The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN IJNSA Journal
Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of communication, most of their security solutions are not suitable. In this paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For our proposal to be more effective and applicable to a large number of wireless sensor networks applications, we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensor networks and we pick one of the most interesting protocols that have been proposed for this kind of architecture, which is LEACH. This proposal is a module of a complete solution that we are developing to cover all the aspects of wireless sensor networks communication which is labeled Secure Object Oriented Architecture for Wireless Sensor Networks (SOOAWSN) .
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...ijasuc
WSNs are characterized by limited resources in terms of communication, computation and energy supply.
A critical constraint on sensors networks is that sensor nodes employ batteries. A second constraint is that
sensors will be deployed unattended and in large numbers, so that it will be difficult to change or recharge
batteries in the sensors .The Energy Consumption in wireless sensor networks varies greatly based on the
protocols the sensors use and computations used to generate keys for communication among neighbor
nodes. Previous research on sensor network security mainly considers homogeneous sensor networks,
where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks
have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and
hence a sensor may only communicate with a small portion of its neighbors. Key Management is a
fundamental security operation. Most existing key management schemes try to establish shared keys for all
pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this
causes large overhead and more energy consumption and more storage requirement. In this paper, we
adopt a Hybrid Sensor Network (HSN) model for better performance and security. We propose a novel
routing-driven key establishment scheme, which only establishes shared keys for neighbor sensors that
communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key
Establishment scheme for sensor nodes. The performance evaluation and security analysis show that our
key Establishment scheme can provide better security with significant reductions on communication
overhead, storage space and energy consumption than other key Establishment schemes.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN IJNSA Journal
Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of communication, most of their security solutions are not suitable. In this paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For our proposal to be more effective and applicable to a large number of wireless sensor networks applications, we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensor networks and we pick one of the most interesting protocols that have been proposed for this kind of architecture, which is LEACH. This proposal is a module of a complete solution that we are developing to cover all the aspects of wireless sensor networks communication which is labeled Secure Object Oriented Architecture for Wireless Sensor Networks (SOOAWSN) .
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...ijasuc
WSNs are characterized by limited resources in terms of communication, computation and energy supply.
A critical constraint on sensors networks is that sensor nodes employ batteries. A second constraint is that
sensors will be deployed unattended and in large numbers, so that it will be difficult to change or recharge
batteries in the sensors .The Energy Consumption in wireless sensor networks varies greatly based on the
protocols the sensors use and computations used to generate keys for communication among neighbor
nodes. Previous research on sensor network security mainly considers homogeneous sensor networks,
where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks
have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and
hence a sensor may only communicate with a small portion of its neighbors. Key Management is a
fundamental security operation. Most existing key management schemes try to establish shared keys for all
pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this
causes large overhead and more energy consumption and more storage requirement. In this paper, we
adopt a Hybrid Sensor Network (HSN) model for better performance and security. We propose a novel
routing-driven key establishment scheme, which only establishes shared keys for neighbor sensors that
communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key
Establishment scheme for sensor nodes. The performance evaluation and security analysis show that our
key Establishment scheme can provide better security with significant reductions on communication
overhead, storage space and energy consumption than other key Establishment schemes.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...paperpublications3
Abstract: A wireless sensor network (WSN) is an technology playing a vital role nowdays. One of the major challenges wireless sensor networks face today is security. Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. The power of wireless sensor networks lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. The denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced. This paper aims with power exhausting attacks and energy consumption on wireless sensor networks.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
Data secrecy is one of the key concerns for wireless body sensor networks (WBSNs). Usually, a data
secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face
more serious limitations than general wireless networks in terms of energy supply. To address this, in this
paper, we propose an energy efficient data secrecy scheme for WBSNs. On one hand, the proposed key
establishment protocol integrates node IDs, seed value and nonce seamlessly for security, then
establishes a session key between two nodes based on one-way hash algorithm SHA-1. On the other hand,
