Key distribution schemes has always played a pivotal role in the security of wireless sensor networks. In this research work we focus mainly on the security aspect of WSN . We have developed a modified key distribution scheme which uses the concepts of post as well as pre distribution scheme and thus he proved to be a better alternative then the rest of two schemes. Simulation study has been carried out using matlab. The effort turned out to be fruitful s our modified scheme showed less dead nodes per round of data transfer as compared to post deployment scheme.
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Review on key predistribution schemes in wireless sensor networksijassn
A wireless sensor network consist distributed sensors which are used to monitor physical or environmental
conditions like temperature, sound, pressure and so on. Wireless sensor network are used in future in many
applications like military, investigation teams, researches and so on. Security is the main issue in wireless
sensor network. Sensor network arrange several types of data packets, packets of routing protocols and
packets of key management protocols. Key management is the most effective method for providing better
security against several types of attacks. This paper discusses the various key pre-distribution approaches
along with their advantages and disadvantages.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
Wireless sensor networks gains its importance because of the critical applications in which it is involved like
industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor
networks we consider an active attack, NODE REPLICATION attack and COLLUDING attack. We use localized
algorithms, ((ie) replication detection is done at the node level and eliminated without the intervention of the base
station) to solve replication attacks and colluding attacks. Replication attacks are detected to using a unique key pair
and cryptographic hash function. We propose to use XED and EED algorithm[1] ( authenticates the node and tries to
reduce the replication) , with this using the Event detected location , non-beacon node is used to find the location of a
malicious node and by a simple threshold verification we identify malicious clusters
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Review on key predistribution schemes in wireless sensor networksijassn
A wireless sensor network consist distributed sensors which are used to monitor physical or environmental
conditions like temperature, sound, pressure and so on. Wireless sensor network are used in future in many
applications like military, investigation teams, researches and so on. Security is the main issue in wireless
sensor network. Sensor network arrange several types of data packets, packets of routing protocols and
packets of key management protocols. Key management is the most effective method for providing better
security against several types of attacks. This paper discusses the various key pre-distribution approaches
along with their advantages and disadvantages.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
Wireless sensor networks gains its importance because of the critical applications in which it is involved like
industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor
networks we consider an active attack, NODE REPLICATION attack and COLLUDING attack. We use localized
algorithms, ((ie) replication detection is done at the node level and eliminated without the intervention of the base
station) to solve replication attacks and colluding attacks. Replication attacks are detected to using a unique key pair
and cryptographic hash function. We propose to use XED and EED algorithm[1] ( authenticates the node and tries to
reduce the replication) , with this using the Event detected location , non-beacon node is used to find the location of a
malicious node and by a simple threshold verification we identify malicious clusters
This paper gives an illustration and demonstration of mathematical model of new key management scheme which overcomes the limitation of Pre-Shared key scheme in terms of energy consumption using various key management operations in WSNs. Various key management operations were recorded and evaluate based on energy consumption at each step of authentication in wireless sensor network which improves that NchooseK Scheme is more scalable and secure than PSK in terms of energy consumption in WSNs.
Key Updating for Leakage Resiliency with Application to AES Modes of Operation1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...IJNSA Journal
This paper is proposed to provide confidentiality of the secret image which can be used by multiple users or to store on multiple servers. A secret sharing is a technique to protect the secret information which will be used by multiple users. The threshold secret sharing is more efficient as it is possible to
reconstruct the secret with the threshold number of shares. Along with Shamir’s secret sharing method we propose to use the radon transformation before dividing the image in to shares. This transformation is used so that the shares will not have the original pixel intensity. The run length code is used to compress
the image after the transformation. Then apply secret sharing technique. The reconstruction of the image results in original image by applying the operations in the reverse order.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Secret key extraction from wireless signal strength in real environmentsMuthu Sybian
Sybian Technologies is a leading IT services provider & custom software development company. We offer full cycle custom software development services, from product idea, offshore software development to outsourcing support & enhancement. Sybian employs a knowledgeable group of software developers coming from different backgrounds. We are able to balance product development efforts & project duration to your business needs.
Sybian Technologies invests extensively in R&D to invent new solutions for ever changing needs of your businesses, to make it future-proof, sustainable and consistent. We work in close collaboration with academic institutions and research labs across the world to design, implement and support latest IT based solutions that are futuristic, progressive and affordable. Our services continue to earn trust and loyalty from its clients through its commitment to the following parameters
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
The Network-on-Chip (NoC) model has appeared as a revolutionary methodology for incorporatingmany number of intellectual property (IP) blocks in a die. As said by the International Roadmap for Semiconductors (ITRS), it is must to scale down the device size. In order to reduce the device long interconnection should be avoided. For that, new interconnect patterns are need. Three-dimensional ICs are proficient of achieving superior performance, resistance against noise and lower interconnect power consumption compared to traditional planar ICs. In this paper, network data routed by Hierarchical methodology. We are analyzing total number of logic gates and registers, power consumption and delay when different bits of data transmitted using Quartus II software.
