SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1608
Coordinates based Keying Scheme for WSN Security
Sweety Dhureja1, Kailash Patidar2
1Research Scholar, CSE Dept. SSSUTMS, Sehore, MP, India
2SHead of Department, CSE Dept. SSSUTMS, Sehore, MP, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless sensor networks (WSN) are capable of
work in a vast range of communication/sensing
application while it uses radio frequencies to
communicate with each other. Data is shared using public
radio communication channel from which one can steal
information. For protecting data in WSN cryptography is
the key methodology that almost every WSN incorporate
in Network. The paper here presents a conceptual
approach for cryptographic key distribution scheme that
depends on physical location of WSN node of network.
Presented keying scheme is a pre distributed key scheme
while node calculate the encryption key based on public
identifier that are stored in node internal memory.
Key Words: WSN, Network Security, Cryptography, Key
Distribution Scheme, Global Positioning System (GPS).
1. INTRODUCTION
Wireless sensor networks is the group of individual
sensors nodes that collectively work to sense dedicated
field’s physical conditions like temperature, humidity,
sound etc. A sensor network is Ad-Hoc in nature and
limited to resources connected to it. A sensor node is
comprises of some controller unit, memory element,
sensing element, radio wave communication unit, and
power supply that collectively perform some task of
sensing in network. Sensor nodes are limited to power
constrains and memory due to its low size requirement in
application. A sensor network is meant to share sensing
information among each node and to the sink node of
network. A sink node is the central node that is
responsible to communicate, collect, and control the
network controller receives information form sensor node
a controller unit maybe automatic or semiautomatic
mechanism that control the entire sensor system using the
same sink node[1] [3].
Figure 1 shows a basic structure of WSN in which
communication from sink node to sensor node F has been
established using wireless links [3]. The most important
part of a WSN is communication which is wireless radio
waves that are openly available in nature and this
information can be stolen by any unauthorized person or
attacker in network. This information should be protected
by means of some security features in addition with basic
communication methodology and principles.
Fig -1: Basic Structure of WSN
There are various researches in the field of network/
information securities have been carried out and are
discussed below. Security in each types of network is
essential from development phase of network ARPANET
till now [2]. The primary objectives of security standard
are known as CIAA (Confidentiality Integrity,
Authentication, and Availability). First is Confidentiality:
To conceal a message from passive attackers while
message communicated throughout sensor nodes in
network is the most important aspect of network security.
A sensor node must not leak its data to its neighboring
unauthorized nodes. Second is Integrity: It is intended to
be detecting that the message sent has not been tempered,
altered or changed. Even after data confidentiality has
been maintained it is still possible to alter information to
generate a false result. Third is Availability: It determines
node ability to use the resources and the network
availability to for the message to communicate in network.
Fourth is Authentication: it ensures the origin and
identification. There are two different mechanisms
symmetric and asymmetric with the help of which data
authentication is maintained [4]. These are primary
objective of any security system while there are some
secondary goals that make more secure communication
system; these are Data Freshness, Time Synchronization,
Self Organization, and Secure Localization. These are some
additional security features that ensures about data
secrecy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1609
2. WSN ATTACKS
WSN’s are prone to attacks are due to the broadcast nature
of communication medium and also due to nodes are
placed in dangerous or hostile environment. Attacks are
primarily classified in active and passive attacks and Figure
2 shows attacks in WSN. Node Outage: It is the situation in
which node stopped functioning. Node Replications Attack:
In this type of attack a node new node is added into
network while copying any other nodes identity. Physical
Attack: As sensor nodes are placed in remote and hostile
outdoor environment and so it is prone to physical attacks
that include node/sensor damage battery drain etc.
Message Corruption: If any message is affected alteration
attack its integrity is compromised. Node Malfunctioning:
In some cases nodes may produce inaccurate data which
compromises with integrity of data in the network. Node
Subversion: In such case a particular node may capture and
cryptographic key information can be stealing by attacker.
Denial of Service: It is the unintentional failure of nodes in
the network DoS are of various types in various layers of
operation. Routing Attacks: This type of attacks are related
to network layer of communication protocol and it may
break the entire network system these are of various type
few of them are Selective Forwarding, Sinkhole Attack,
Sybil Attack, Wormhole Attack etc. These are the attacks
that a WSN may face normally and thus affects the entire
network or a part of network [6].