a low-complexity threshold selective encryption technology is proposed. Also, we design a security
selection patter exchange method with low-complexity for the threshold selection encryption. Then, we
evaluate the energy consumption of the proposed scheme. Our scheme shows the great advantage over
the other existing schemes in terms of low energy consumption.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Data transmitted encryption for clustering protocol in heterogeneous wireless...nooriasukmaningtyas
In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...paperpublications3
Abstract: A wireless sensor network (WSN) is an technology playing a vital role nowdays. One of the major challenges wireless sensor networks face today is security. Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. The power of wireless sensor networks lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. The denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced. This paper aims with power exhausting attacks and energy consumption on wireless sensor networks.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
Data secrecy is one of the key concerns for wireless body sensor networks (WBSNs). Usually, a data
secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face
more serious limitations than general wireless networks in terms of energy supply. To address this, in this
paper, we propose an energy efficient data secrecy scheme for WBSNs. On one hand, the proposed key
establishment protocol integrates node IDs, seed value and nonce seamlessly for security, then
establishes a session key between two nodes based on one-way hash algorithm SHA-1. On the other hand,
a low-complexity threshold selective encryption technology is proposed. Also, we design a security
selection patter exchange method with low-complexity for the threshold selection encryption. Then, we
evaluate the energy consumption of the proposed scheme. Our scheme shows the great advantage over
the other existing schemes in terms of low energy consumption.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Data transmitted encryption for clustering protocol in heterogeneous wireless...nooriasukmaningtyas
In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
Similar to A secure and energy saving protocol for wireless sensor networks (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
A secure and energy saving protocol for wireless sensor networks
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3353~3360
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.2796 3353
Journal homepage: http://beei.org
A secure and energy saving protocol for wireless sensor
networks
Aso Ahmed Majeed1
, Baban Ahmed Mahmood2
, Ahmed Chalak Shakir3
1
Department of Parasitology, College of Veterinary Medicine, University of Kirkuk, Iraq
2,3
Network Department, College of Computer Science and Information Technology, University of Kirkuk, Iraq
Article Info ABSTRACT
Article history:
Received Jan 10, 2021
Revised Apr 26, 2021
Accepted Oct 4, 2021
The research domain for wireless sensor networks (WSN) has been
extensively conducted due to innovative technologies and research directions
that have come up addressing the usability of WSN under various schemes.
This domain permits dependable tracking of a diversity of environments for
both military and civil applications. The key management mechanism is a
primary protocol for keeping the privacy and confidentiality of the data
transmitted among different sensor nodes in WSNs. Since node's size is small;
they are intrinsically limited by inadequate resources such as battery life-time
and memory capacity. The proposed secure and energy saving protocol
(SESP) for wireless sensor networks) has a significant impact on the overall
network life-time and energy dissipation. To encrypt sent messsages, the
SESP uses the public-key cryptography’s concept. It depends on sensor nodes'
identities (IDs) to prevent the messages repeated; making security goals-
authentication, confidentiality, integrity, availability, and freshness to be
achieved. Finally, simulation results show that the proposed approach
produced better energy consumption and network life-time compared to
LEACH protocol; sensors are dead after 900 rounds in the proposed SESP
protocol. While, in the low-energy adaptive clustering hierarchy (LEACH)
scheme, the sensors are dead after 750 rounds.
Keywords:
Attack
Cryptography
Heterogenous WSN
Key management
Security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Baban Ahmed Mahmood
Department of Network
University of Kirkuk, Kirkuk, Iraq
Email: baban.mahmoodjaf@gmail.com
1. INTRODUCTION
Recently, the wireless sensor network (WSN) has been considered as a new processing technology.
The WSN consists of hundreds of compact and tiny sensor nodes and has a wide range of applications such
as home automation, traffic control, flood, tsunami, or earthquake detection, microclimates and monitoring
for hazardous gases, and structural health monitoring. Also in terrain scanning, intelligent guiding, imaging,
and battlefield surveillance, which are mean to enable monitoring and tracking of movements of vehicles and
the presence of enemy forces. Commercial applications include inventory control, vehicle tracking and
detection, and monitoring congestion and prevention of road accidents. Health applications include medical
monitoring, behavior monitoring, elderly assistance, measurement of blood parameters, remote monitoring of
physiological data, and wearable computing. Agriculture applications encompass humidity and temperature
measurement, automatic control over water sprinklers, and precision agriculture. Also applications in smart
furniture and space exploration, sound, and vibration [1], [2].
Since sensor nodes' sizes are small, the nodes are constraint with resources like energy, storage,
processing capabilities, and available bandwidth [3], [4]. These nodes are distributed in environments which
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3354
cannot be monitored or controlled with traditional networks especially, in military application. Moreover, the
link in the network should be secure and strongly by encryption to put hacker's and intruders at bay [5]-[7].