Complexity of pilgering in nuclear applicationsIJERA Editor
Nuclear reactors use various types and sections of tubes manufactured with exotic materials meeting special
requirements. These Tubes are manufactured using a Cold working process of Pilgering. Pilgering process is
influenced by a lot of factors making it a highly complex process. In this paper the various influencing factors
are compiled, segregated and briefly discussed.
Corrosion Behaviour of Titanium Anodized Film in Different Corrosive Environm...IJERA Editor
Anodizing is an electrochemical process in which thickness of the natural oxide layer is increased and converted it into a decorative, durable, corrosion-resistant film. Titanium is used as a biocompatible material in human implants due to its excellent corrosion and wears resistance. Stable, continuous, highly adherent, and protective oxide films can be developed on titanium using various acid or alkaline baths. Anodizing of titanium generates a spectrum of different color without use of dyes. This spectrum of color dependent on the thickness of the oxide, voltage ranges, interference of light reflecting off the oxide surface and reflecting off the underlying metal surface. The anodized film of Titanium is mainly consists of TiO2 or mixtures of TiO2 & Ti2O3 etc. In the present work, Pure Titanium plate has been anodized using bath of Chromic Acid at different voltage range. The anodized film is characterized by visual observation, SEM & EDAX analysis & A.C Impedance Spectroscopy, while the corrosion studies were performed using Potentiodynamic studies were performed in 3.5% NaCl & 0.1N H2SO4. The Results show that the anodized film of Titanium show different spectrum of colors from Brown-Violet-Tea or Peacock. SEM & EDAX analyses show that the anodized film of Titanium is mainly made up of TiO2 and Ti2O3. Potentiodynamic study implies that the film developed on Titanium using the bath of Chromic Acid exhibits good corrosion resistance. The A.C. Impedance study shows that the film is more compact, adherent and more uniform in chromic acid bath.
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...IJERA Editor
This paper presents the design of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in south India (Chennai). For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Chennai (Longitude 80ο.16’and Latitude 13ο.5’ ) and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. The presented system reduce approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the proposed developed and installed system will provide very good opportunities for telecom sector in near future.
A Systematic Approach to Improve BOC Power Spectrum for GNSSIJERA Editor
An analysis of digital Phase-modulated signals is performed based on frequency spectrum which consists of a continuous and a number of discrete components at multiples of clock frequencies. The analysis shows that these components depend on the pulse shape function of multi-level digital signals to be phase modulated. In this paper, the effect of duty cycle, rise and fall times of these multi-level digital signals, on the frequency spectrum is studied. It is observed that the duty cycle variation of 10% results 30 dB increase in undesired component and the 10% increase in rise & fall times increase the power of undesired component by 12 dB. The theoretical observations of the effects are applied on the Binary Offset Carrier (BOC) modulated signals as a case study, to discuss their effects in Global Navigation Satellite Systems (GNSS).
This paper gives an illustration and demonstration of mathematical model of new key management scheme which overcomes the limitation of Pre-Shared key scheme in terms of energy consumption using various key management operations in WSNs. Various key management operations were recorded and evaluate based on energy consumption at each step of authentication in wireless sensor network which improves that NchooseK Scheme is more scalable and secure than PSK in terms of energy consumption in WSNs.
Key Updating for Leakage Resiliency with Application to AES Modes of Operation1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...IJNSA Journal
This paper is proposed to provide confidentiality of the secret image which can be used by multiple users or to store on multiple servers. A secret sharing is a technique to protect the secret information which will be used by multiple users. The threshold secret sharing is more efficient as it is possible to
reconstruct the secret with the threshold number of shares. Along with Shamir’s secret sharing method we propose to use the radon transformation before dividing the image in to shares. This transformation is used so that the shares will not have the original pixel intensity. The run length code is used to compress
the image after the transformation. Then apply secret sharing technique. The reconstruction of the image results in original image by applying the operations in the reverse order.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Secret key extraction from wireless signal strength in real environmentsMuthu Sybian
Sybian Technologies is a leading IT services provider & custom software development company. We offer full cycle custom software development services, from product idea, offshore software development to outsourcing support & enhancement. Sybian employs a knowledgeable group of software developers coming from different backgrounds. We are able to balance product development efforts & project duration to your business needs.
