SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -27
A Comparative Study for Source Privacy Preserving and
Message Authentication in Wireless Sensor Networks
Mr. Harish. G Mrs. Smitha Shekar. B Ms. Geetha. P. L
Department of C.S.E, Department of C.S.E, Department of C.S.E,
Dr. A.I.T, India Dr. A.I.T, India Dr. A.I.T, India
Abstract - Source node privacy and message authentication are the most important issues to be addressed in wireless
sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes
have stood by with some limitations like lack of scalability and high communication and computational overhead.
Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its
threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source
node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A
comparative study is done for the work that is implemented using ns2 and matlab.
Keywords: Wireless Sensor Networks (WSN), Greedy Random Walk (GRW), Source Privacy, Message Authentication
I. INTRODUCTION
A remote sensor system (WSN) comprises of spatially circulated self-governing sensors to screen physical or
ecological conditions, for example, temperature, sound, weight, and so forth and to agreeably go their information
through the system to a principle area. The more cutting edge systems are bi-directional, additionally empowering control
of sensor action. The advancement of remote sensor systems was roused by military applications, for example, war zone
reconnaissance; today such systems are utilized as a part of numerous mechanical and purchaser applications, for
example, modern procedure observing and control, machine wellbeing checking, etc. Wireless Sensor Networks (WSN)
is the collection of autonomous sensors that are spatially distributed. The sensor nodes responsibility is to monitor
environmental or physical conditions like pressure, temperature, etc., and to synchronically transfer their data through the
network. In that case, the most important point of concern will be the authentication of the messages transferred and the
privacy of the source node that transfers the messages to other node.
Message Authentication hinders the transmission of illegal and corrupted messages in the wireless sensor networks.
As a result many message authentication schemes were developed to achieve message Authenticity based on public-key
and private-key cryptosystems which led to complex key management, lack of scalability and high overhead. To
acknowledge these issues a polynomial-based scheme was introduced but it failed when the member of messages
transmitted exceeded its threshold limit. This issue can be overcome in Elliptic Curve Cryptography (ECC) method and
also RSA algorithm. Source node privacy is also one of the important issues. In spite of strong encryption, there are
chances of data getting exposed in wireless sensor network. The data can be any kind of identity information of a
particular node. In this paper, a source node privacy based message authentication using ECC and Greedy Random Walk
(GRW) algorithm to enable source privacy has been proposed. A comparative study is provided in two different
platforms, i.e., matlab and ns2.
II. LITERATURE SURVEY
In the paper titled Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks [1], Jian
Li, Yun Li, Jian Ren and Jie Wu proposed an efficient and scalable message authentication scheme based on ECC and
hop-by-hop message authentication, to overcome high overhead and to provide message source privacy. In the paper
titled Preserving source location privacy in monitoring-based wireless sensor networks [2], Yong Xi, Loren Schwiebert
and Weisong Shi proposed a two-way random walk algorithm to reduce an eaves dropper from collecting the
information. The delivery rate is improved by greedy forwarding and local broadcasting.
In the paper titled Random Walk Routing in Wireless Sensor Networks [3], Milad Kharratzadeh has presented a
review on routing techniques in wireless sensor networks, based on random walk applied to different kinds of topologies
like regular and random topologies.In the paper titled An Effective Scheme of Location Privacy Preserving in Monitoring
system for WSNs [4], K. Chaitanya Jyoti and V. Srinivas proposed a verification of privacy protection under
backtracking attack model and also the analysis of energy consumption. In the paper titled Protecting Location Privacy in