Fig -2: Attacks in WSN
3. SECURITY MECHANISM
Mechanism to sense, prevent and recuperate from security
attacks are known as security mechanism. A wide range of
secretary management mechanisms are available these
are broadly divided into two classes low level and high
level figure 3 shows the generalized classification of
security mechanism [5] [7].
Fig -3: Security Mechanism
• Low Level: low level security primitives are discussed
here; Secure Routing: it is the most crucial part of any
network it includes routing and forwarding of data by
injecting a false detail of destination node to improve this
simple authentication may remove the chance of routing
error. Key Establishment and Trust Setup: while setting up
any network a cryptographic key establishment is needed
this will ensures data secrecy and node trust. Secrecy &
Authentication: while maintaining secrecy cryptography is
the key defense technique, with the help this data
authentication and secrecy is maintained. Privacy: like
many other networking system a sensor network should
also be forced to maintain privacy of network and nodes
too [5] [7].
• High Level: high level security primitives are discussed
here. Secure group management: each node in WSNs are
limited to computing an communicational capabilities
however group nodes may collectively perform data
aggregation and analysis while these nodes are changing
continuously. Some secure network management some
sort of secure group communication and key computation
is required with the help which group communication
secrecy is maintained. Intrusion Detection: a network
must be capable of detection of any intrusion in network
sub group communication using a group communication
key can be a promising approach for this [5] [7].
4. CRYPTOGRAPHY AND CRYPTO KEYS
It is the process of converting a plain text data word into a
cipher text is known as cryptography. Cryptography is
done by applying some mathematical algorithm that
produces a scrambled output of any input data this
scrambled data is then transmitted through
communication channel [8]. On the other hand recipient
node decrypts the scrambled data to find actual data.
These processes are synchronized by means of a keying
mechanism the data is encrypted and decrypted using the
keys assigned to it. These keys are known as crypto keys.
A data encryption/decryption may be done by same key or
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1610
may have different key on the basis of key cryptography is
divided into two parts. Symmetric (i.e. same key for
encryption and decryption) and asymmetric (i.e. different
key for encryption and decryption). Figure 4 shows a basic
cryptosystem [9].
Fig -4: Basic Crypto System
5. KEY DISTRIBUTION SCHEME
There are two different types of keying system first is pre
distribution key and post deployment. In Pre-distribution
keying scheme, key to each node is distributed before the
deployment of network to all nodes in the network.
Second is Post-Distribution keying scheme, in this type of
key distribution scheme individual nodes are provided by
its nearby nodes key and a group key in the network [10].
Moreover there are various keying scheme that that fall
into these two main classes, these are: Quantum Key
Distribution (QKD), Matrix Based Key Distribution, Group
Key Distribution, Blom’s key distribution scheme etc. Few
of them are discussed in this section. Random Key
Distribution: It is a pre-distribution keying scheme in
which a set of random keys are selected from the pool this
set is known as key-ring tow nodes may share one or more
key by the virtue of which data is encrypted in and sent in
the network. From the key ring a path key is generated
and is defines the data flow in the network [11]. Group
Key Distribution scheme: in this type of cryptosystem a
secure key is shared within the group of nodes and is sub
divided by physical address or other keying subsystem in
the network [12]. Blom’s Key Distribution Scheme: it is a
symmetric keying system in this cryptosystem a key is
supplied by a secure key provider between source and
destination node in the network to make a channel to
share data.
6. COORDINATES BASED KEY SCHEME (CBK SCHEME)
In this section a new key distribution scheme is discussed.
CBK scheme is fall into the pre distribution key model this
keying system is depends on networks physical size
governed by GPS coordinates of network, and limited to
static type architecture of network. There are two phases
in this type of keying crypto system these are Setup Phase
and Communication Phase.
Fig -5: Setup Phase of Network
Figure 5 shows the network setup phase, first key
generation and node assignment is done by network it
first requires the GPS coordinates of network sector and
maximum number of nodes that will be active part of
network. After both input from developer key for each
node is generated that includes the required parameters
and unique identification of node. This generated key is
then assigned to nodes into the network. Second phase is
communication phase which is subdivided into two phases
first is encryption key generation and data transmission
shown in figure 6, and second is Decryption Key and
power calculation phase shown in figure 7.