Sybian Technologies invests extensively in R&D to invent new solutions for ever changing needs of your businesses, to make it future-proof, sustainable and consistent. We work in close collaboration with academic institutions and research labs across the world to design, implement and support latest IT based solutions that are futuristic, progressive and affordable. Our services continue to earn trust and loyalty from its clients through its commitment to the following parameters
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
The Network-on-Chip (NoC) model has appeared as a revolutionary methodology for incorporatingmany number of intellectual property (IP) blocks in a die. As said by the International Roadmap for Semiconductors (ITRS), it is must to scale down the device size. In order to reduce the device long interconnection should be avoided. For that, new interconnect patterns are need. Three-dimensional ICs are proficient of achieving superior performance, resistance against noise and lower interconnect power consumption compared to traditional planar ICs. In this paper, network data routed by Hierarchical methodology. We are analyzing total number of logic gates and registers, power consumption and delay when different bits of data transmitted using Quartus II software.
Complexity of pilgering in nuclear applicationsIJERA Editor
Nuclear reactors use various types and sections of tubes manufactured with exotic materials meeting special
requirements. These Tubes are manufactured using a Cold working process of Pilgering. Pilgering process is
influenced by a lot of factors making it a highly complex process. In this paper the various influencing factors
are compiled, segregated and briefly discussed.
Corrosion Behaviour of Titanium Anodized Film in Different Corrosive Environm...IJERA Editor
Anodizing is an electrochemical process in which thickness of the natural oxide layer is increased and converted it into a decorative, durable, corrosion-resistant film. Titanium is used as a biocompatible material in human implants due to its excellent corrosion and wears resistance. Stable, continuous, highly adherent, and protective oxide films can be developed on titanium using various acid or alkaline baths. Anodizing of titanium generates a spectrum of different color without use of dyes. This spectrum of color dependent on the thickness of the oxide, voltage ranges, interference of light reflecting off the oxide surface and reflecting off the underlying metal surface. The anodized film of Titanium is mainly consists of TiO2 or mixtures of TiO2 & Ti2O3 etc. In the present work, Pure Titanium plate has been anodized using bath of Chromic Acid at different voltage range. The anodized film is characterized by visual observation, SEM & EDAX analysis & A.C Impedance Spectroscopy, while the corrosion studies were performed using Potentiodynamic studies were performed in 3.5% NaCl & 0.1N H2SO4. The Results show that the anodized film of Titanium show different spectrum of colors from Brown-Violet-Tea or Peacock. SEM & EDAX analyses show that the anodized film of Titanium is mainly made up of TiO2 and Ti2O3. Potentiodynamic study implies that the film developed on Titanium using the bath of Chromic Acid exhibits good corrosion resistance. The A.C. Impedance study shows that the film is more compact, adherent and more uniform in chromic acid bath.
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...IJERA Editor
This paper presents the design of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in south India (Chennai). For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Chennai (Longitude 80ο.16’and Latitude 13ο.5’ ) and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. The presented system reduce approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the proposed developed and installed system will provide very good opportunities for telecom sector in near future.
A Systematic Approach to Improve BOC Power Spectrum for GNSSIJERA Editor
An analysis of digital Phase-modulated signals is performed based on frequency spectrum which consists of a continuous and a number of discrete components at multiples of clock frequencies. The analysis shows that these components depend on the pulse shape function of multi-level digital signals to be phase modulated. In this paper, the effect of duty cycle, rise and fall times of these multi-level digital signals, on the frequency spectrum is studied. It is observed that the duty cycle variation of 10% results 30 dB increase in undesired component and the 10% increase in rise & fall times increase the power of undesired component by 12 dB. The theoretical observations of the effects are applied on the Binary Offset Carrier (BOC) modulated signals as a case study, to discuss their effects in Global Navigation Satellite Systems (GNSS).
Some factors affecting on the behavior ofsteel electrode in citric acid solut...IJERA Editor
Potential-time curves are constructed for the steel electrode in naturally aerated citric acid solutions devoid of
and containing some aggressive and inhibitive compounds. Cl- and SO4
2- ions cause the destruction of passivity
and initiation of pitting corrosion. The rate of oxide film growth by citric acid and oxide film destruction by Cl-
and SO4
2- ions follows a direct logarithmic law as evident from the linear relationships between the open-circuit
potential and the logarithm of immersion time. Urea, phenylhydrazine and 1,2-phenylenediamine compounds
inhibit the pitting corrosion of steel. The rate of oxide film healing and thickening increases with their
concentrations. In presence of constant inhibitor concentration, the efficiency of pitting inhibition increases in
the order: (weak) urea<phenylhydrazine><1,2-phenylenediamine(strong).