Also, the encryption and decryption are done by the mathematics equation which is acceptable for the tiny
nodes [8]. In WSN a data gathering causing high conservation of energy. In general, saving energy is done by
eliminating redundant data in transmission which leads to reducing the number of exchanged messages
among the nodes in the network [9].
Encryption is an effective method to protect data. While its techniques convert plaintext content into
unreadable ciphertext [10], [11]. Here, In the network, a sent message is encrypted by the sender’s private
key and receiver’s public-key. On the receiver side, a message is decrypted by the receiver's private key. On
the other hand, in symmetric key cryptography, senders and receivers use the same shared key to encrypt and
to decrypt messages. This means that both sender and receiver need a secure channel to exchange the shared
or secret key between them. Furthermore, the hash function is another type of encryption that produces a
fixed number of bits and this process is known as a message digest [5].
This paper proposes an efficient protocol called SESP which uses the public-key cryptography’s
concept by depending on IDs to ensure a secure link between nodes. This leads to an increase in battery and
network life-time. The sensors are vulnerable to various attacks because of their tiny and resource constraint
which can not be uploaded by complex encryption methods. Consequently, the securing link between
participating nodes and their energy conservation are challenging issues.
The rest of the paper is organized in the following order; section 2, we sum up several different
algorithms given recently in the literature, section 3, the radio energy dissipation model is presented and its
merits and demerits are shown, section 4, a comprehensive explanation of the proposed SESP protocol is
presented, sections 5 and 6, security goal analysis and attacks' analysis are described respectively, section 7
concludes the paper.
2. RELATED WORK
WSNs comprise many sensor nodes (l) that can gather data and communicate wirelessly.
Additionally, most WSNs include two other components, which are the cluster head (CH) and the base
station (BS) [12]. The key management plays an essential role to solve issues such as authentication and
authorization which are critical [1].
Zhu et al. [13] reckon that a scalable and distributed protocol is described that allows a shared key
to be established by each pair of nodes. Moreover, two different protocol s, namely, threshold secret sharing
and probabilistic key sharing are the basis of a protocol designed. The shared key is used for authentication
between the two nodes. Furthermore, each node in this protocol should obtain its neighbors' identity (ID) to
calculate the shared key. The node is loaded with a small fraction of the keys from the pool before
deployment. Also, after distribution by using a probabilistic protocol (public and deterministic) that allows
each pair of nodes, with a certain probability, to share one or more keys. Finally, every pair of nodes
connected directly via one or more keys in their key sets, and in case of no shared key, the nodes connect
indirectly through an intermediate node. The protocol guarantees connectivity, and because the message is
repeated, the adversary can get the key and attacks the network by exhausting the energy of the sensor.
Finally, the network will be hacked.
Huang et al. [12] improve the low-energy adaptive clustering hierarchy (LEACH) protocol by using
hybrid nodes. The network encompasses of WSNs and a distributed fiber sensor link, which is positioned at the
middle of the sensor field. The last one needs a steady and comparatively higher power supply. The authors
isolate the network into two areas wherein the sensors have restricted energy. Moreover, there is no
communication between the two areas. The node's life-time in this protocol is better than the LEACH protocol,
but they did not talk about message encryption which makes the network insecure and vulnerable to attacks.
Heinzelman et al. [14] produce LEACH protocol, the nodes in the network are homogenous and
each node can gather data and send it to the base station. After distribution, the sensors select themselves to
become cluster head at a threshold, after which they distribute their status to the other nodes inside the
network. The other nodes choose the CH sensor depending on minimal communication energy. Eventually,
in LEACH, periodically, a group of nodes is selected as a cluster-based to guarantee that energy load is
distributed evenly among the nodes of the different groups. This protocol needs message authentication to
prevent the network from malicious nodes.
Rasul et al. [15] propose a key distribution scheme wherein random key pre-distribution is used
such that better security and performance are achieved for a heterogeneous sensor network (HSN). On the
other hand, a homogeneous network produces both high computation and communication overhead in
addition to higher storage. The authors use a key pool, a small number of keys, to generate random keys. Key
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3355
chains, that are made using a one way hash function, make a key pool. For each sensor node, a small number
of generation keys that are randomly selected is assigned.