Wireless Sensor Networks against a Local Eavesdropper-A Survey [5], Chinnu George and Dhinakaran Nathaniel
presents a survey on existing privacy techniques in wireless sensor networks. They explained scenario of panda-hunter
problem with respect to the location privacy.There are chances of losing location information causing to suppress the
entire network.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -28
In the paper titled Source Location Privacy considerations in Wireless Sensor Networks [6], Ruben Rios and Javier
Lopez have given a survey regarding solutions to the threats especially in maintaining the privacy in wireless sensor
networks. A wireless sensor network consists of the sensors embedded in the environment which are responsible for
monitoring certain conditions. In such cases there are chances of privacy getting tampered. In the paper titled Emulated
Source/Sink Location Privacy Algorithm [ESLPA] for Secure Node and Sink in WSN [7], D. Gopinath and P. Ramesh
propose an ESLPA algorithm to address the data security and location privacy and to improve node level and sink level
privacy. It also deals with the source anonymity problem. In the paper titled Protecting Location Privacy in Wireless
Sensor Networks against Eavesdropper [8], Seema Goswami, Prof. Nidhi Chandrakar, Prof. Somesh Dewangam propose
a greedy random walk mechanism to deal with the source location privacy protection in wireless sensor networks since
sensor nodes are always at risk of its data and information getting exposed. In the paper titled Using MD5 and RSA
Algorithm Improve Security in MANETs Systems [9], Karamjeet Singh and Chaksher Goel propose a combination of
MD5 and RSA approaches to protect the data from various kinds of attacks. In the paper titled Secure Attribute Based
Disruption Tolerant Military Networks [10], Ms. Selva Sangeetha. S, Ms. Sharmila. S and Ms. Kalaivani. M propose a
secure attribute based scheme using rsa algorithm when there is no direct connection between the source and the
destination.
III. RELATED WORK
Message authentication and source node privacy are important issues in wireless sensor networks. Many techniques
have been proposed such as polynomial-based schemes random walk [3], location privacy [4] to address certain issues
like limiting the number of messages to be transmitted. But these techniques also leave behind certain issues that need to
be addressed. Privacy means protecting the data related to source like its ID and location. Many such privacy techniques
have been designed in wireless sensor networks. The privacy techniques in wireless sensor networks can be classified as
shown in the Fig. 1.
Fig. 1: Taxonomy of privacy techniques in WSNs
IV. PROPOSED SYSTEM
Here there is an attempt to build a source node privacy protection using Greedy Random walk (GRW) algorithm.
The flow of the proposed system is shown in the Fig. 2.
The proposed system targets at attaining the following goals:
Message Authentication: Each message receiving node should verify whether the message at the receiving end is sent
from the claimed user which is achieved using ECC.
Source identity and location privacy: Sender’s information like sender’s ID and location information cannot be
determined by the rival. To achieve this Greedy Random Walk algorithm is implemented.
A. Message Authentication
1) ECC algorithm: In this project, the Scalable Message Authentication scheme is proposed for secure message sending.
The proposed scheme allows any node to transmit an unlimited number of messages without suffering from threshold
problem. We are using ECC signature for message authentication. This scheme enables the nodes to authenticate the
message so that all corrupted message can be detected and dropped.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -29
2) The ECC encryption and signature generation is demonstrated below. Consider the parameters required for the ECC
algorithm which can be p (prime number), a & b (integer coefficients), G (base point), n (order of the curve generator G),
h (cofactor)
Fig. 2: Flowchart of the proposed system
Key Generation
Choose a random integer d to get the private key such that 0 < d < n
Then compute the public key P = s * G
Encryption
Choose a random integer r such that 0 < r < n
Calculate point R as a product of r and G, R = r * G
Ciphertext = r * G, m + r * P
Signature Generation
Select the parameters q, s, a, b, P, N, h