Rear Bumper Laminated In Jute Fiber With Polyester Resin.IJERA Editor
Today, a growing interest exists in the use of natural of fibers (sisal, coconut, banana, and jute), as
reinforcement in composites. The aim of the present study is shows the use of jute fiber agglutinated with
polyester resin in the automobile industry in the production of a rear bumper of hatch vehicle. A simplified
mathematical model was used for evaluation of the flaw on trunk center cover submitted to dynamic loads. The
traverse section of the referred bumper is simplified by a channel formation. This study shows that a rear
bumper made using jute fiber agglutinated with polyester resin will be possible. The molded part obtained good
visual characteristics, good geometric construction and surface without bubbles and imperfections in the fiber
and resin composite. The mathematical model to failure criterion showed that the rear bumper in jute fiber will
not resist to an impact equivalent at 4.0 km/h.
Experimental Test of Stainless Steel Wire Mesh and Aluminium Alloy With Glass...IJERA Editor
At present, composite materials are mostly used in aircraft structural components, because of their excellent properties like lightweight, high strength to weight ratio, high stiffness, and corrosion resistance and less expensive. In this experimental work, the mechanical properties of laminate, this is reinforced with stainless steel wire mesh, aluminum sheet metal, perforated aluminum sheet metal and glass fibers to be laminate and investigated. The stainless steel wire mesh and perforated aluminum metal were sequentially stacked to fabricate, hybrid composites. The aluminum metal sheet is also employed with that sequence to get maximum strength and less weight. The tensile, compressive and flexure tests carried out on the hybrid composite. To investigate the mechanical properties and elastic properties of the metal matrix composite laminate of a material we are using experimental test and theoretical calculation. The experimental work consists of Tensile, compressive and flexural test. The expectation of this project results in the tensile and compressive properties of this hybrid composite it is slightly lesser than carbon fibers but it could facilitate a weight reduction compared with CFRP panels. So this hybrid laminates composite material offering significant weight savings and maximum strength over some other GFRP conventional panels
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Smart meters are electronic measurement devices used by utilities to communicate information for billing customers and operating their electric systems. This paper presents the hardware design of a smart meter. Sensing and circuit protection circuits are included in the design of the smart meter in which resistors are naturally a fundamental part of the electronic design. Smart meters provides a route for energy savings, real-time pricing, automated data collection and eliminating human errors due to manual readings which would ultimately reduce labour costs, diagnosis and instantaneous fault detection. This allows for predictive maintenance resulting in a more efficient and reliable distribution network.
Enhancement in Power Quality With Grid Interconnection of Renewable Energy So...IJERA Editor
At present the Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This paper presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as power converter to inject power generated from RES to the grid and shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid. This new control concept is demonstrated with extensive MATLAB/Simulink simulation studies and validated through digital signal processor-based laboratory experimental results.
The Cryptographic Schemes for Secret ImagesIJERA Editor
Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
Thermal Instability of Chemically Reacting Maxwell Fluid in a Horizontal Poro...IJERA Editor
The effect of chemical reaction on the linear stability of a viscoelastic fluid saturated horizontal densely-packed
porous layer is investigated. The viscoelastic properties are given by Maxwell constitutive relations. The porous
layer is cooled from the upper boundary while an adiabatic thermal boundary condition is imposed at the lower
boundary. Linear stability analysis suggests that there is a competition between the processes of viscous
relaxation and thermal diffusion that causes the first convective instability to be oscillatory rather than stationary.
The effect of Deborah number, Darcy-Prandtl number, normalized porosity, and the Frank-Kamenetskii number
on the stability of the system is investigated. Using a weighted residual method we calculate numerically the
convective thresholds for both stationary and oscillatory instability. The effects of viscoelasticity and chemical
reaction on the instability are emphasized. Some existing results are reproduced as the particular cases of the
present study.
Pesticides Occurrence in an Alfisol of Sudano-Sahelian Agricultural Watershed...IJERA Editor
Soil contamination by pesticides (organochlorine, organophosphates and pyrethroids) has been studied in the agricultural watershed (60.6 km2) of Korokoro in Mali. Farmers of this watershed produce cotton and cereals (sorghum, maize, millet). Soil samples (0-20 cm) of an alfisol used for cotton cropping were collected at the end of the cropping seasons 2010 and 2011. Samples were analyzed by gas chromatography and mass spectrometer for quantifying the main pesticides (profenofos, acetamiprid, atrazine and cypermethrin) frequently used in the watershed and others organochlorine pesticides (DDT, endosulfan and HCH) that could be still detected. The results showed that soils were contaminated by DDT and its metabolites (0.1 to 3.5 μg.kg-1) due to past agricultural uses for African migratory locust control while those of endosulfan sulfate (detection limit to 4.2 μg.kg-1) and cypermethrin (2.5 to 6.2 μg.kg-1) were due to their actual application on cotton. According to mass balances calculation cypermethrin residues are stocked in the soil compartment of the watershed after its application on cotton. This accumulation was evaluated at 13 ± 0.4% of applied quantities.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSijassn
A wireless sensor network consist distributed sensors which are used to monitor physical or environmental conditions like temperature, sound, pressure and so on. Wireless sensor network are used in future in many applications like military, investigation teams, researches and so on. Security is the main issue in wireless sensor network. Sensor network arrange several types of data packets, packets of routing protocols and packets of key management protocols. Key management is the most effective method for providing better security against several types of attacks. This paper discusses the various key pre-distribution approaches along with their advantages and disadvantages.
