the
severely constrained wireless sensor network
environments.
Carlos F. et al[7] aims at having a more balanced
solution by being more energy conscious, proposing in
some instances partial but attack aware solutions. More
chance of being adopted in sensor network scenarios
needing security in the reprogramming process. Another
contribution is that can make evident in energy that radio
operations are the most energy consuming operations in
update dissemination.
Ayman Tajeddine et al[8] proposed a different
authentication techniques suitable for the severely
constrained sensor nodes in WSNs, and addressed three
main categories based on symmetric cryptography,
asymmetric cryptography, and hybrid techniques using
both cryptographic methods.
Haider M. AI-Mashhadi et al [9] proposed that the
performance of 2AMD-160 improves in increasing of
security and time consuming without compromising the
security. It is found that the number of message blocks
influences the run time of the hash function while the
increment in message size only slightly increase the run
time.
So, by using the new proposed approach the
performance is evaluated and compared with other
methods under the same test results to demonstrate the
effectiveness of the new approach with regards to
enhancement of the run time and security of message in
wireless sensor network nodes.
Assumptions
1. The Base station is a powerful entity, with unlimited
energy and memory with high frequency range.
2. There is a packet size limit; maximum payload size is
102 bytes.
3. Each sensor node in the network is preconfigured
with the minimum energy and memory.
III. Proposed Methodology
The solution we proposed is the image size is divided
into equal number of pages and each page is subdivided
into equal number of packets.
Apply the hash function for number of packets [10], as
shown in fig 2.
Fig 2. Applying Hash Functions
Generating signature has two types 1) using partial tree
information and 2) using hexadecimal addition.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3211
In case of partial tree information sender sends the
partial information of tree as like h2, h10 and h14.
Using partial information receiver can easily
generate the signature at receiver side.
h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side.
In case of using hexadecimal addition the receiver can
generate the signature as shown below format.
h1+h2=h9
h3+h4=h10
h5+h6=h11
h7+h8=h12
h9+h10=h13
h11+h12=h14
h13+h14=h15  Signature at receiver side
Finally, 160 bit signature is generated. This proposed
approach is more effective compare to previous
approaches. Existing methodologies proposes either
MD5 (which gives output of 120 bits, but 2AMD gives
160 bits) or SHA1 (which gives 80 rounds where as in
2AMD-160 included 64 rounds).
Table 1.key characteristics of 2AMD-160
algorithm[9].
IV. Experimental Analysis
The 2AMD-160 methodology enhances the efficient way
of encrypting the data in secured environment. In order
to encrypt data, SHA1 algorithm uses 0.47 Time/ms to
process only the single space, but the new methodology
2AMD-160 takes 0.2 Time/ms of execution time. So,
2AMD-160 consumes less execution time compared to
the existing methods such as SHA1, SHA256 and
SHA512, which in turn gives the better performance.
Performance Evaluation
In this we evaluate the comparison between chain based
hash tree versus markle tree based hash tree in terms of
packet verification, packet receiving at destination node,
size of the signature in terms of bits.
Table 2. key characteristics of Hash tree.
Hash
tree
Packet
verification
Packets
receive at
destination
Signature
(size)
Chain
based
Dependent Sequential 160 bit
Markle
tree
Independent Random 160 bit
V. Conclusion
The proposed system message authentication enhances
security with light weight hash function at the receiver
node; the default hash tree balances security and
provides independent packet verification with 160bit
signature and authenticates every packet by using
2AMD-160 algorithm. The proposed scheme ensures
that markle tree is more efficient then chain based hash.
The performance evaluation result shows that the
proposed scheme is effective and scalable.
Future work
We are planning to propose new algorithm for better
encryption and decryption method for message
authentication.
References
[1] S. Kulkarni, and L. Wang, “MNP: Multihop network
reprogramming service for sensor networks”,
Proceedings of the 25th IEEE International Conference
on Distributed Computing Systems, Columbus Ohio
USA, pp. 7-16, Jun 2005.
[2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A
remote code update mechanism for wireless sensor
networks", CENS Technical Report 30, University of
California UCLA, 2003.
[3] J. Hui, and D. Culler, “The dynamic behavior of a
data dissemination protocol for network programming at
scale”, Proceedings of the 2nd international conference
on Embedded networked sensor systems, Baltimore MD
USA, pp. 81-94, Nov 2004.
[4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and
W. Chappell, “Energy-efficient on-demand
reprogramming of large-scale sensor networks”, ACM
Transactions on Sensor Network, 4(1):1-38, 2008.
[5] V. Naik, A. Arora, P. Sinha, and H. Zhang,
“Sprinkler: A reliable and energy efficient data
dissemination service for wireless embedded devices”,
Proceedings of the 26th IEEE International Real-Time
Systems Symposium, Miami Florida USA, pp. 277-286,
Dec 2005.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3212
[6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low
overhead wireless reprogramming for sensor networks",
26th IEEE International Conference on Computer
Communications, pp. 928-936, 2007.
[7] Ayman Tajeddine Ayman Kayssi Ali Chehab
Imad Elhajj, ”Authentication Schemes for Wireless
Sensor Networks ”Proceedings of 17th
IEEE
Mediterranean Electro technical Conference, Beirut,
Lebanon, 13-16 April 2014.
[8] Carlos F. Caloca de la Parra, J. Antonio Garcia-
Macias,” A Protocol for Secure and Energy-Aware
Reprogramming in WSN”, Proceedings of 2009
International Conference on wireless communications
and mobile computing connecting the world wirelessly.
[9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq
Rehab F. Hassan ,” Secure and Time Efficient Hash-
based Message Authentication Algorithm for Wireless
Sensor Networks” Proceedings of IEEE,978-1-4799-
5627-2/14, 2014.
[10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional
Broadcasting Authentication Scheme for Wireless
Sensor Networks” Proceedings of IEEE,978-1-5090-
0089-0/15, 2015.
[11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime
enhancement in wireless sensor networks using fuzzy
approach and A-star algorithm," IEEE Sensors J., vol.
12, no. 10, pp. 3010-3018, Oct. 2012.
[12] Trevatha.l., Ghodosi H., and Myers T., "Efficient
batch authentication for hierarchical wireless sensor
networks," in IEEE ISSNIP, pp. 217-222, 2011.
Biographies and Photographs
Mallikarjunswamy received BE from
Visvesvaraya Technological
University and M.Tech in computer
science and engineering in the year
2011 and pursuing Ph.D in VTU.
Teaching and Academic experience of 5 years. Life
membership in Indian Society for Technical Education.
Latha Yadav T R received BE from
Visvesvaraya Technological
University and M.Tech in Digital
Electronics in the year 2013 and
pursuing Ph.D in VTU. Teaching and
Academic experience of 3.5 years.
Dr. KeshavaPrasanna received B.E
from Bangalore University and
M.Tech in Information and
Technology in the year 2005 and Ph.D
from Tumkur University in the year
2014. Teaching and Academic experience of 14 years.
Life membership in Indian Society for Technical
Education (ISTE).