Fig -6: Encryption key generation and data transmission
Phase 1: First of all it takes public key of destination node
and then it generate encryption key, in this stage node
replaces personal identification details from its private
key with the public key of destination node. Then it takes
message and then converts it into cipher text. After which
path calculation is done from which the communication
takeplace.
Phase 2: In this case receiver receives data and decrypt
using the private key of node, converts cipher data into
plain text figure 7, shows the decryption system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1611
Fig -7: Decryption
To represent the idea of physical keying system the entire
keying scheme we have developed a software
representation of WSN is shown in figure 8 in which
physical parameters coordinates are entered manually by
developer and select the number of nodes into the
network after this developer has to click on deploy
network button which results in sub windows
representing Nodes into the network which has its own
physical location range input that defines the location of
node after filling details of all nodes network is fully setup
and after that message can send while message has been
typed into Message Receive/Send Textbox and then click
on Send Message Button. Figure 9 shows the
communicated message which encrypted by Node 1 and
decrypted by Node 2 by using DES encryption and
decryption algorithm using that uses a 24 bit long
encryption and decryption key that has generated by CBK
scheme.
Fig -8: Fully Setup Network
Fig -9: Data Received
Table -1: comparative overview of CBK scheme with other
schemes
7. CONCLUSION
With table 1 we have concluded CBK. The advancement
and limitation of CBK approach that uses physical location
parameters while limited in terms of node addition and
substitution as network is completely fixed in terms of
node location and field size. The main idea behind CBK
scheme is pre-deployment of encryption and decryption
keys while CBK uses a mixed approach for key distribution,
in CBK private key and public identifiers are pre-
distributed to all nodes each node is then generate a key
similar to private key of destination node and encrypt and
sent to destination node.
Private
Key of
Decryptio
n
Plain Text
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1612
8. FUTURE SCOPE
CBK scheme is tested and applied using software
application which is slightly differ from actual physical
implementation of network for which one can apply this
networking scheme into a physical network thus reliability
test can be done. Another enhancement can also be done
by making incorporating new/replacement node addition
feature in runtime.
REFERENCES
[1] Rathee, Pinki, and Sanjeev Indora. "An Object Tracking
Mechanism in Wireless Sensor Networks." (2017).
[2] “History and Architecture of Wireless Sensor
Networks for Ubiquitous Computing”, Vandana Jindal,
D.A.V College, Bathind, IJARCET, Volume 7, Issue 2,
February 2018, ISSN: 2278 – 1323
[3] D Rathee, Pinki, and Sanjeev Indora. "An Object
Tracking Mechanism in Wireless Sensor Networks."
(2017).
[4] “Wireless Sensor Networks Concepts, Application,
Experimentation and Analysis”, Fahmy, H.M.A., 2016,
ISBN: 978-981-10-0411-7,
[5] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey
of attacks, security mechanisms and challenges in
wireless sensor networks." arXiv preprint
arXiv:0909.0576 (2009).
[6] Sen, Jaydip. "A survey on wireless sensor network
security." arXiv preprint arXiv:1011.1529 (2010).
[7] Wang, Yong, Garhan Attebury, and Byrav
Ramamurthy. "A survey of security issues in wireless
sensor networks." (2006).
[8] Diffie, Whitfield, and Martin Hellman. "New directions
in cryptography." IEEE transactions on Information
Theory 22.6 (1976): 644-654.
[9] Needham, Roger M., and Michael D. Schroeder. "Using
encryption for authentication in large networks of
computers." Communications of the ACM 21.12
(1978): 993-999.
[10] Burmester, Mike, and Yvo Desmedt. "A secure and
efficient conference key distribution system."
Workshop on the Theory and Application of
Cryptographic Techniques. Springer, Berlin,
Heidelberg, 1994.
[11] Chan, Haowen, Adrian Perrig, and Dawn Song.
"Random key predistribution schemes for sensor
networks." Security and Privacy, 2003. Proceedings.