3. RADIO ENERGY DISSIPATION MODEL
The model in Figure 1 for the radio hardware energy distraction where the energy is dissipated by
the transmitter to operate the power amplifier and the radio electronics [16]. Also, the energy is dissipated by
the receiver to run the radio electronics as depicted in Figure 1.
Figure 1. Radio energy dissipation model
In this scheme, based on the distance between the transmitter and receiver, the channel models
multipath fading (d4 power loss) and free space (d2 power loss) were used. Sensors spend energy to transmit
and receive k bits packet (length of message) to a distance d as described as shown in:
ET = ETx-elec (l)+ETx-amp (l, d)
= lEelec+lϵfs kd2 d<Do (1)
= lEelec+lϵmp kd4 d≥Do
This loss can be inverted using power control when the power amplifier is properly configured.
When the distance is lower than a predefined threshold, the free space model is considered; otherwise, the
multipath model is utilized [16]. The energy of the electronics, Eelec, depends on different factors such as
modulation, filtering, digital coding, and spreading of the signal. On the other hand, the energy of the
amplifier, 𝜖fs*d2
or 𝜖mp*d4
, depends on a sufficient bit-error-rate and the distance between the transmitter and
receiver. The parameters for the energy of the communication are Eelec=50 nJ/bit,∈fs=10 pJ/bit/m2
,
∈mp=0.0013pJ/bit/m4. However, the data aggregation energy is EDA=5 nJ/bit/signal and the threshold
distance value Do is given as shown in [16]:
𝐷𝑜 = √
𝐸𝑓𝑠
𝐸𝑎𝑚𝑝
(2)
The proposed SESP protocol uses the radio energy dissipation model because it uses less energy
than the LEACH protocol.
4. PROPOSED SESP PROTOCOL
This paper proposes a MAC formula for key management that is designed for hierarchical WSNs.
each cluster head (CH) and sensor (L) has their IDs in hierarchical WSN. Besides, only the CH can
communicate with base station (BS), the L sensors can communicate with CH, and L sensors cannot
communicate with each other’s [17].
In the network, the CHs have high power, large memory capacity, and great process capability.
However, the L sensors are normal (restricted energy and memory size) [5], [18]. The distribution area is
(100 x 100) m2
, number of CHs are two with 100 L sensors which are scattered randomly in the uncontrolled
area [19], [20], the circles are L sensors, pink rectangles are CHs sensors and the green star is BS as shown in
Figure 2. There are no power restrictions for the BS, high storage capacity, and larger communication [5],
[18], while the power consumption has to be highly reserved for the scattered nodes to keep the life-time of
the network as long as possible and position in a safe area. The L sensors' costs are cheaper than CH and that
is due we use two CHs, and in case of increases in the CHs, the cost will increase. Moreover, when using
large areas, we can increase the number of CHs and BS.
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3356
Figure 2. CHs send hello message
4.1. Network setup
4.1.1. Pre-distribution phase
In this part, the initialization and authentication start including the equations needed for
communication taking into consideration the following assumptions:
- The network area is 100 x 100 m2
.
- CH directly links with BS and it has the IDs of all Ls and BS.
- L sensors have the CHs IDs which are two and L nodes are 100.
- BS exchanges the messages with L sensors via CH and vice versa.
- L sensors’ initial energy is 0.5J.
4.1.2. Distribution phase
After random deployment, each CH broadcasts a hello message as shown in Figure 2 and Figure 3
where IDCH is the identification of the cluster head, || is an append operation, ⨁ is an XOR operation, K∈G is
an integer number that starts with one and increased by one in each round to prevent message redundancy,
and i is the sensor number.
Figure 3. The SESP protocol
In step 2, each L receives more than one message from different CHs and chooses the strongest
CH’s signal after decrypting the message according to Figure 4 [21]. Moreover, the L sensor sends an
encrypted message to selected CH consists of its ID as shown in Figure 4. The dotted green line represents
near Ls to CH spends energy according to (1) when d<D0 and the dotted orange line considers the far Ls
from CH which spends energy according to (1) when d>=D0.Figure 4. The SESP protocol.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3357
Figure 4. L sensors select the near CH
In step 3, each CH decrypts the Ls message and identifies the legal node via preloaded ID, then
creates its cluster and joins the BS as shown Figure 5. In step 4, the BS sends an acknowledgment to each CH
according to Figure 6 and leads to complete the network. Moreover, the message is encrypted and decrypted
using a protocol shown in Figure 7. In the proposed SESP protocol, nodes select their respective CHs
according to the signal ratio from the node that announces itself as CH. Data aggregation is executed by CH,
thus CH nodes consume relatively much more energy than member nodes. Calculation of energy dissipated is
performed based on distance.