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
Due to the sensitive nature of the data transmitted by applications ranging from mobile target
surveillance to intelligent home networking, through Wireless sensor networks, (WSNs) appropriate
protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links.
In this paper, we propose a novel group key management scheme. This paper investigates the use of secure
tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms
to the security requirements of WSNs while having less computational and network overhead. Our
protocol considerably can reduce the number of transmitted messages as well as the computational load,
which makes it suitable for WSNs. We tested the proposed protocol considering two models of mobility
of the targets which are respectively the Random Walk model and the Gauss Markov model.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Neural Cryptography for Secret Key ExchangeIJMTST Journal
The goal of any cryptography system is the exchange of information among the intended user without any leakage of information to other who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weights vectors exhibit a new phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encryption and decryption of the message or information send over the channel.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...ijasuc
WSNs are characterized by limited resources in terms of communication, computation and energy supply.
A critical constraint on sensors networks is that sensor nodes employ batteries. A second constraint is that
sensors will be deployed unattended and in large numbers, so that it will be difficult to change or recharge
batteries in the sensors .The Energy Consumption in wireless sensor networks varies greatly based on the
protocols the sensors use and computations used to generate keys for communication among neighbor
nodes. Previous research on sensor network security mainly considers homogeneous sensor networks,
where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks
have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and
hence a sensor may only communicate with a small portion of its neighbors. Key Management is a
fundamental security operation. Most existing key management schemes try to establish shared keys for all
pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this
causes large overhead and more energy consumption and more storage requirement. In this paper, we
adopt a Hybrid Sensor Network (HSN) model for better performance and security. We propose a novel
routing-driven key establishment scheme, which only establishes shared keys for neighbor sensors that
communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key
Establishment scheme for sensor nodes. The performance evaluation and security analysis show that our
key Establishment scheme can provide better security with significant reductions on communication
overhead, storage space and energy consumption than other key Establishment schemes.
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At
present, majority of the security protocols involve massive iterations and complex steps of
encryptions thereby giving rise to degradation of quality of service. Many WSN applications are
based on secure group communication. In this paper, we have proposed a scheme for secure
group key management with simultaneous multiple groups. The scheme uses a key-based
approach for managing the groups and we show that membership change events can be
handled with less storage, communication and computation cost. The scheme also offers
authentication to the messages communicated within and among the groups.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the wellestablished
point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This nonconvex
max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
Wireless Sensor Networks (WSNs) are critical component in many applications that used for data collection. Since sensors have limited resource, Wireless Sensor Networks are more vulnerable to attacks than other wireless networks. It is necessary to design a powerful key management scheme for WSNs and take in consideration the limited characteristics of sensors. To achieve security of communicated data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called Symmetric Key Management Scheme (SKMS). SKMS used Symmetric Key Cryptography that depends only on a Hash function and XOR operation for securing homogeneous and heterogeneous hierarchical WSNs. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation results show that the proposed scheme provides security, save the energy of sensors with low computation overhead.
Similar to A Modified Pair Wise Key Distribution Schemes and There Effect On Network Performances (20)
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Student information management system project report ii.pdf
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Performances
1. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 24 | P a g e
A Modified Pair Wise Key Distribution Schemes and There Effect
On Network Performances
Dheeraj Patel1
, Purushottam kumar singh2
, Deepak sukheja3
(PG Student, Dep’t. Of CSE, Oriental University, Indore)
(Assoc. Professor, Dep’t. Of CSE, Oriental University, Indore)
(Head of the, Dep’t. Of CSE, Oriental University, Indore)
ABSTRACT
Key distribution schemes has always played a pivotal role in the security of wireless sensor networks. In this
research work we focus mainly on the security aspect of WSN . We have developed a modified key distribution
scheme which uses the concepts of post as well as pre distribution scheme and thus he proved to be a better
alternative then the rest of two schemes. Simulation study has been carried out using matlab. The effort turned
out to be fruitful s our modified scheme showed less dead nodes per round of data transfer as compared to post
deployment scheme.