Let d be the private key and m be the message
Select random integer k and perform scalar multiplication i.e., k * p
Compute the hash function e = H(m)
Compute S = k-1
(e + d r) mod n
The signature of message m is (r,s)
Signature verification
Compute the hash function e = H(m)
Compute w = S-1
mod n
u1 = ew mod n and u2 = rw mod n
x = u1P + u2Q = (x1 , y1)
v = x1 mod n
verify whether v = r. if so then signature is verified.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -30
3) RSA algorithm: In this paper, encryption and authentication have been proposed in order to attain confidentiality and
integrity using RSA algorithm.
Key Generation
Initially encryption is achieved for a message M sent by the source, by choosing two prime numbers p and q. Then
ϕ(n) is computed as a product of (p -1) and (q – 1),
ϕ(n) = (p – 1) (q – 1)
The value of e is chosen and the value of d is computed using,
d e ≡ 1 ( mod ϕ(n) )
The public key pair will be (e , n) and the private key pair will be (d , n).
Encryption and Decryption
Suppose m is the message that the source wishes to send. It is encrypted using the public key pair which results as a
cipher text.
C = Me
mod n
The cipher text is sent to the destination through the set of nodes in the path to the destination, where the receiver
decrypts the cipher text using the private key pair that results with the original message.
M = Cd
mod n
Signature Generation
RSA also promotes authentication of the message by attaching the signature to the message. The source can use its
own private key to generate a signature.
S = Md
mod n
Signature verification
The signature is attached to the message and sent to the nodes and also the destination where they verify the signature
using the public key.
Mˈ = Se
mod n
Each node verifies the signature assuring that the message has arrived from a valid node.
B. Source Node Privacy
In order to increase the source node privacy protection, Greedy Random Walk (GRW) technique has been proposed.
There are chances of adversary knowing the source information like its ID and location. To address these issues Random
Walk was developed. The basic idea of random walk is that each packet takes a different path to the sink node and it does
not disclose any data about the source. A Greedy Random Walk (GRW) also termed as two-way random walk reduces
the chance of an illegal user collecting source related information. They use local broadcasting and greedy forwarding to
improve the delivery rate. The sink node sets up a path using random walk that consists of nodes called as receptors
which are as shown in Fig. 3a. Each packet is forwarded to the sink node from the source until it reaches one of the
receptors and then forwards the packet to the sink node through the pre-established path as shown in the Fig. 3b. The
greedy random walk chooses the path in a greedy manner. Each time the sensor picks up one of the neighbors randomly
that is not recently visited. It always tries to choose an unvisited area.
Fig. 3a: Random walk mechanism Fig. 3b: Greedy walk mechanism
V. EXPERIMENTAL SETUP
A. NS2
This project is implemented using ns2 simulator. The Fig. 4 gives the picture of deployment of the nodes in which 40
nodes are deployed in the network among which source and is selected by the user and destination node is fixed. The user
can select the message for transmission from source to destination through receptor nodes. The greedy random walk
algorithm is used for selecting the path from source to destination.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -31
Once the path is selected the message which has to be transferred will be encrypted and forwarded to the nodes in the
path, where each and every node are going to authenticate whether the data is corrupted or not which is shown in Fig. 5.
If data is corrupted the packet will be dropped else data will be transferred to destination successfully.
Fig. 4: Deployment of nodes
Fig. 5: Transmission of data
B. MATLAB
This project is also implemented in matlab where we deploy 30 nodes in an X-Y plane. The deployment of nodes in
matlab is shown in the Fig. 6. The nodes are scattered randomly in the defined field. The key distribution for the nodes is
depicted in the Fig. 7 and the transmission of packets between source and destination through the receptor node is shown
in the Fig. 8.
Fig. 6: Node Deployment Fig. 7: RSA key distribution