More Related Content

What's hot

Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Miningijsc
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...ijsrd.com
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...ijsc
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksIRJET Journal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 

What's hot (20)

Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
 
7 ijcse-01229
7 ijcse-012297 ijcse-01229
7 ijcse-01229
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
 
E017422935
E017422935E017422935
E017422935
 
Ee4301798802
Ee4301798802Ee4301798802
Ee4301798802
 
AWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPERAWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPER
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
Ttacca
TtaccaTtacca
Ttacca
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 

Similar to Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...IRJET Journal
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 

Similar to Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks (20)

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3209 Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks Mallikarjunaswamy N J 1 Assistant Professor, S.I.E.T, Tumkur Research Scholar, Visvesvaraya Technological University, Belgaum, mallikarjuna2010@gmail.com Latha Yadav T R 2 Assistant Professor, A.I.T, Tumkur Research Scholar, Visvesvaraya Technological,University, Belgaum, chethusavi3@gmail.com Dr. Keshava Prasanna 3 Professor, Dept of CSE, C.I.T, Gubbi, Tumkur keshava2011@rediffmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the proposed method are more effective than the existing methodologies. Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN). -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. Introduction Wireless sensor network(WSN) is an Adhoc like infrastructure less network that work like self organizing, self healing, autonomous, each and every node cooperate with each other. sensor nodes are unattended devices that are severely constrained in terms of processing power, memory size and energy levels and tradeoff between security and energy consumption are major concerns for all application. Since WSN are resource constrained networks, we propose a pragmatic approach where we try to balance these two opposing design elements: security and energy. We evaluate our proposal achieve more energy efficient compare to previous. Code dissemination protocol (eg., MNP[1], MOAP[2], Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have been improved recently to propagate code images using the wireless network created by the wireless nodes. Originally these proposed protocols generally will not give any security without using a hash function. In this, common question raises is that, how we apply hash function to the piece of data which traverse throughout the network widely. assume well-behaves (i.e.,non malicious) sensors of all the reprogramming protocol in the literature Deluge[6] is the benchmark. Also it has been included in the tinyOS distributions. In order to provide authentication to the entire data is normally based on signature of hash tree. The generating hash tree signature is of two types, one is by using chain operation and other is markle tree. To generate hash chain, each packet gives its hash value to its upstream packets until to reach end of packet with the signature. As in markle tree each packet generates its own hash value independently and produces hash tree with the signature (top of the node). In the recent years much progress has been made in the design of practical one way hashing algorithms which is efficient for implementation by both hardware and software. The message digest family which consist of various algorithms such as MD5, SHA1, and 2AMD which produces standard output of 128bit, 160bit and 160bit respectively.
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3210 Fig 1, States that the previous affairs of message authentication which deals with the balancing nature between security and energy. When security increases along with the energy so challenging task is to provide high security with the minimum energy. Fig 1: Previous affairs of message authentication The main purpose of this research is to produce a signature at receiver by using partial hash tree information by the base station and validate the each packet by using one way hashing algorithm of 160 bit output to enhance the security and energy consumption. The proposed paper gives improved version of security with a less execution/run time at receiver end. The result shows that proposed scheme provides better security than the existing one. This paper is organized as follows: Section II presents the related work and section III presents the proposed methodology. Section IV presents the Experimental analysis. Section V contains the conclusion and future work. II. Related Work Wireless sensor networking is a wide technology to observe and extract data from the environment and has an important role in ubiquitous computing. However, these benefits come with various limitations, vulnerabilities, and risks. To distinguish legitimate data from intruder's data, authentication techniques are frequently used to verify the integrity of the received data in a communication system. There are several message authentication schemes in wireless sensor networks have been proposed. The authentication techniques used in the severely constrained wireless sensor network environments. Carlos F. et al[7] aims at having a more balanced solution by being more energy conscious, proposing in some instances partial but attack aware solutions. More