Keywords: Security Key establishment, Mobile sensor networks, Key prioritization, Post-deployment
knowledge.
I. INTRODUCTION
Distributed sensor networks have received a lot
of attention recently due to its wide applications in
military as well as civilian operations. Example
applications include target tracking, scientific
exploration, and data acquisition in hazardous
environments. The sensor nodes are typically small,
low-cost, battery powered, and highly resource
constrained. They usually communicate with each
other through wireless links .Security services such
as authentication and key management are critical to
secure the communication between sensor nodes in
hostile environments. As one of the most
fundamental security services, pair wise key
establishment enables the sensor nodes to
communicate securely with each other using
cryptographic techniques. However, due to the
resource constraints on sensor nodes, it is not feasible
for them to use traditional pair wise key
establishment techniques such as public key
cryptography and key distribution center (KDC).
Instead of the above two techniques, sensor nodes
may establish keys between each other through key
pre distribution, where keying materials are pre
distributed to sensor nodes before deployment. As
two extreme cases, one may setup a global key
among the network so that two sensor nodes can
establish a key based on this global key, or assign
each sensor node a unique random key with each of
the other nodes. However, the former is vulnerable to
the compromise of a single node, and the latter
introduces huge storage overhead on sensor nodes.
Eschenauer and Gligor proposed a probabilistic key
pre distribution scheme recently for pair wise key
establishment [Eschenauer and Gligor 2002]. The
main idea is to let each sensor node randomly pick a
set of keys from a key pool before the deployment so
that any two sensor nodes have a certain probability
to share at least one common key. Chan et al. further
extended this idea and developed two key pre
distribution techniques: a q –composite key pre
distribution scheme and a random pair wise keys
scheme [Chan et al. 2003]. The q -composite key pre
distribution also uses a key pool but requires two
nodes compute a pair wise key from at least q pre
distributed keys that they share. The random pair
wise keys scheme randomly picks pairs of sensor
nodes and assigns each pair a unique random key.
Both schemes improve the security over the basic
probabilistic key pre distribution scheme. However,
the pair wise key establishment problem is still not
fully solved. For the basic probabilistic and the q -
composite key pre distribution schemes, as the
number of compromised nodes increases, the fraction
of affected pair wise keys increases quickly. As a
result, a small number of compromised nodes may
affect a large fraction of pair wise keys. Though the
random pair wise keys scheme does not suffer from
the above security problem, given a memory
constraint, the network size is strictly limited by the
desired probability that two sensor nodes share a pair
wise key, the memory available for keys on sensor
nodes, and the number of neighbor nodes that a
sensor node can communicate with.
In this paper, we develop a number of key pre
distribution techniques to deal with the above
problems. We first develop a general framework for
pair wise key establishment based on the polynomial-
based key pre distribution protocol in [Blundo et al.
RESEARCH ARTICLE OPEN ACCESS
2. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 25 | P a g e
1993] and the probabilistic key distribution in
[Eschenauer and Gligor 2002; Chan et al. 2003]. This
framework is called polynomial pool-based key pre
distribution, which uses a polynomial pool instead of
a key pool in [Eschenauer and Gligor 2002; Chan et
al. 2003]. The secrets on each sensor node are
generated from a subset of polynomials in the pool. If
two sensor nodes have the secrets generated from the
same polynomial, they can establish a pair wise key
based on the polynomial-based key pre distribution
scheme. All the previous schemes in [Blundo et al.
1993; Eschenauer and Gligor 2002; Chan et al. 2003]
can be considered as special instances in this
framework.
By instantiating the components in this
framework, we further develop two novel pair-wise
key pre distribution schemes: a random subset
assignment scheme and a hypercube-based scheme.
The random subset assignment scheme assigns each
sensor node the secrets generated from a random
subset of polynomials in the polynomial pool. The
hypercube-based scheme arranges polynomials in a
hypercube space, assigns each sensor node to a
unique coordinate in the space, and gives the node
the secrets generated from the polynomials related to
the corresponding coordinate. Based on this
hypercube, each sensor node can then identify
whether it can directly establish a pair wise key with
another node, and if not, what intermediate nodes it
can contact to indirectly establish the pair wise key.
Our analysis indicates that our new schemes have
some nice features compared with the previous
methods. In particular, when the fraction of
compromised secure links is less than 60%, given the
same storage constraint, the random subset
assignment scheme provides a significantly higher
probability of establishing secure communication
between non-compromised nodes than the previous
methods. Moreover, unless the number of com-
promised nodes sharing a common polynomial
exceeds a threshold, compromise of sensor nodes
does not lead to the disclosure of keys established
between non-compromised nodes using this
polynomial.