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -32
Fig. 8: Transmission of packets
VI. RESULTS
This section is going to give the overview of the performance measurement of the system in ns2 and matlab. The
Fig. 9 shows the graph which clearly tells us the packet delivery ratio for ECC and Fig. 10 depicts the energy
consumption for Greedy Random Walk implemented in ns2.
Fig. 9: Results showing packet delivery ratio in ns2
Fig. 10: Results showing the energy consumption in matlab
The packet delivery ration of our system is better than the existing system because of the use of the greedy random
walk algorithm which takes less time for transferring packets from source to destination. And Fig. 11 shows the energy
consumption for Greedy Random Walk implemented in matlab.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -33
Fig. 11: Results showing the energy consumption in matlab
We can infer from the results that the values of ns2 are comparatively more accurate than that of matlab.
VII. CONCLUSION
In this paper, first a novel and efficient RSA algorithm has been proposed in matlab and a scalable ECC
authentication is implemented in ns2 to ensure the confidentiality and integrity of the messages and providing a
comparative study. While ensuring message sender privacy, Message Authentication can be applied to any message to
provide message content authenticity using ECC and also in RSA. To preserve the source privacy, Greedy Random Walk
method for routing the data from source to destination has been designed which improves the performance of the system.
Energy consumption is also reduced when compared to other routing algorithms. The random walk is a considerable
approach for source privacy.
REFERENCES
[1] Jian Li, Yun Li, Jian Ren, Jie Wu, “Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor
Networks”, Volume 25, No. 5, May 2014.
[2] Yong Xi, Loren Schwiebert, and Weisong Shi, “Preserving Source Location Privacy in Monitoring-Based Wireless
Sensor Networks”.
[3] Milad Kharratzadeh, “Random Walk Routing in Wireless Sensor Networks”.
[4] K. Chaithanya Jyothi and V. Srinivas, “An Effective Scheme Of Location Privacy Preserving In Monitoring System
For WSNs”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012.
[5] Chinnu George and Dhinakaran Nathaniel, “Protecting Location Privacy in Wireless Sensor Networks against a
Local Eavesdropper-A Survey”, Volume 56, No. 5, October 2012.
[6] Ruben Rios, Javier Lopez, “Source Location Privacy considerations in Wireless Sensor Networks”.
[7] D. Gopinath, P. Ramesh, “Emulated Source/Sink Location Privacy Algorithm [ESLPA] for Secure Node and Sink in
WSN”, Vol. 3, Issue 12, December 2015.
[8] Seema Goswami, Prof. Nidhi Chandrakar, Prof. Somesh Dewangam, “Protecting Location Privacy in Wireless
Sensor Networks against Eavesdropper”, Vol. 3 Issue 3, March 2014.
[9] Karamjeet Singh, Chaksher Goel, “Using MD5 and RSA Algorithm Improve Security in MANETs Systems”, Vol 2
Issue 2, June 2014.
[10]Ms. Selva Sangeetha S, Ms. Sharmila S, Ms. Kalaivani M, “Secure Attribute Based Disruption Tolerant Military
Networks”, Volume 3, Issue III, March 2015.
[11]Pallavi S. Patil, Jyoti N. Nandimath, “A Survey Paper on Scalable & Routing Efficient Methods for Source Location
Privacy in WSNs”, Vol. 3 Issue 2, February 2014.
[12]Young Sil Lee, Esko Alasaarela, Hoon Jae Lee, “An Efficient Scheme using Elliptic Curve Cryptography (ECC) with
Symmetric Algorithm for Healthcare System”, Vol. 8, No. 3, 2014.
[13]H. Wang, S. Sheng, C. Tan, and Q. Li, “Comparing symmetric-key and public-key based security schemes in sensor
networks: A case study of user access control”, IEEE ICDCS, Beijing, China, 2008.
[14]Aqeel Khalique, Kuldip Singh, Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, Vol
2 – No 2, May 2016.
[15]Karamjeet Singh, Chakshu Goel, “Using MD5 and RSA Algorithm Improve Security in MANETs Systems”, Vol 2,
Issue 2, June 2014.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 05, Volume 3 (May 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -34
[16]Ms. Selva Sangeetha S, Ms. Sharmila S, Ms. Kalaivani M, “Secure Attribute Based Disruption – Tolerant Military
Networks”.
[17]J. Jeyasoundari, M. Monisha Devi, M. Saranya, “Efficient Authentication Scheme for Multicasting over Ad-hoc
Networks”, Volume 3, Issue 11, November 2013.
[18]Yun Li, Jian Ren, “Preserving Source – Location Privacy in Wireless Sensor Networks”, 2009 IEEE.

