Submit Search
Upload
IRJET- Coordinates based Keying Scheme for WSN Security
•
0 likes
•
24 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i11/IRJET-V5I11306.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
Eswar Publications
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
cscpconf
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...
csandit
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
www.ijerd.com
www.ijerd.com
IJERD Editor
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
A44080104
A44080104
IJERA Editor
CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
Recommended
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
Eswar Publications
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
cscpconf
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...
csandit
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
www.ijerd.com
www.ijerd.com
IJERD Editor
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
A44080104
A44080104
IJERA Editor
CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
IOSR Journals
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET Journal
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Security challengesasa factor affectingthe
Security challengesasa factor affectingthe
IJNSA Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
IAEME Publication
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
eSAT Journals
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
csandit
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
IJNSA Journal
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
eSAT Journals
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
IAEME Publication
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
eSAT Journals
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Tương Hoàng
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
eSAT Journals
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
eSAT Publishing House
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Am03402220229
Am03402220229
ijceronline
G041124047
G041124047
IOSR-JEN
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
Novel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
Lecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
More Related Content
What's hot
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
IOSR Journals
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET Journal
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Security challengesasa factor affectingthe
Security challengesasa factor affectingthe
IJNSA Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
IAEME Publication
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
eSAT Journals
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
csandit
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
IJNSA Journal
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
eSAT Journals
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
IAEME Publication
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
eSAT Journals
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Tương Hoàng
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
eSAT Journals
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
eSAT Publishing House
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Am03402220229
Am03402220229
ijceronline
G041124047
G041124047
IOSR-JEN
What's hot
(18)
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
Security challengesasa factor affectingthe
Security challengesasa factor affectingthe
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Am03402220229
Am03402220229
G041124047
G041124047
Similar to IRJET- Coordinates based Keying Scheme for WSN Security
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
Novel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
Lecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
IRJET Journal
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
IJERD Editor
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
IRJET Journal
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
IJMER
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET Journal
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
IJCI JOURNAL
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
ijwmn
Similar to IRJET- Coordinates based Keying Scheme for WSN Security
(20)
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Novel secure communication protocol basepaper
Novel secure communication protocol basepaper
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Lecture 07 networking
Lecture 07 networking
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Recently uploaded
(20)
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Internship report on mechanical engineering
Internship report on mechanical engineering
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
IRJET- Coordinates based Keying Scheme for WSN Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1608 Coordinates based Keying Scheme for WSN Security Sweety Dhureja1, Kailash Patidar2 1Research Scholar, CSE Dept. SSSUTMS, Sehore, MP, India 2SHead of Department, CSE Dept. SSSUTMS, Sehore, MP, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless sensor networks (WSN) are capable of work in a vast range of communication/sensing application while it uses radio frequencies to communicate with each other. Data is shared using public radio communication channel from which one can steal information. For protecting data in WSN cryptography is the key methodology that almost every WSN incorporate in Network. The paper here presents a conceptual approach for cryptographic key distribution scheme that depends on physical location of WSN node of network. Presented keying scheme is a pre distributed key scheme while node calculate the encryption key based on public identifier that are stored in node internal memory. Key Words: WSN, Network Security, Cryptography, Key Distribution Scheme, Global Positioning System (GPS). 