2003 Symposium on. IEEE, 2003.
[12] Anzai, Jun, Natsume Matsuzaki, and Tsutomu
Matsumoto. "A quick group key distribution scheme
with “entity revocation”." International Conference on
the Theory and Application of Cryptology and
Information Security. Springer, Berlin, Heidelberg,
1999.

More Related Content

What's hot

Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionIOSR Journals
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyIRJET Journal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
Security challengesasa factor affectingthe
Security challengesasa factor affectingtheSecurity challengesasa factor affectingthe
Security challengesasa factor affectingtheIJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...eSAT Journals
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networkscsandit
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2eSAT Journals
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & maneteSAT Journals
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 

What's hot (18)

Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Security challengesasa factor affectingthe
Security challengesasa factor affectingtheSecurity challengesasa factor affectingthe
Security challengesasa factor affectingthe
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
G041124047
G041124047G041124047
G041124047
 

Similar to IRJET- Coordinates based Keying Scheme for WSN Security

Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...IRJET Journal
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksIRJET Journal
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 

Similar to IRJET- Coordinates based Keying Scheme for WSN Security (20)

Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

IRJET- Coordinates based Keying Scheme for WSN Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1608 Coordinates based Keying Scheme for WSN Security Sweety Dhureja1, Kailash Patidar2 1Research Scholar, CSE Dept. SSSUTMS, Sehore, MP, India 2SHead of Department, CSE Dept. SSSUTMS, Sehore, MP, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless sensor networks (WSN) are capable of work in a vast range of communication/sensing application while it uses radio frequencies to communicate with each other. Data is shared using public radio communication channel from which one can steal information. For protecting data in WSN cryptography is the key methodology that almost every WSN incorporate in Network. The paper here presents a conceptual approach for cryptographic key distribution scheme that depends on physical location of WSN node of network. Presented keying scheme is a pre distributed key scheme while node calculate the encryption key based on public identifier that are stored in node internal memory. Key Words: WSN, Network Security, Cryptography, Key Distribution Scheme, Global Positioning System (GPS). 1. INTRODUCTION Wireless sensor networks is the group of individual sensors nodes that collectively work to sense dedicated field’s physical conditions like temperature, humidity, sound etc. A sensor network is Ad-Hoc in nature and limited to resources connected to it. A sensor node is comprises of some controller unit, memory element, sensing element, radio wave communication unit, and power supply that collectively perform some task of sensing in network. Sensor nodes are limited to power constrains and memory due to its low size requirement in application. A sensor network is meant to share sensing information among each node and to the sink node of network. A sink node is the central node that is responsible to communicate, collect, and control the network controller receives information form sensor node a controller unit maybe automatic or semiautomatic mechanism that control the entire sensor system using the same sink node[1] [3]. Figure 1 shows a basic structure of WSN in which communication from sink node to sensor node F has been established using wireless links [3]. The most important part of a WSN is communication which is wireless radio waves that are openly available in nature and this information can be stolen by any unauthorized person or attacker in network. This information should be protected by means of some security features in addition with basic communication methodology and principles. Fig -1: Basic Structure of WSN There are various researches in the field of network/ information securities have been carried out and are discussed below. Security in each types of network is essential from development phase of network ARPANET till now [2]. The primary objectives of security standard are known as CIAA (Confidentiality Integrity, Authentication, and Availability). First is Confidentiality: To conceal a message from passive attackers while message communicated throughout sensor nodes in network is the most important aspect of network security. A sensor node must not leak its data to its neighboring unauthorized nodes. Second is Integrity: It is intended to be detecting that the message sent has not been tempered, altered or changed. Even after data confidentiality has been maintained it is still possible to alter information to generate a false result. Third is Availability: It determines node ability to use the resources and the network availability to for the message to communicate in network. Fourth is Authentication: it ensures the origin and identification. There are two different mechanisms symmetric and asymmetric with the help of which data authentication is maintained [4]. These are primary objective of any security system while there are some secondary goals that make more secure communication system; these are Data Freshness, Time Synchronization, Self Organization, and Secure Localization. These are some additional security features that ensures about data secrecy.