Figure 5. CHs send a message to BS Figure 6. The proposed network
Figure 7. Message encryption and decryption
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3358
5. SECURITY GOALS ANALYSIS
The security goals’ analysis is the main part of the proposed SESP protocol as given as shown in:
- Authentication: each node in the proposed SESP protocol has a unique key (ID). The sender encrypts its message
by its ID in a formula. Besides, the receiver authenticates the received message by the ID of the sender.
- Confidentiality: messages in the proposed protocol is encrypted via an equation: the ID of each sensor
remains secret from the enemy by embedding it in the formula. Moreover, it is not repeated.
- Integrity: the proposed SESP protocol protects the received messages from alteration and modification by
using an embedded ID in the formula described above in the proposed protocol.
- Availability: the network in the proposed SESP protocol is survived until the nodes spend their energy.
Further, the messages are updated in each round.
- Freshness: this goal is achieved because first, the messages exchanged are fresh, and second, the
resending of old data is avoided using a counter in the formula.
- Resilience: if an attacker compromises the CHs, then he/she can hack the network. Besides, if the attacker
compromises Ls, he/she can hack only this cluster.
Besides, Table 1 shows the comparison between the proposed SESP protocol and the protocols
presented in the literature in terms of security goals according to reference [22].
Table 1. Comparison according to security goal
Requirements Proposed SESP Protocol Protocol [23] Protocol [24] Protocol [25]
Authentication ✓ ✓ ✓ ✓
Confidentiality ✓
Integrity ✓ ✓
Scalability ✓ ✓ ✓
Resilience
Cryptographic mechanism ✓ ✓ ✓ ✓
6. ATTACKS ANALYSIS
The proposed SESP method is effective versus different attacks as explained as shown in:
- Eavesdrops attack: the proposed SESP protocol is resistant to this attack because the attacker catches the
signals. However, he/she cannot determine what the message includes because the message’s contents are
a stream bit of numbers, which makes the message non-understandable.
- Sybil attack: this does not influence the network of the proposed SESP protocol because the nodes’ IDs
are embedded in a formula.
- Sinkhole attack: the nodes in the proposed SESP protocol decrypt the messages according to the formula
supplied in pre-distribution. Therefore, the attacker’s messages will be canceled.
- Wormhole attack: the attacker work to make a tunnel and change the network route. The attacker doesn’t
affect our network unless he/she gains the formula.
- Hello flood attack: the proposed SESP protocol is resistant to this attack because the nodes in the proposed
SESP protocol have the BS’s ID which is embedded in a formula, and recognize the illegitimate BS.
- Clone attack: the intruder can attack and hack the network of the proposed SESP protocol.
Table 2 shows the comparison between the proposed SESP protocol and other protocols presented in
the related work in terms of security goals according to this reference [15]. Furthermore, Figure 8 shows the
life-time of the sensors. We can see that the proposed SESP protocol is satisfied in terms of the death and life
of sensors. The sensor is dead after 750 rounds in the LEACH protocol. while, in the proposed SESP
protocol, the sensors are dead after 900 rounds; due to the use of the model in section (3 radio energy
dissipation model). Further, Figure 9 shows the total dissipated energy for all the sensors to propose SESP
protocol is better than LEACH protocol. due to the use of the model in section (3 radio energy dissipation
model). Finally, the simulation of the proposed SESP protocol that was done by MATLAB R2015a shows
that the proposed SESP protocol is better than LEACH.
Table 2. Comparison according to attack in WSN.
Protocol
Attack
Protocol [26] Protocol [27] Proposed SESP protocol
Eavesdropping ✓
Hello flood ✓ ✓
Worm-hole ✓ ✓ ✓
Sinkhole ✓ ✓ ✓
Sybil ✓ ✓
Clone attack
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3359
Figure 8. Number of nodes alive in proposed SESP
protocol vs LEACH in round
Figure 9. Total dissipated energy of proposed SESP
protocol vs LEACH in round
7. CONCLUSION
The proposed SESP protocol is based on a hierarchical network. Nodes in the network establish a
secure link through a protocol constructed based on public-key cryptography principles wherein, the ID is
considered as a public-key and the formula as a private key. The message in the proposed SESP protocol is
encrypted and never repeated in the network (i.e., no other sensor sends a message that was sent by other
sensors). İn each round, there are new messages different from the messages either in the previous and/or the
next round. That makes the proposed SESP protocol attain security goals like authentication, confidentiality,
integrity, availability, and freshness. Moreover, the proposed SESP protocol is resistant to various attacks
mentioned above in the attack analysis. Finally, the simulation produced better energy consumption,
dissipated energy, network life-time, and better security goals compared to the leach.