More Related Content

What's hot

Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetijctet
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired prjpublications
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copySelva Raj
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networkseSAT Publishing House
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 

What's hot (18)

Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manet
 
A05510105
A05510105A05510105
A05510105
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
6
66
6
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
A0320105
A0320105A0320105
A0320105
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copy
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
G0262042047
G0262042047G0262042047
G0262042047
 

Viewers also liked

Authentication in Wireless Networks
Authentication in Wireless NetworksAuthentication in Wireless Networks
Authentication in Wireless NetworksChris van den Berg
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksLeMeniz Infotech
 
All residentialhomesteadexemptions
All residentialhomesteadexemptionsAll residentialhomesteadexemptions
All residentialhomesteadexemptionspoconnor
 
2016 budget proposed-hcad
2016 budget proposed-hcad2016 budget proposed-hcad
2016 budget proposed-hcadpoconnor
 
SImpulan Bahasa - Kaki
SImpulan Bahasa - KakiSImpulan Bahasa - Kaki
SImpulan Bahasa - Kakiaiyin21
 
Agenda final hcad
Agenda final hcadAgenda final hcad
Agenda final hcadpoconnor
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authenticationamanchaurasia
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Tahukah Anda? - Simpulan Bahasa Kaki
Tahukah Anda? - Simpulan Bahasa KakiTahukah Anda? - Simpulan Bahasa Kaki
Tahukah Anda? - Simpulan Bahasa Kakiaiyin21
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 

Viewers also liked (20)

Authentication in Wireless Networks
Authentication in Wireless NetworksAuthentication in Wireless Networks
Authentication in Wireless Networks
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Fisiologíay conducta5
Fisiologíay conducta5Fisiologíay conducta5
Fisiologíay conducta5
 
All residentialhomesteadexemptions
All residentialhomesteadexemptionsAll residentialhomesteadexemptions
All residentialhomesteadexemptions
 
shifa letter
shifa lettershifa letter
shifa letter
 
Resume
ResumeResume
Resume
 
2016 budget proposed-hcad
2016 budget proposed-hcad2016 budget proposed-hcad
2016 budget proposed-hcad
 
SImpulan Bahasa - Kaki
SImpulan Bahasa - KakiSImpulan Bahasa - Kaki
SImpulan Bahasa - Kaki
 
Procesos mentales
Procesos mentalesProcesos mentales
Procesos mentales
 
Agenda final hcad
Agenda final hcadAgenda final hcad
Agenda final hcad
 
certificate (3)
certificate (3)certificate (3)
certificate (3)
 
Pres gazette-juin16
Pres gazette-juin16Pres gazette-juin16
Pres gazette-juin16
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Eldhose_Resume
Eldhose_ResumeEldhose_Resume
Eldhose_Resume
 
Tahukah Anda? - Simpulan Bahasa Kaki
Tahukah Anda? - Simpulan Bahasa KakiTahukah Anda? - Simpulan Bahasa Kaki
Tahukah Anda? - Simpulan Bahasa Kaki
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Network security
Network securityNetwork security
Network security
 

Similar to A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks

A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...AM Publications
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...AM Publications
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYAM Publications
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hackingijtsrd
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Christo Ananth
 

Similar to A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks (20)