chance of being adopted in sensor network scenarios needing security in the reprogramming process. Another contribution is that can make evident in energy that radio operations are the most energy consuming operations in update dissemination. Ayman Tajeddine et al[8] proposed a different authentication techniques suitable for the severely constrained sensor nodes in WSNs, and addressed three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. Haider M. AI-Mashhadi et al [9] proposed that the performance of 2AMD-160 improves in increasing of security and time consuming without compromising the security. It is found that the number of message blocks influences the run time of the hash function while the increment in message size only slightly increase the run time. So, by using the new proposed approach the performance is evaluated and compared with other methods under the same test results to demonstrate the effectiveness of the new approach with regards to enhancement of the run time and security of message in wireless sensor network nodes. Assumptions 1. The Base station is a powerful entity, with unlimited energy and memory with high frequency range. 2. There is a packet size limit; maximum payload size is 102 bytes. 3. Each sensor node in the network is preconfigured with the minimum energy and memory. III. Proposed Methodology The solution we proposed is the image size is divided into equal number of pages and each page is subdivided into equal number of packets. Apply the hash function for number of packets [10], as shown in fig 2. Fig 2. Applying Hash Functions Generating signature has two types 1) using partial tree information and 2) using hexadecimal addition.
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3211 In case of partial tree information sender sends the partial information of tree as like h2, h10 and h14. Using partial information receiver can easily generate the signature at receiver side. h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side. In case of using hexadecimal addition the receiver can generate the signature as shown below format. h1+h2=h9 h3+h4=h10 h5+h6=h11 h7+h8=h12 h9+h10=h13 h11+h12=h14 h13+h14=h15  Signature at receiver side Finally, 160 bit signature is generated. This proposed approach is more effective compare to previous approaches. Existing methodologies proposes either MD5 (which gives output of 120 bits, but 2AMD gives 160 bits) or SHA1 (which gives 80 rounds where as in 2AMD-160 included 64 rounds). Table 1.key characteristics of 2AMD-160 algorithm[9]. IV. Experimental Analysis The 2AMD-160 methodology enhances the efficient way of encrypting the data in secured environment. In order to encrypt data, SHA1 algorithm uses 0.47 Time/ms to process only the single space, but the new methodology 2AMD-160 takes 0.2 Time/ms of execution time. So, 2AMD-160 consumes less execution time compared to the existing methods such as SHA1, SHA256 and SHA512, which in turn gives the better performance. Performance Evaluation In this we evaluate the comparison between chain based hash tree versus markle tree based hash tree in terms of packet verification, packet receiving at destination node, size of the signature in terms of bits. Table 2. key characteristics of Hash tree. Hash tree Packet verification Packets receive at destination Signature (size) Chain based Dependent Sequential 160 bit Markle tree Independent Random 160 bit V. Conclusion The proposed system message authentication enhances security with light weight hash function at the receiver node; the default hash tree balances security and provides independent packet verification with 160bit signature and authenticates every packet by using 2AMD-160 algorithm. The proposed scheme ensures that markle tree is more efficient then chain based hash. The performance evaluation result shows that the proposed scheme is effective and scalable. Future work We are planning to propose new algorithm for better encryption and decryption method for message authentication. References [1] S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005. [2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003. [3] J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004. [4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008. [5] V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3212 [6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007. [7] Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014. [8] Carlos F. Caloca de la Parra, J. Antonio Garcia- Macias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly. [9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hash- based Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-4799- 5627-2/14, 2014. [10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks” Proceedings of IEEE,978-1-5090- 0089-0/15, 2015. [11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012. [12] Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011. Biographies and Photographs Mallikarjunswamy received BE from Visvesvaraya Technological University and M.Tech in computer science and engineering in the year 2011 and pursuing Ph.D in VTU. Teaching and Academic experience of 5 years. Life membership in Indian Society for Technical Education. Latha Yadav T R received BE from Visvesvaraya Technological University and M.Tech in Digital Electronics in the year 2013 and pursuing Ph.D in VTU. Teaching and Academic experience of 3.5 years. Dr. KeshavaPrasanna received B.E from Bangalore University and M.Tech in Information and Technology in the year 2005 and Ph.D from Tumkur University in the year 2014. Teaching and Academic experience of 14 years. Life membership in Indian Society for Technical Education (ISTE).