REFERENCES
[1] R. Priyadarshi, B. Gupta and A. Anurag, "Deployment techniques in wireless sensor networks: a survey,
classification, challenges and future research issues," The Journal of Supercomputing, Springer, vol. 76, pp. 1-41,
2020, doi: 10.1007/s11227-020-03166-5.
[2] B. A. Mahmood and D. Manivannan, "Position based and hybrid routing protocols for mobile ad hoc networks: a
survey," Wireless personal communications, vol. 83, no. 2, pp. 1009-1033, 2015, doi: 10.1007/s11277-015-2437-8.
[3] L. Tawalbeh, S. Hashish and H. Tawalbeh, "Quality of service requirements and challenges in generic WSN
infrastructures," Procedia Computer Science, vol. 109, pp. 1116-1121, 2017, doi: 10.1016/j.procs.2017.05.441.
[4] E. H. Putra, R. Hidayat, Widyawan and I. W. Mustika, "Energy-Efficient Routing Based on Dynamic Programming
for Wireless Multimedia Sensor Networks (WMSNs)," International Journal of Electronics and
Telecommunications, vol. 63, no. 3, pp. 279-283, 2017, doi: 10.1515/eletel-2017-0037.
[5] A. A. Majeed, "Cluster forming based on spatial information using HMAC in WSN," Tikrit Journal of Pure
Science, vol. 22, no. 6, pp. 131-139, 2017.
[6] B. A. Mahmood and D. Manivannan, "GRB: Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc
Networks," in IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, 2015.
[7] B. Mahmood, A. Ibrahim and D. Manivannan, "Sariadne: A secure source routing protocol to prevent hidden-
channel attacks," in IEEE 12th International Conference on Wireless and Mobile Computing, Networking and
Communications (WiMob), 2016, doi: 10.1109/WiMOB.2016.7763267.
[8] A. A. Majeed, K. A. Ameen, A. C. Shakir and Y. Alyeksyeyenkov, "The Enhanced Data Sequence Method for
ECC Cryptosystem," Applied Mathematical Sciences, vol. 8, no. 112, pp. 5553-5564, 2014.
[9] K. N. S. Kumar and Shivashankar, "A review on security and privacy issues in wireless sensor networks," in 2nd
IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
(RTEICT), 2017, doi: 10.1109/RTEICT.2017.8256945 .
[10] H. R. Zagi and A. T. Maolood, "A Novel Serpent Algorithm Improvement By The Key Schedule Increase
Security," Tikrit Journal of Pure Science, vol. 6, pp. 114-125, 2020, doi: 10.25130/j.v25i6.1078.
[11] B. A. Mahmood and D. Manivanann, "Hybrid on-demand greedy routing protocol with backtracking for mobile ad-
hoc networks," International Journal of Pervasive Computing and Communications, vol. 16, no. 1, pp. 24-52,
2020.
[12] J-Y Huang, I-E Liao and H-W Tang, "A forward authentication key management scheme for heterogeneous sensor
networks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, no. 1, p. 296704, 2011.
[13] S. Zhu, S. Xu, S. Setia and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: a
probabilistic approach," 11th IEEE International Conference on Network Protocols, 2003. Proceedings., 2003, pp.
326-335, doi: 10.1109/ICNP.2003.1249782.
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3360
[14] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for wireless
microsensor networks," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,
2000, doi: 10.1109/HICSS.2000.926982.
[15] K. Rasul, N. Nuerie and A. K. Pathan, "An Enhanced Tree-Based Key Management Scheme for Secure
Communication in Wireless Sensor Network," in IEEE 12th International Conference on High Performance
Computing and Communications (HPCC), 2010, doi: 10.1109/HPCC.2010.14.
[16] W. B. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, "An application-specific protocol architecture for
wireless microsensor networks," in IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670,
Oct. 2002, doi: 10.1109/TWC.2002.804190.