A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hacking
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
50120140505014
5012014050501450120140505014
50120140505014
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -27 A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks Mr. Harish. G Mrs. Smitha Shekar. B Ms. Geetha. P. L Department of C.S.E, Department of C.S.E, Department of C.S.E, Dr. A.I.T, India Dr. A.I.T, India Dr. A.I.T, India Abstract - Source node privacy and message authentication are the most important issues to be addressed in wireless sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes have stood by with some limitations like lack of scalability and high communication and computational overhead. Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A comparative study is done for the work that is implemented using ns2 and matlab. Keywords: Wireless Sensor Networks (WSN), Greedy Random Walk (GRW), Source Privacy, Message Authentication I. INTRODUCTION A remote sensor system (WSN) comprises of spatially circulated self-governing sensors to screen physical or ecological conditions, for example, temperature, sound, weight, and so forth and to agreeably go their information through the system to a principle area. The more cutting edge systems are bi-directional, additionally empowering control of sensor action. The advancement of remote sensor systems was roused by military applications, for example, war zone reconnaissance; today such systems are utilized as a part of numerous mechanical and purchaser applications, for example, modern procedure observing and control, machine wellbeing checking, etc. Wireless Sensor Networks (WSN) is the collection of autonomous sensors that are spatially distributed. The sensor nodes responsibility is to monitor environmental or physical conditions like pressure, temperature, etc., and to synchronically transfer their data through the network. In that case, the most important point of concern will be the authentication of the messages transferred and the privacy of the source node that transfers the messages to other node. Message Authentication hinders the transmission of illegal and corrupted messages in the wireless sensor networks. As a result many message authentication schemes were developed to achieve message Authenticity based on public-key and private-key cryptosystems which led to complex key management, lack of scalability and high overhead. To acknowledge these issues a polynomial-based scheme was introduced but it failed when the member of messages transmitted exceeded its threshold limit. This issue can be overcome in Elliptic Curve Cryptography (ECC) method and also RSA algorithm. Source node privacy is also one of the important issues. In spite of strong encryption, there are chances of data getting exposed in wireless sensor network. The data can be any kind of identity information of a particular node. In this paper, a source node privacy based message authentication using ECC and Greedy Random Walk (GRW) algorithm to enable source privacy has been proposed. A comparative study is provided in two different platforms, i.e., matlab and ns2. II. LITERATURE SURVEY In the paper titled Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks [1], Jian Li, Yun Li, Jian Ren and Jie Wu proposed an efficient and scalable message authentication scheme based on ECC and hop-by-hop message authentication, to overcome high overhead and to provide message source privacy. In the paper titled Preserving source location privacy in monitoring-based wireless sensor networks [2], Yong Xi, Loren Schwiebert and Weisong Shi proposed a two-way random walk algorithm to reduce an eaves dropper from collecting the information. The delivery rate is improved by greedy forwarding and local broadcasting. In the paper titled Random Walk Routing in Wireless Sensor Networks [3], Milad Kharratzadeh has presented a review on routing techniques in wireless sensor networks, based on random walk applied to different kinds of topologies like regular and random topologies.In the paper titled An Effective Scheme of Location Privacy Preserving in Monitoring system for WSNs [4], K. Chaitanya Jyoti and V. Srinivas proposed a verification of privacy protection under backtracking attack model and also the analysis of energy consumption. In the paper titled Protecting Location Privacy in Wireless Sensor Networks against a Local Eavesdropper-A Survey [5], Chinnu George and Dhinakaran Nathaniel presents a survey on existing privacy techniques in wireless sensor networks. They explained scenario of panda-hunter problem with respect to the location privacy.There are chances of losing location information causing to suppress the entire network.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -28 In the paper titled Source Location Privacy considerations in Wireless Sensor Networks [6], Ruben Rios and Javier Lopez have given a survey regarding solutions to the threats especially in maintaining the privacy in wireless sensor networks. A wireless sensor network consists of the sensors embedded in the environment which are responsible for monitoring certain conditions. In such cases there are chances of privacy getting tampered. In the paper titled Emulated Source/Sink Location Privacy Algorithm [ESLPA] for Secure Node and Sink in WSN [7], D. Gopinath and P. Ramesh propose an ESLPA algorithm to address the data security and location privacy and to improve node level and sink level privacy. It also deals with the source anonymity problem. In the paper titled Protecting Location Privacy in Wireless Sensor Networks against Eavesdropper [8], Seema Goswami, Prof. Nidhi Chandrakar, Prof. Somesh Dewangam propose a greedy random walk mechanism to deal with the source location privacy protection in wireless