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1609 2. WSN ATTACKS WSN’s are prone to attacks are due to the broadcast nature of communication medium and also due to nodes are placed in dangerous or hostile environment. Attacks are primarily classified in active and passive attacks and Figure 2 shows attacks in WSN. Node Outage: It is the situation in which node stopped functioning. Node Replications Attack: In this type of attack a node new node is added into network while copying any other nodes identity. Physical Attack: As sensor nodes are placed in remote and hostile outdoor environment and so it is prone to physical attacks that include node/sensor damage battery drain etc. Message Corruption: If any message is affected alteration attack its integrity is compromised. Node Malfunctioning: In some cases nodes may produce inaccurate data which compromises with integrity of data in the network. Node Subversion: In such case a particular node may capture and cryptographic key information can be stealing by attacker. Denial of Service: It is the unintentional failure of nodes in the network DoS are of various types in various layers of operation. Routing Attacks: This type of attacks are related to network layer of communication protocol and it may break the entire network system these are of various type few of them are Selective Forwarding, Sinkhole Attack, Sybil Attack, Wormhole Attack etc. These are the attacks that a WSN may face normally and thus affects the entire network or a part of network [6]. Fig -2: Attacks in WSN 3. SECURITY MECHANISM Mechanism to sense, prevent and recuperate from security attacks are known as security mechanism. A wide range of secretary management mechanisms are available these are broadly divided into two classes low level and high level figure 3 shows the generalized classification of security mechanism [5] [7]. Fig -3: Security Mechanism • Low Level: low level security primitives are discussed here; Secure Routing: it is the most crucial part of any network it includes routing and forwarding of data by injecting a false detail of destination node to improve this simple authentication may remove the chance of routing error. Key Establishment and Trust Setup: while setting up any network a cryptographic key establishment is needed this will ensures data secrecy and node trust. Secrecy & Authentication: while maintaining secrecy cryptography is the key defense technique, with the help this data authentication and secrecy is maintained. Privacy: like many other networking system a sensor network should also be forced to maintain privacy of network and nodes too [5] [7]. • High Level: high level security primitives are discussed here. Secure group management: each node in WSNs are limited to computing an communicational capabilities however group nodes may collectively perform data aggregation and analysis while these nodes are changing continuously. Some secure network management some sort of secure group communication and key computation is required with the help which group communication secrecy is maintained. Intrusion Detection: a network must be capable of detection of any intrusion in network sub group communication using a group communication key can be a promising approach for this [5] [7]. 4. CRYPTOGRAPHY AND CRYPTO KEYS It is the process of converting a plain text data word into a cipher text is known as cryptography. Cryptography is done by applying some mathematical algorithm that produces a scrambled output of any input data this scrambled data is then transmitted through communication channel [8]. On the other hand recipient node decrypts the scrambled data to find actual data. These processes are synchronized by means of a keying mechanism the data is encrypted and decrypted using the keys assigned to it. These keys are known as crypto keys. A data encryption/decryption may be done by same key or
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1610 may have different key on the basis of key cryptography is divided into two parts. Symmetric (i.e. same key for encryption and decryption) and asymmetric (i.e. different key for encryption and decryption). Figure 4 shows a basic cryptosystem [9]. Fig -4: Basic Crypto System 5. KEY DISTRIBUTION SCHEME There are two different types of keying system first is pre distribution key and post deployment. In Pre-distribution keying scheme, key to each node is distributed before the deployment of network to all nodes in the network. Second is Post-Distribution keying scheme, in this type of key distribution scheme individual nodes are provided by its nearby nodes key and a group key in the network [10]. Moreover there are various keying scheme that that fall into these two main classes, these are: Quantum Key Distribution (QKD), Matrix Based Key Distribution, Group Key Distribution, Blom’s key distribution scheme etc. Few of them are discussed in this section. Random Key Distribution: It is a pre-distribution keying scheme in which a set of random keys are selected from the pool this set is known as key-ring tow nodes may share one or more key by the virtue of which data is encrypted in and sent in the network. From the key ring a path key is generated and is defines the data flow in the network [11]. Group Key Distribution scheme: in this type of cryptosystem a secure key is shared within the group of nodes and is