[17] D. N. Ravikiran and C. G. Dethe, "Improvements In Routing Algorithms to Enhance Lifetime of Wireless Sensor
Networks," International Journal of Computer Networks & Communications (IJCNC), vol. 10, no. 2, pp. 23-32,
2018, doi: 10.5121/ijcnc.2018.10203.
[18] J. Sumathi and R. L. Velusamy, "A review on distributed cluster based routing approaches in mobile wireless
sensor networks," J Ambient Intell Human Comput., vol. 12, pp. 835-849, 2021, doi: 10.1007/s12652-020-02088-7.
[19] J. Shen, A. Wang, C. Wang, P. C. K. Hung and C. Lai, "An Efficient Centroid-Based Routing Protocol for Energy
Management in WSN-Assisted IoT," in IEEE Access, vol. 5, pp. 18469-18479, 2017,
doi:10.1109/ACCESS.2017.2749606.
[20] S. G. Susila and J. Arputhavijayaselvi, "Innovative Energy Resourceful Merged Layer Technique (MLT) of Node
Deployment to Enhance the Lifetime of Wireless Sensor Networks," Egyptian Informatics Journal, vol. 16, no. 1,
pp. 23-28, 2015, doi: 10.1016/j.eij.2014.11.002.
[21] K. Haseeb, I. Ud Din, A. Almogren and N. Islam, "An Energy Efficient and Secure IoT-Based WSN Framework:
An Application to Smart Agriculture," Sensors, vol. 20, no. 7, pp. 1-14, 2020, doi: 10.3390/s20072081.
[22] O. Cheikhrouhou, A. Koubâa, M. Boujelben and M. Abid, "A lightweight user authentication scheme for Wireless
Sensor Networks," in ACS/IEEE International Conference on Computer Systems and Applications-AICCSA, 2010.
[23] Z. Benenson, F. Gärtner and D. Kesdogan, "User Authentication in Sensor Networks," Computer Science Connects,
vol. 2, pp. 385-389, 2004.
[24] C. Jiang, B. Li and H. Xu, "An Efficient Scheme for User Authentication in Wireless Sensor Networks," in 21st
International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.
[25] H. Tseng, R. Jan and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor
Networks," in IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 2007.
[26] S. Hussain, F. Kausar and A. Massood, "An efficient key distribution scheme for heterogeneous sensor networks,"
in international conference on Wireless communications and mobile computing, ACM, August 2007.
[27] B. Maala, H. Bettahar and A. Bouabdallah, "TLA: A Tow Level Architecture for Key Management in Wireless
Sensor Networks," in Second International Conference on Sensor Technologies and Applications, 2008.
BIOGRAPHIES OF AUTHORS
Aso Ahmed Majeed is currently an instructor at University of Kirkuk Kirkuk, Iraq. He received a
B.Sc. in software engineering from Technical College, Kirkuk, Iraq in 2004 and M.Sc. in Computer
Engineering from Cankaya University, Ankara, Turkey in 2015. He published his research in the
following areas: computer networks, security in wireless sensors network, and AI.
Baban Ahmed Mahmood is currently the chairman of Networks Department at University of
Kirkuk, Kirkuk, Iraq. He received a B.Sc., degree in Computer and Software engineering from
University of Al-Mustansryah, Iraq, in 2003 and a M.Sc., degree in Computer Science from
University of Sulaimaniya, Iraq, in 2009. He received a PhD degree in Computer Science from
University of Kentucky, Lexington, Kentucky, USA 2016. He worked in the program of some
international conferences. He reviewed many papers for several prestigious journals and conferences.
He published his research work in the following areas: routing in ad hoc networks, security of source
routing protocols in MANET, and security of health records via cloud.
Ahmed Chalak Shakir is currently the dean of the College of computer science and information
technology, University of Kirkuk, Iraq. He received a B.Sc, degree in Computer and Software
Engineering from University of Al-Mustansryah, Iraq, in 2001. In 2002 he got a High Diploma
degree in software engineering from Iraqi commission for computers & informatics/ Institute for
post graduate studies in informatics, Bagdad, Iraq, and a M.Sc., degree in Computer Science from
University of Sulaimaniya, Iraq, in 2007. He also received a PhD degree in Computer Engineering,
Harbin institude of technology, china in 2013. He published his research work in the following areas:
information and network security.