Similarly, the hypercube-based scheme also has
a number of attractive properties. First, it guarantees
that any two nodes can establish a pair wise key
when there are no compromised nodes, provided that
the sensor nodes can communicate with each other.
Second, it is resilient to node compromise. Even if
some sensor nodes are compromised, there is stilla
high probability to re-establish a pair wise key
between non-compromised nodes. Third, a sensor
node can directly determine whether it can establish a
pair wise key with another node and how to compute
the pair wise key if it can. As a result, there is no
communication overhead during the discovery of
directly shared keys. Evaluation of polynomials is
essential to the proposed schemes, since it affects the
performance of computing a pair wise key. To reduce
the computation at sensor nodes, we provide an
optimization technique for polynomial evaluation.
The basic idea is to compute multiple pieces of key
fragments over some special finite fields such as F28
+ 1 and F216 + 1 and concatenate these fragments
into a regular key. A nice property provided by such
finite fields is that no division is necessary for
modular multiplication. As a result, evaluation of
polynomials can be performed efficiently on low cost
processors on sensor nodes that do not have division
instructions. Our analysis indicates that such a
method only slightly decreases the uncertainty of the
keys.
II. IMPLEMENTATION OF KEY PRE
DISTRIBUTION SCHEME
The basic algorithms for key pre distribution
scheme for matrix based system can be written as
below:-
1. Choose ‘N’ independent key seeds designated
as s1 , s2, s3, …..sN.
2. Let their id’s be id1,id2,id3,id4,id5,idN
3. Consider a matrix h as per [1].
4. Create a lambda x lambda matrix as per [1].
5. Calculate matrix A as per [1].
6. Generate keys and broadcast keys to each node.
7. Each node will then transmit packets to BS via
other nodes according to matrix A and with the
help of keys stored.
8. Because keys are distributed and broadcasted to
each nodes in advance this scheme is called as
key pre distribution.
9. This scheme has been implemented for 100
nodes and for 100 rounds of data packets and the
results are as below :-
Fig. 5.1 Average energy spent per round for key pre
distribution scheme
3. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 26 | P a g e
Fig 5.2 No. of dead nodes per round for key pre
distribution scheme
III. IMPLEMENTATION OF POST
DEPLOYMENT ANALYSIS
In this method as per given in [2] basic steps are
as below :-
1. ‘m’ key units are generated by the system in a set
of ‘M’ , such that each node can store a
maximum of ‘m’ key units.
2. A unique id is assigned to each node.
3. Each ‘m’ key units are randomly distributed to
each node.
4. Then nodes are deployed physically and their
locations are determined using gps and this
information is called as their unique location.
5. Prior to distributing keys the locations are also
determined randomly and associated with each
node.
6. Then each node will determine the distance
between other nodes and then the key will be
shared as per [2].
7. Because the keys are not broadcasted as shown
in [1] this scheme is referred to a post
deployment analysis.
The results for this algorithm in terms of energy
and dead nodes per round are given as below:-
Fig. 5.3 Average energy spent per round for post
deployment scheme
Fig 5.4 No. of dead nodes per round for post
deployment scheme
IV. A COMBINATIONAL APPROACH
In our work we have combined the benefits of
the above two schemes and then simulated the entire
setup for 100-500 rounds of data transfer. The basic
steps involved in our approach are as follows:-
1. We have assumed that the position of nodes are
not determined in advance contrary to pre
distribution scheme and thus the locations of the
nodes are determined via gps but this time the
information is relayed to base station.
2. The base station then depending on the location
of each node will broadcast the key matrix to
each node as per in [1].
3. This distributed common matrix will be used by
all the nodes to generate further key for
communication.
4. Each node then will determine the distance
between other nodes as per [2].
5. This information is then used for effective
communication i.e the node will not broadcast
the information, rather the information will be
relayed form one node to another as in
hierarchical wireless sensor network.
6. The LEACH clustering algorithm has been
deployed for further data transfer.
7. Because the information is relayed form one
node to another the overall dead node occurrence
is significantly reduced and hence the data
transfer gets complete without overloading the
nodes.
