As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
35 9142 it s-execution evaluation of end-to-end edit septianIAESIJEECS
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
Kavita Sunchu, Dhainje Prakash " Structure less Efficient Data Aggregation and Data Integrity in Sensor Network ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation techniques provide higher security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead. Data aggregation protocol can reduce the communication cost, so the life time of sensor network is extended. The structure based has the overhead in dynamic scenarios for any event based application. The goal of our work is to design techniques and protocol that is structure free and ensure data integrity and aggregation with low transmission overhead and transmission cost. Experiment results demonstrate that the transmission overhead is still reduced even if on sensing data. Further, the design has been generalized and adopted in wireless sensor networks.
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity, density and vibration intensity measurements can be collected through sensing units and transferred wirelessly to a control system for operation and management. Adopting WSNs for process monitoring and control provides great advantages over traditional wired system. In today's world we are facing with many di erent types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and also we can save property from damage. This wireless sensor network for Temperature monitoring System which can report the emergency to the users in various forms, such as pop ups on a Computer screen, SMS on their cell phones and so on. Due to this exibility of reporting low cost wireless sensor network prepared for emergency response system of future. We are going to develop three wireless sensor nodes and we have to place in di erent position in the building using arduino board and we have to inform to the master node or monitoring node about the temperature available at each sensor node. While sending data to each and every sensor is very costly. Hence nodes are connected to WSN and their is only one node called 'Gateway' which collects the data from all other nodes and sends it to the cloud. Aditya Jogdand | Amit Chaudhari | Niranjan Kadu | Udaykumar Shroff ""WSN Based Temperature Monitoring System for Multiple Locations in Industry"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23124.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23124/wsn-based-temperature-monitoring-system-for-multiple-locations-in-industry/aditya-jogdand
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...ijasuc
WSNs are characterized by limited resources in terms of communication, computation and energy supply.
A critical constraint on sensors networks is that sensor nodes employ batteries. A second constraint is that
sensors will be deployed unattended and in large numbers, so that it will be difficult to change or recharge
batteries in the sensors .The Energy Consumption in wireless sensor networks varies greatly based on the
protocols the sensors use and computations used to generate keys for communication among neighbor
nodes. Previous research on sensor network security mainly considers homogeneous sensor networks,
where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks
have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and
hence a sensor may only communicate with a small portion of its neighbors. Key Management is a
fundamental security operation. Most existing key management schemes try to establish shared keys for all
pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this
causes large overhead and more energy consumption and more storage requirement. In this paper, we
adopt a Hybrid Sensor Network (HSN) model for better performance and security. We propose a novel
routing-driven key establishment scheme, which only establishes shared keys for neighbor sensors that
communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key
Establishment scheme for sensor nodes. The performance evaluation and security analysis show that our
key Establishment scheme can provide better security with significant reductions on communication
overhead, storage space and energy consumption than other key Establishment schemes.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Similar to A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 156 editor@iaeme.com
As we define below, we are deploying prototype wireless network sensors . These sensors
measure environmental parameters and we are experimenting with having them control air
conditioning and lighting systems. Serious privacy questions arise if third parties can read or
tamper with sensor data. In the future, we envision wireless sensor networks being used for
backup and life-critical systems – and here the questions of security are foremost.
This paper presents a set of Security Protocols for Sensor Networks, SPINS. The chief
contributions of this paper are:Exploring the challenges for security in sensor networks.
Designing and developing TESLA (the “micro” version of the Timed, Efficient, Streaming,
Loss-tolerant Authentication Protocol), providing authenticated streaming broadcast.
Designing and developing SNEP (Secure Network Encryption Protocol) providing data
confidentiality, two-party data authentication, and data freshness, with low overhead.
Designing and developing an authenticated routing protocol using SPINS building blocks.
1.1. Sensor Hardware
we are building prototype networks of small sensor devices under the SmartDust program [32].
We have deployed these in one of our buildingsl (see Figure 1). By design, these sensors are
inexpensive, low-power devices. As a result, they have limited computational and
communication resources. The sensors form a self-organizing wireless network (see Figure 1)
and form a multihop routing topology. Typical applications may periodically transmit sensor
readings for processing.