1. INTRODUCTION Wireless sensor networks is the group of individual sensors nodes that collectively work to sense dedicated field’s physical conditions like temperature, humidity, sound etc. A sensor network is Ad-Hoc in nature and limited to resources connected to it. A sensor node is comprises of some controller unit, memory element, sensing element, radio wave communication unit, and power supply that collectively perform some task of sensing in network. Sensor nodes are limited to power constrains and memory due to its low size requirement in application. A sensor network is meant to share sensing information among each node and to the sink node of network. A sink node is the central node that is responsible to communicate, collect, and control the network controller receives information form sensor node a controller unit maybe automatic or semiautomatic mechanism that control the entire sensor system using the same sink node[1] [3]. Figure 1 shows a basic structure of WSN in which communication from sink node to sensor node F has been established using wireless links [3]. The most important part of a WSN is communication which is wireless radio waves that are openly available in nature and this information can be stolen by any unauthorized person or attacker in network. This information should be protected by means of some security features in addition with basic communication methodology and principles. Fig -1: Basic Structure of WSN There are various researches in the field of network/ information securities have been carried out and are discussed below. Security in each types of network is essential from development phase of network ARPANET till now [2]. The primary objectives of security standard are known as CIAA (Confidentiality Integrity, Authentication, and Availability). First is Confidentiality: To conceal a message from passive attackers while message communicated throughout sensor nodes in network is the most important aspect of network security. A sensor node must not leak its data to its neighboring unauthorized nodes. Second is Integrity: It is intended to be detecting that the message sent has not been tempered, altered or changed. Even after data confidentiality has been maintained it is still possible to alter information to generate a false result. Third is Availability: It determines node ability to use the resources and the network availability to for the message to communicate in network. Fourth is Authentication: it ensures the origin and identification. There are two different mechanisms symmetric and asymmetric with the help of which data authentication is maintained [4]. These are primary objective of any security system while there are some secondary goals that make more secure communication system; these are Data Freshness, Time Synchronization, Self Organization, and Secure Localization. These are some additional security features that ensures about data secrecy.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1609 2. WSN ATTACKS WSN’s are prone to attacks are due to the broadcast nature of communication medium and also due to nodes are placed in dangerous or hostile environment. Attacks are primarily classified in active and passive attacks and Figure 2 shows attacks in WSN. Node Outage: It is the situation in which node stopped functioning. Node Replications Attack: In this type of attack a node new node is added into network while copying any other nodes identity. Physical Attack: As sensor nodes are placed in remote and hostile outdoor environment and so it is prone to physical attacks that include node/sensor damage battery drain etc. Message Corruption: If any message is affected alteration attack its integrity is compromised. Node Malfunctioning: In some cases nodes may produce inaccurate data which compromises with integrity of data in the network. Node Subversion: In such case a particular node may capture and cryptographic key information can be stealing by attacker. Denial of Service: It is the unintentional failure of nodes in the network DoS are of various types in various layers of operation. Routing Attacks: This type of attacks are related to network layer of communication protocol and it may break the entire network system these are of various type few of them are Selective Forwarding, Sinkhole Attack, Sybil Attack, Wormhole Attack etc. These are the attacks that a WSN may face normally and thus affects the entire network or a part of network [6]. Fig -2: Attacks in WSN 3. SECURITY MECHANISM Mechanism to sense, prevent and recuperate from security attacks are known as security mechanism. A wide range of secretary management mechanisms are available these are broadly divided into two classes low level and high level figure 3 shows the generalized classification of security mechanism [5] [7]. Fig -3: Security Mechanism • Low Level: low level security primitives are discussed here; Secure Routing: it is the most crucial part of any network it includes routing and forwarding of data by injecting a false detail of destination node to improve this simple authentication may remove the chance of routing error. Key Establishment and Trust Setup: while setting up any network a cryptographic key establishment is needed this will ensures data secrecy and node trust. Secrecy & Authentication: while maintaining secrecy cryptography is the key defense technique, with the help this data authentication and secrecy is maintained. Privacy: like many other networking system a sensor network should also be forced to maintain privacy of network and nodes too [5] [7]. • High Level: high level security primitives are discussed here. Secure group management: each node in WSNs are limited to computing an communicational capabilities however group nodes may collectively perform data aggregation and analysis while these nodes are changing continuously. Some secure network management some sort of secure group communication and key computation is required with the help which group communication secrecy is maintained. Intrusion Detection: a network must be capable of detection of any intrusion in network sub group communication using a group communication key can be a promising approach for this [5] [7]. 4. CRYPTOGRAPHY AND CRYPTO KEYS It is the process of converting a plain text data word into a cipher text is known as cryptography. Cryptography is done by applying some mathematical algorithm that produces a scrambled output of any input data this scrambled data is then transmitted through communication channel [8]. On the other hand recipient node decrypts the scrambled data to find actual data. These processes are synchronized by means of a keying mechanism the data is encrypted and decrypted using the keys assigned to it. These keys are known as crypto keys. A data encryption/decryption may be done by same key or