sub divided by physical address or other keying subsystem in the network [12]. Blom’s Key Distribution Scheme: it is a symmetric keying system in this cryptosystem a key is supplied by a secure key provider between source and destination node in the network to make a channel to share data. 6. COORDINATES BASED KEY SCHEME (CBK SCHEME) In this section a new key distribution scheme is discussed. CBK scheme is fall into the pre distribution key model this keying system is depends on networks physical size governed by GPS coordinates of network, and limited to static type architecture of network. There are two phases in this type of keying crypto system these are Setup Phase and Communication Phase. Fig -5: Setup Phase of Network Figure 5 shows the network setup phase, first key generation and node assignment is done by network it first requires the GPS coordinates of network sector and maximum number of nodes that will be active part of network. After both input from developer key for each node is generated that includes the required parameters and unique identification of node. This generated key is then assigned to nodes into the network. Second phase is communication phase which is subdivided into two phases first is encryption key generation and data transmission shown in figure 6, and second is Decryption Key and power calculation phase shown in figure 7. Fig -6: Encryption key generation and data transmission Phase 1: First of all it takes public key of destination node and then it generate encryption key, in this stage node replaces personal identification details from its private key with the public key of destination node. Then it takes message and then converts it into cipher text. After which path calculation is done from which the communication takeplace. Phase 2: In this case receiver receives data and decrypt using the private key of node, converts cipher data into plain text figure 7, shows the decryption system.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1611 Fig -7: Decryption To represent the idea of physical keying system the entire keying scheme we have developed a software representation of WSN is shown in figure 8 in which physical parameters coordinates are entered manually by developer and select the number of nodes into the network after this developer has to click on deploy network button which results in sub windows representing Nodes into the network which has its own physical location range input that defines the location of node after filling details of all nodes network is fully setup and after that message can send while message has been typed into Message Receive/Send Textbox and then click on Send Message Button. Figure 9 shows the communicated message which encrypted by Node 1 and decrypted by Node 2 by using DES encryption and decryption algorithm using that uses a 24 bit long encryption and decryption key that has generated by CBK scheme. Fig -8: Fully Setup Network Fig -9: Data Received Table -1: comparative overview of CBK scheme with other schemes 7. CONCLUSION With table 1 we have concluded CBK. The advancement and limitation of CBK approach that uses physical location parameters while limited in terms of node addition and substitution as network is completely fixed in terms of node location and field size. The main idea behind CBK scheme is pre-deployment of encryption and decryption keys while CBK uses a mixed approach for key distribution, in CBK private key and public identifiers are pre- distributed to all nodes each node is then generate a key similar to private key of destination node and encrypt and sent to destination node. Private Key of Decryptio n Plain Text
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1612 8. FUTURE SCOPE CBK scheme is tested and applied using software application which is slightly differ from actual physical implementation of network for which one can apply this networking scheme into a physical network thus reliability test can be done. Another enhancement can also be done by making incorporating new/replacement node addition feature in runtime. REFERENCES [1] Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017). [2] “History and Architecture of Wireless Sensor Networks for Ubiquitous Computing”, Vandana Jindal, D.A.V College, Bathind, IJARCET, Volume 7, Issue 2, February 2018, ISSN: 2278 – 1323 [3] D Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017). [4] “Wireless Sensor Networks Concepts, Application, Experimentation and Analysis”, Fahmy, H.M.A., 2016, ISBN: 978-981-10-0411-7, [5] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.0576 (2009). [6] Sen, Jaydip. "A survey on wireless sensor network security." arXiv preprint arXiv:1011.1529 (2010). [7] Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006). [8] Diffie, Whitfield, and Martin Hellman. "New directions in cryptography." IEEE transactions on Information Theory 22.6 (1976): 644-654. [9] Needham, Roger M., and Michael D. Schroeder. "Using encryption for authentication in large networks of computers." Communications of the ACM 21.12 (1978): 993-999. [10] Burmester, Mike, and Yvo Desmedt. "A secure and efficient conference key distribution system." Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1994. [11] Chan, Haowen, Adrian Perrig, and Dawn Song. "Random key predistribution schemes for sensor networks." Security and Privacy, 2003. Proceedings. 2003 Symposium on. IEEE, 2003. [12] Anzai, Jun, Natsume Matsuzaki, and Tsutomu Matsumoto. "A quick group key distribution scheme with “entity revocation”." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 1999.