Our current prototype consists of nodes, small battery powered devices, that communicate
with a more powerful base station, which in turn is connected to an outside network. Table 1
summarizes the performance characteristics of these devices. At 4MHz, they are slow and
underpowered (the CPU has good support for bit and byte level I/O operations, but lacks support
for many arithmetic and some logic operations). They are only 8-bit processors (note that
according to [40], 80% of all microprocessors shipped in 2000 were 4 bit or 8 bit devices).
Communication is slow at 10 Kbps.
The operating system is particularly interesting for these devices. We use TinyOS [16]. This
small, event-driven operating system consumes almost half of 8KB of instruction flash
memory, leaving just 4500 bytes for security and the application.
It is hard to imagine how significantly more powerful devices could be used without
consuming large amounts of power. The energy source on our devices is a small battery, so we
are caught with relatively limited computational devices. Similarly, since communication over
radio will be the most energy-consuming function
Table 1 Characteristics of prototype SmartDust nodes
CPU 8-bit, 4MHz
Storage
8KB instruction flash
512 bytes RAM
512 bytes EEPROM
Communication 916 MHz radio
Bandwidth 10Kilobits per second
Operating System TinyOS
OS code space 3500 bytes
Available code space 4500 bytes
performed by these devices, we need to decrease communications overhead. The limited
energy supplies create tensions for security: on the one hand, security needs to limit its
3. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 157 editor@iaeme.com
consumption of processor power; on the other hand, limited power supply limits the lifetime of
keys (battery replacement is designed to reinitialize devices and zero out keys.) 1
1.2. Is Security on Sensors Possible?
These limitations make it impractical to use the majority of the current secure algorithms, which
were considered for powerful workstations. For example, the working memory of a sensor node
is inadequate to even hold the variables (of sufficient length to ensure security) that are required
in asymmetric cryptographic algorithms (e.g. RSA [35], Diffie-Hellman [8]), let alone perform
operations with them.
A particular challenge is broadcasting genuine data to the entire sensor network. Current
proposals for authenticated broadcast are impractical for sensor networks. Most proposals rely
on asymmetric digital signatures for the authentication, which are impractical for multiple
reasons (e.g. long signatures with high communication overhead of 50-1000 bytes per packet,
very high overhead to create and verify the signature). Furthermore, earlier proposed purely
symmetric solutions for broadcast authentication are impractical: Gennaro and Rohatgi’s initial
work required over 1 Kbyte of authentication information per packet [11], and Rohatgi’s
improved k-time signature scheme requires over bytes per packet [36]. Some of the authors of
this paper have also proposed the authenticated streaming broadcast TESLA protocol [31].
TESLA is efficient for the Internet with regular desktop workstations, but does not scale down
to our resource-starved sensor nodes. In this paper, we extend and adapt TESLA such that it
becomes practical for broadcast authentication for sensor networks. We call our new protocol
TESLA.
We have implemented all of these primitives. Our measurements show that adding security
to a highly resource-constrained sensor network is feasible. The paper studies an authenticated
routing protocol and a two-party key agreement protocol, and demonstrates that our security
building blocks greatly facilitate the implementation of a complete security solution for a sensor
network.
Given the severe hardware and energy constraints, we must be careful in the choice of
cryptographic primitives and the security protocols in the sensor networks.
2. SYSTEM ASSUMPTIONS
Before we outline the security requirements and present our security organization, we need to
define the system architecture and
Note that base stations differ from nodes in having longer-lived energy supplies and having
additional communications connections to outside networks.
Figure 1 Communication organization within a sensor network. All messages are either destined for
the base station or originate at the base station. The routes are discovered so that the number of hops is
minimized and the reliability of each connection is maximized.
4. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 158 editor@iaeme.com
the trust requirements. The objective of this work is to propose a general security
infrastructure that is appropriate to a variety of sensor networks.
2.1. Communication Architecture
Generally, the sensor nodes communicate using RF, so broadcast is the fundamental
communication primitive. The baseline protocols account for this property: on one hand it
affects the trust assumptions, and on the other it is exploited to minimize the energy usage.
Figure 1 shows the organization of a typical SmartDust sensor network. The network forms
around one or more base stations, which interface the sensor network to the outside network.
The sensor nodes establish a routing forest, with a base station at the root of every tree. Periodic
transmission of beacons allows nodes to create a routing topology. Each node can forward a
message towards a base station, recognize packets addressed to it, and handle message
broadcasts. The base station accesses individual nodes using source routing. We assume that
the base station has capabilities similar to the network nodes, except that it has enough battery
power to surpass the lifetime of all sensor nodes, sufficient memory to store cryptographic keys,
and means for communicating with outside networks.