sensor networks since sensor nodes are always at risk of its data and information getting exposed. In the paper titled Using MD5 and RSA Algorithm Improve Security in MANETs Systems [9], Karamjeet Singh and Chaksher Goel propose a combination of MD5 and RSA approaches to protect the data from various kinds of attacks. In the paper titled Secure Attribute Based Disruption Tolerant Military Networks [10], Ms. Selva Sangeetha. S, Ms. Sharmila. S and Ms. Kalaivani. M propose a secure attribute based scheme using rsa algorithm when there is no direct connection between the source and the destination. III. RELATED WORK Message authentication and source node privacy are important issues in wireless sensor networks. Many techniques have been proposed such as polynomial-based schemes random walk [3], location privacy [4] to address certain issues like limiting the number of messages to be transmitted. But these techniques also leave behind certain issues that need to be addressed. Privacy means protecting the data related to source like its ID and location. Many such privacy techniques have been designed in wireless sensor networks. The privacy techniques in wireless sensor networks can be classified as shown in the Fig. 1. Fig. 1: Taxonomy of privacy techniques in WSNs IV. PROPOSED SYSTEM Here there is an attempt to build a source node privacy protection using Greedy Random walk (GRW) algorithm. The flow of the proposed system is shown in the Fig. 2. The proposed system targets at attaining the following goals: Message Authentication: Each message receiving node should verify whether the message at the receiving end is sent from the claimed user which is achieved using ECC. Source identity and location privacy: Sender’s information like sender’s ID and location information cannot be determined by the rival. To achieve this Greedy Random Walk algorithm is implemented. A. Message Authentication 1) ECC algorithm: In this project, the Scalable Message Authentication scheme is proposed for secure message sending. The proposed scheme allows any node to transmit an unlimited number of messages without suffering from threshold problem. We are using ECC signature for message authentication. This scheme enables the nodes to authenticate the message so that all corrupted message can be detected and dropped.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -29 2) The ECC encryption and signature generation is demonstrated below. Consider the parameters required for the ECC algorithm which can be p (prime number), a & b (integer coefficients), G (base point), n (order of the curve generator G), h (cofactor) Fig. 2: Flowchart of the proposed system Key Generation Choose a random integer d to get the private key such that 0 < d < n Then compute the public key P = s * G Encryption Choose a random integer r such that 0 < r < n Calculate point R as a product of r and G, R = r * G Ciphertext = r * G, m + r * P Signature Generation Select the parameters q, s, a, b, P, N, h Let d be the private key and m be the message Select random integer k and perform scalar multiplication i.e., k * p Compute the hash function e = H(m) Compute S = k-1 (e + d r) mod n The signature of message m is (r,s) Signature verification Compute the hash function e = H(m) Compute w = S-1 mod n u1 = ew mod n and u2 = rw mod n x = u1P + u2Q = (x1 , y1) v = x1 mod n verify whether v = r. if so then signature is verified.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -30 3) RSA algorithm: In this paper, encryption and authentication have been proposed in order to attain confidentiality and integrity using RSA algorithm. Key Generation Initially encryption is achieved for a message M sent by the source, by choosing two prime numbers p and q. Then ϕ(n) is computed as a product of (p -1) and (q – 1), ϕ(n) = (p – 1) (q – 1) The value of e is chosen and the value of d is computed using, d e ≡ 1 ( mod ϕ(n) ) The public key pair will be (e , n) and the private key pair will be (d , n). Encryption and Decryption Suppose m is the message that the source wishes to send. It is encrypted using the public key pair which results as a cipher text. C = Me mod n The cipher text is sent to the destination through the set of nodes in the path to the destination, where the receiver decrypts the cipher text using the private key pair that results with the original message. M = Cd mod n Signature Generation RSA also promotes authentication of the message by attaching the signature to the message. The source can use its own private key to generate a signature. S = Md mod n Signature verification The signature is attached to the message and sent to the nodes and also the destination where they verify the signature using the public key. Mˈ = Se mod n Each node verifies the signature assuring that the message has arrived from a valid node. B. Source Node Privacy In order to increase the source node privacy protection, Greedy Random Walk (GRW) technique has been proposed. There are chances of adversary knowing the source information like its ID and location. To address these issues Random Walk was developed. The basic idea of random walk is that each packet takes a different path to the sink node and it does not disclose any data about the source. A Greedy Random Walk (GRW) also termed as two-way random walk reduces the chance of an illegal user collecting source related information. They use local broadcasting and greedy forwarding to improve the delivery rate. The sink node sets up a path using random walk that consists of nodes called as receptors which are as shown in Fig. 3a. Each packet is forwarded to the sink node from the source until it reaches one of the receptors and then forwards the packet to the sink node through the pre-established path as shown in the Fig. 3b. The greedy random walk chooses the path in a greedy manner. Each time the sensor picks up one of the neighbors randomly that is not recently visited. It always tries to choose an unvisited area. Fig. 3a: Random walk mechanism Fig. 3b: Greedy walk mechanism V. EXPERIMENTAL SETUP A. NS2 This project is implemented using ns2 simulator. The Fig. 4 gives the picture of deployment of the nodes in which 40 nodes are deployed in the network among which source and is selected by the user and destination node is fixed. The user can select the message for transmission from source to destination through receptor nodes. The greedy random walk algorithm is used for selecting the path from source to destination.