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1610 may have different key on the basis of key cryptography is divided into two parts. Symmetric (i.e. same key for encryption and decryption) and asymmetric (i.e. different key for encryption and decryption). Figure 4 shows a basic cryptosystem [9]. Fig -4: Basic Crypto System 5. KEY DISTRIBUTION SCHEME There are two different types of keying system first is pre distribution key and post deployment. In Pre-distribution keying scheme, key to each node is distributed before the deployment of network to all nodes in the network. Second is Post-Distribution keying scheme, in this type of key distribution scheme individual nodes are provided by its nearby nodes key and a group key in the network [10]. Moreover there are various keying scheme that that fall into these two main classes, these are: Quantum Key Distribution (QKD), Matrix Based Key Distribution, Group Key Distribution, Blom’s key distribution scheme etc. Few of them are discussed in this section. Random Key Distribution: It is a pre-distribution keying scheme in which a set of random keys are selected from the pool this set is known as key-ring tow nodes may share one or more key by the virtue of which data is encrypted in and sent in the network. From the key ring a path key is generated and is defines the data flow in the network [11]. Group Key Distribution scheme: in this type of cryptosystem a secure key is shared within the group of nodes and is sub divided by physical address or other keying subsystem in the network [12]. Blom’s Key Distribution Scheme: it is a symmetric keying system in this cryptosystem a key is supplied by a secure key provider between source and destination node in the network to make a channel to share data. 6. COORDINATES BASED KEY SCHEME (CBK SCHEME) In this section a new key distribution scheme is discussed. CBK scheme is fall into the pre distribution key model this keying system is depends on networks physical size governed by GPS coordinates of network, and limited to static type architecture of network. There are two phases in this type of keying crypto system these are Setup Phase and Communication Phase. Fig -5: Setup Phase of Network Figure 5 shows the network setup phase, first key generation and node assignment is done by network it first requires the GPS coordinates of network sector and maximum number of nodes that will be active part of network. After both input from developer key for each node is generated that includes the required parameters and unique identification of node. This generated key is then assigned to nodes into the network. Second phase is communication phase which is subdivided into two phases first is encryption key generation and data transmission shown in figure 6, and second is Decryption Key and power calculation phase shown in figure 7. Fig -6: Encryption key generation and data transmission Phase 1: First of all it takes public key of destination node and then it generate encryption key, in this stage node replaces personal identification details from its private key with the public key of destination node. Then it takes message and then converts it into cipher text. After which path calculation is done from which the communication takeplace. Phase 2: In this case receiver receives data and decrypt using the private key of node, converts cipher data into plain text figure 7, shows the decryption system.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1611 Fig -7: Decryption To represent the idea of physical keying system the entire keying scheme we have developed a software representation of WSN is shown in figure 8 in which physical parameters coordinates are entered manually by developer and select the number of nodes into the network after this developer has to click on deploy network button which results in sub windows representing Nodes into the network which has its own physical location range input that defines the location of node after filling details of all nodes network is fully setup and after that message can send while message has been typed into Message Receive/Send Textbox and then click on Send Message Button. Figure 9 shows the communicated message which encrypted by Node 1 and decrypted by Node 2 by using DES encryption and decryption algorithm using that uses a 24 bit long encryption and decryption key that has generated by CBK scheme. Fig -8: Fully Setup Network Fig -9: Data Received Table -1: comparative overview of CBK scheme with other schemes 7. CONCLUSION With table 1 we have concluded CBK. The advancement and limitation of CBK approach that uses physical location parameters while limited in terms of node addition and substitution as network is completely fixed in terms of node location and field size. The main idea behind CBK scheme is pre-deployment of encryption and decryption keys while CBK uses a mixed approach for key distribution, in CBK private key and public identifiers are pre- distributed to all nodes each node is then generate a key similar to private key of destination node and encrypt and sent to destination node. Private Key of Decryptio n Plain Text
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1612 8. FUTURE SCOPE CBK scheme is tested and applied using software application which is slightly differ from actual physical implementation of network for which one can apply this networking scheme into a physical network thus reliability test can be done. Another enhancement can also be done by making incorporating new/replacement node addition feature in runtime. REFERENCES [1] Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017). [2] “History and Architecture of Wireless Sensor Networks for Ubiquitous Computing”, Vandana Jindal, D.A.V College, Bathind, IJARCET, Volume 7, Issue 2, February 2018, ISSN: 2278 – 1323 [3] D Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017). [4] “Wireless Sensor Networks Concepts, Application, Experimentation and Analysis”, Fahmy, H.M.A., 2016, ISBN: 978-981-10-0411-7, [5] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.0576 (2009). [6] Sen, Jaydip. "A survey on wireless sensor network security." arXiv preprint arXiv:1011.1529 (2010). [7] Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006). [8] Diffie, Whitfield, and Martin Hellman. "New directions in cryptography." IEEE transactions on Information Theory 22.6 (1976): 644-654. [9] Needham, Roger M., and Michael D. Schroeder. "Using encryption for authentication in large networks of computers." Communications of the ACM 21.12 (1978): 993-999. [10] Burmester, Mike, and Yvo Desmedt. "A secure and efficient conference key distribution system." Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1994. [11] Chan, Haowen, Adrian Perrig, and Dawn Song. "Random key predistribution schemes for sensor networks." Security and Privacy, 2003. Proceedings. 2003 Symposium on. IEEE, 2003. [12] Anzai, Jun, Natsume Matsuzaki, and Tsutomu Matsumoto. "A quick group key distribution scheme with “entity revocation”." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 1999.
Download now