In the sensor applications developed so far, there has been limited local exchange and data
processing. The communication patterns within our network fall into three categories:
Node to base station communication, e.g. sensor readings.
Base station to node communication, e.g. specific requests.
Base station to all nodes, e.g. routing beacons, queries or reprogramming of the entire
network.
Our security goal is to address primarily these communication patterns, though we do show
how to adapt our baseline protocols to other communication patterns, i.e. node to node or node
broadcast.
2.2. Trust Requirements
Generally, the sensor networks may be deployed in untrusted locations. While it may be
possible to guarantee the integrity of the each node through dedicated secure microcontrollers
(e.g. [1] or [7]), we feel that such an architecture is too restrictive and does not generalize to the
majority of sensor networks. Instead, we assume that individual sensors are untrusted. Our goal
is to design the SPINS key setup so a compromise of a node does not spread to other nodes.
Basic wireless communication is not secure. Because it is broadcast, any opponent can
eavesdrop on the traffic, and inject new messages or replay and change old messages. Hence,
SPINS does not place any trust expectations on the communication organization, except that
messages are conveyed to the destination with nonzero probability.
Since the base station is the gateway for the nodes to communicate with the outside world,
compromising the base station can render the entire sensor network useless. Thus the base
stations are a essential part of our trusted computing base. Our trust setup reflects this and so
all sensor nodes closely trust the base station: at creation time, each node is given a master key
which is common with the base station. All other keys are resulting from this key.
Finally, each node beliefs itself. This supposition seems necessary to make any forward
development. In particular, we trust the local clock to be exact, i.e. to have a small drift. This is
necessary for the genuine broadcast protocol we describe in Section 5.
2.3. Design Guidelines
With the limited computation resources available on our platform, we cannot afford to use
asymmetric cryptography and so we use symmetric cryptographic primitives to build the SPINS
5. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 159 editor@iaeme.com
protocols. Due to the limited program store, we construct all cryptographic primitives (i.e.
encryption, message authentication code (MAC), hash, random number generator) out of a
single block cipher for code reuse. To decrease communication overhead we exploit common
state between the connecting parties.
3. NECESSITIES FOR SENSOR NETWORK SECURITY
In this section, we formalize the security properties required by sensor networks, and show how
they are directly applicable in a typical sensor network.
3.1. Data Confidentiality
A sensor network should not leak sensor readings to neighboring networks. In many
applications (e.g. key distribution) nodes communicate highly sensitive data. The standard
method for keeping sensitive data secret is to encode the data with a secret key that only
proposed receivers possess, hence attaining privacy. Given the observed communication
patterns, we set up secure channels between nodes and base stations and later bootstrap other
protected channels as necessary.
3.2. Data Authentication
Message authentication is important for many applications in sensor networks. Within the
building sensor network, validation is necessary for many administrative tasks (e.g. network
reprogramming or controlling sensor node duty cycle). At the same time, an adversary can
easily inject messages, so the receiver needs to make definite that the data used in any decision-
making process invents from the correct source. Informally, data authentication allows a
receiver to verify that the data really was sent by the requested sender.
In the two-party communication case, data authentication can be accomplished through a
purely symmetric mechanism: The sender and the receiver share a secret key to compute a
message authentication code (MAC) of all communicated data. When a message with a correct
MAC arrives, the receiver knows that it must have been forwarded by the sender.
This style of verification cannot be applied to a broadcast setting, without placing much
stronger trust expectations on the network nodes. If one sender wants to send authentic data to
mutually untrusted receivers, using a symmetric MAC is uncertain: Any one of the receivers
knows the MAC key, and hence could mimic the sender and copy messages to other receivers.
Hence, we need an asymmetric mechanism to achieve authenticated broadcast. One of our
contributions is to construct authentic broadcast from symmetric primitives only, and present
asymmetry with delayed key revelation and one-way function key chains.
3.3. Data Integrity
In communication, data integrity assurances the receiver that the received data is not changed
in transit by an opponent. In SPINS, we achieve data integrity through data authentication,
which is a stronger property.