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -31 Once the path is selected the message which has to be transferred will be encrypted and forwarded to the nodes in the path, where each and every node are going to authenticate whether the data is corrupted or not which is shown in Fig. 5. If data is corrupted the packet will be dropped else data will be transferred to destination successfully. Fig. 4: Deployment of nodes Fig. 5: Transmission of data B. MATLAB This project is also implemented in matlab where we deploy 30 nodes in an X-Y plane. The deployment of nodes in matlab is shown in the Fig. 6. The nodes are scattered randomly in the defined field. The key distribution for the nodes is depicted in the Fig. 7 and the transmission of packets between source and destination through the receptor node is shown in the Fig. 8. Fig. 6: Node Deployment Fig. 7: RSA key distribution
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -32 Fig. 8: Transmission of packets VI. RESULTS This section is going to give the overview of the performance measurement of the system in ns2 and matlab. The Fig. 9 shows the graph which clearly tells us the packet delivery ratio for ECC and Fig. 10 depicts the energy consumption for Greedy Random Walk implemented in ns2. Fig. 9: Results showing packet delivery ratio in ns2 Fig. 10: Results showing the energy consumption in matlab The packet delivery ration of our system is better than the existing system because of the use of the greedy random walk algorithm which takes less time for transferring packets from source to destination. And Fig. 11 shows the energy consumption for Greedy Random Walk implemented in matlab.
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -33 Fig. 11: Results showing the energy consumption in matlab We can infer from the results that the values of ns2 are comparatively more accurate than that of matlab. VII. CONCLUSION In this paper, first a novel and efficient RSA algorithm has been proposed in matlab and a scalable ECC authentication is implemented in ns2 to ensure the confidentiality and integrity of the messages and providing a comparative study. While ensuring message sender privacy, Message Authentication can be applied to any message to provide message content authenticity using ECC and also in RSA. To preserve the source privacy, Greedy Random Walk method for routing the data from source to destination has been designed which improves the performance of the system. Energy consumption is also reduced when compared to other routing algorithms. The random walk is a considerable approach for source privacy. REFERENCES [1] Jian Li, Yun Li, Jian Ren, Jie Wu, “Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks”, Volume 25, No. 5, May 2014. [2] Yong Xi, Loren Schwiebert, and Weisong Shi, “Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks”. [3] Milad Kharratzadeh, “Random Walk Routing in Wireless Sensor Networks”. [4] K. Chaithanya Jyothi and V. Srinivas, “An Effective Scheme Of Location Privacy Preserving In Monitoring System For WSNs”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012. [5] Chinnu George and Dhinakaran Nathaniel, “Protecting Location Privacy in Wireless Sensor Networks against a Local Eavesdropper-A Survey”, Volume 56, No. 5, October 2012. [6] Ruben Rios, Javier Lopez, “Source Location Privacy considerations in Wireless Sensor Networks”. [7] D. Gopinath, P. Ramesh, “Emulated Source/Sink Location Privacy Algorithm [ESLPA] for Secure Node and Sink in WSN”, Vol. 3, Issue 12, December 2015. [8] Seema Goswami, Prof. Nidhi Chandrakar, Prof. Somesh Dewangam, “Protecting Location Privacy in Wireless Sensor Networks against Eavesdropper”, Vol. 3 Issue 3, March 2014. [9] Karamjeet Singh, Chaksher Goel, “Using MD5 and RSA Algorithm Improve Security in MANETs Systems”, Vol 2 Issue 2, June 2014. [10]Ms. Selva Sangeetha S, Ms. Sharmila S, Ms. Kalaivani M, “Secure Attribute Based Disruption Tolerant Military Networks”, Volume 3, Issue III, March 2015. [11]Pallavi S. Patil, Jyoti N. Nandimath, “A Survey Paper on Scalable & Routing Efficient Methods for Source Location Privacy in WSNs”, Vol. 3 Issue 2, February 2014. [12]Young Sil Lee, Esko Alasaarela, Hoon Jae Lee, “An Efficient Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System”, Vol. 8, No. 3, 2014. [13]H. Wang, S. Sheng, C. Tan, and Q. Li, “Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control”, IEEE ICDCS, Beijing, China, 2008. [14]Aqeel Khalique, Kuldip Singh, Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, Vol 2 – No 2, May 2016. [15]Karamjeet Singh, Chakshu Goel, “Using MD5 and RSA Algorithm Improve Security in MANETs Systems”, Vol 2, Issue 2, June 2014.
  • 8. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -34 [16]Ms. Selva Sangeetha S, Ms. Sharmila S, Ms. Kalaivani M, “Secure Attribute Based Disruption – Tolerant Military Networks”. [17]J. Jeyasoundari, M. Monisha Devi, M. Saranya, “Efficient Authentication Scheme for Multicasting over Ad-hoc Networks”, Volume 3, Issue 11, November 2013. [18]Yun Li, Jian Ren, “Preserving Source – Location Privacy in Wireless Sensor Networks”, 2009 IEEE.