Various simulation results for the said scheme
are as given below:-
4. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 27 | P a g e
Fig 5.5 Simulations results for modified algorithms
for 100 rounds
Fig 5.6 Simulations results for modified algorithms
for 200 rounds
Fig 5.6 Simulations results for modified algorithms
for 300 rounds
Fig 5.7 Simulations results for modified algorithms
for 400 rounds
5. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 28 | P a g e
Fig 5.8 Simulations results for modified algorithms
for 500 rounds
V. CONCLUSION
In this research work, we developed a general
framework for polynomial pool-based pair wise key
pre distribution in sensor networks based on the basic
polynomial-based key pre distribution in [1]. This
framework allows study of multiple instantiations of
possible pair wise key establishment schemes. Based
on this framework, we developed two specific key
pre distribution schemes: the random subset
assignment scheme and the hypercube-based key pre
distribution scheme. Our analysis of these schemes
indicate that both schemes have significant
advantages over the existing approaches. The
implementation and experimental results also
demonstrate the practicality and efficiency in the
current generation of sensor networks. Several
research directions are worth investigating. First, we
observe sensor node have low mobility in many
applications. Thus, it may be desirable to develop
location-sensitive key pre distribution techniques to
improve the probability for neighbor nodes to share
common keys and at the same reduce the threat of
compromised nodes. Second, it is critical to detect
and/or revoke compromised nodes from an
operational sensor network.
It has been shown in the result analysis that the post
deployment analysis scheme given in [2] has major
drawbacks in terms of no of dead nodes per round of
data transfer , our results are better then both the
approaches but several mathematical models are still
need to be made , thus this work has to completed in
the future to avoid any dis ambiguousness in the
research literature.
6. Dheeraj Patel et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 8, (Part - 2) August 2015, pp.24-29
www.ijera.com 29 | P a g e
REFERENCES
[1] Wireless Integrated Network Sensors,
University of California, Available:
http://www.janet.ucla.edu/WINS.
[2] I. F. Akyildiz, W. Su, Y. Sankara
subramaniam, and E. Cayirci. A survey on
sensor networks. IEEE Communications
Magazine, 40(8):102–114, August 2002[3]
R. Anderson and M. Kuhn. Tamper
resistance - a cautionary note. In
Proceedings of the Second Use nix
Workshop on Electronic Commerce, pages
1–11, November 1996.
[4] R. Blom. An optimal class of symmetric key
generation systems. Advances in
Cryptology: Proceedings of EUROCRYPT
84 (Thomas Beth, Norbert Cot, and Ingemar
Ingemarsson, eds.), Lecture Notes in
Computer Science, Springer-Verlag,
209:335–338, 1985.
[5] C. Blundo, A. D. Santis, A. Herzberg, S.
Kutten, U. Vaccaro, and M. Yung.
Perfectly-secure key distribution for
dynamic conferences. Lecture Notes in
Computer Science,740:471–486, 1993.
[6] D. W. Carman, P. S. Kruus, and B. J. Matt.
Constraints and approaches for distributed
sensor network security. NAI Labs
Technical Report #00-010, available
athttp://download.nai.com/products/media/n
ai/zip/nailabs-report-00-010-final.zip,2000.
[7] H. Chan, A. Perrig, and D. Song. Random
key pre distribution schemes for sensor
networks. In IEEE Symposium on Security
and Privacy, pages 197–213,Berkeley,
California, May 11-14 2003.
[8] W. Diffie and M. E. Hellman.New directions
incryptography. IEEE Transactions on
Information Theory,22:644–654, November
1976.
[9] W. Du, J. Deng, Y. S. Han, S. Chen, and P.
K. Varshney. Akey management scheme for
wireless sensor networks usingdeployment
knowledge. Technical Report, Syracuse
University, July 2003. Available
fromhttp://www.cis.syr.edu/∼wedu/Researc
h/paper/ddhcv03.pdf.
[10] Erd˝os and R´enyi. On random graphs I.
Publ. Math.Debrecen, 6:290–297, 1959.
[11] L. Eschenauer and V. D. Gligor.A key-
management scheme for distributed sensor
networks. In Proceedings of the 9th
ACM
conference on Computer and
communications security, November 2002.
[12] J. M. Kahn, R. H. Katz, and K. S. J. Pister.
Next century challenges: Mobile networking
for smart dust. In Proceedings of the 5th
Annual ACM/IEEE Internation Conference
on Mobile Computing and
Networking(MobiCom), pages 483–492,
1999.
[13] F. J. Mac Williams and N. J. A. Sloane.The
Theory of Error-Correcting Codes. New
York, NY: Elsevier Science Publishing
Company, Inc., 1977.
[14] D. Malkhi, M. Reiter, A. Wool, and R. N.
Wright. Probabilistic quorum systems.
Information and Computation, (2):184–206,
November 2001.
[15] B. C. Neuman and T. Tso. Kerberos: An
authentication service for computer
networks. IEEE Communications,32(9):33–
38, September 1994.
[16] A. Perrig, R. Szewczyk, V. Wen, D. Cullar,
and J. D. Tygar.SPINS: Security protocols
for sensor networks. In Proceedings of the
7th Annual ACM/IEEE Internation
Conference on Mobile Computing and
Networking (MobiCom) , pages 189–199,
Rome, Italy, July 2001.