3.4. Data Freshness
Given that all sensor networks stream some forms of time varying measurements, it is not
enough to promise confidentiality and authentication; we also must assurance each message is
fresh. Informally, data freshness specifies that the data is recent, and it ensures that no opponent
replayed old messages. We identify two types of freshness: weak freshness, which offers partial
message ordering, but transmits no delay information, and strong freshness, which provides a
total order on a request-response pair, and allows for delay estimation. Weak freshness is
6. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 160 editor@iaeme.com
required by sensor measurements, while strong freshness is useful for time synchronization
within the network.
4. NOTATION
We use the following notation to describe security protocols and cryptographic operations in
this paper are principals, such as communicating nodes is a nonce generated by (a nonce is an
unpredictable bit string, usually used to achieve freshness). denotes the concatenation of
messages and denotes the secret (symmetric) key which is shared between and is the encryption
of message with the symmet- ric key shared by and signifies the encryption of message , with
key , and the initialization vector which is used in encryption modes such as cipher-block
chaining (CBC), output feedback mode (OFB), or counter mode (CTR) [9, 21,22].
By a secure channel, we mean a channel that offers confidentiality, data authentication,
integrity, and freshness.
5. SPINS SECURITY BUILDING BLOCKS
To achieve the security requirements we established in Section 3 we have designed and
implemented two security building blocks: SNEP and TESLA.SNEP provides data
confidentiality, two-party data authentication, integrity, and freshness. TESLA provides
authentication for data broadcast. We bootstrap the security for both mechanisms with a shared
secret key between each node and the base station (see Section 2). We demonstrate in Section
8 how we can extend the trust to node-to-node interactions from the node-tobase-station trust.
5.1. SNEP:DataConfidentiality, Authentication, Integrity, and Freshness
SNEP provides a number of unique advantages. First, it has low communication overhead since
it only adds bytes per message. Second, like many cryptographic protocols it uses a counter,
but we avoid transmitting the counter value by keeping state at both end points. Third, SNEP
achieves even semantic security, a strong security property which prevents eavesdroppers from
inferring the message content from the encrypted message. Finally, the same simple and
efficient protocol also gives us data authentication, replay protection, and weak message
freshness.
Data confidentiality is one of the most basic security primitives and it is used in almost
every security protocol. A simple form of confidentiality can be achieved through encryption,
but pure encryption is not sufficient. Another important security property is semantic security,
which ensures that an eavesdropper has no information about the plaintext, even if it sees
multiple encryptions of the same plaintext [12]. For example, even if an attacker has an
encryption of a bit and an encryption of a bit, it will not help it distinguish whether a new
encryption is an encryption of or . The basic technique to achieve this is randomization: Before
encrypting the message with a chaining encryption function (i.e. DES-CBC), the sender
precedes the message with a random bit string. This prevents the attacker from inferring the
plaintext of encrypted messages if it knows plaintext-ciphertext pairs encrypted with the same
key.
However, sending the randomized data over the RF channel requires more energy. So we
construct another cryptographic mechanism that achieves semantic security with no additional
transmission overhead. Instead, we rely on a shared counter between the sender and the receiver
for the block cipher in counter mode (CTR) (as we discuss in Section 6). Since the
communicating parties share the counter and increment it after each block, the counter does not
need to be sent with the message. To achieve two-party authentication and data integrity, we
use a message authentication code (MAC).
7. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 161 editor@iaeme.com
The combination of these mechanisms form our Sensor Network Encryption Protocol
SNEP. The encrypted data has the following format: , where is the data, the encryption key is ,
and the counter is . The MAC is
MAC . We derive the keys and from the master secret key as we show in Section 6. The
complete message that sends to is:
5.2. MAC
SNEP offers the following nice properties:
Semantic security: Since the counter value is incremented after each message, the same
message is encrypted differently each time. The counter value is long enough that it never
repeats within the lifetime of the node.
Data authentication: If the MAC verifies correctly, a receiver can be assured that the
message originated from the claimed sender.
Replay protection: The counter value in the MAC prevents replaying old messages. Note
that if the counter were not present in the MAC, an adversary could easily replay messages.
Weak freshness: If the message verified correctly, a receiver knows that the message must
have been sent after the previous message it received correctly (that had a lower counter value).
This enforces a message ordering and yields weak freshness.
Low communication overhead: The counter state is kept at each end point and does not need
to be sent in each message.2
Plain SNEP provides weak data freshness only, because it only enforces a sending order on
the messages within node , but no absolute assurance to node that a message was created by in
response to an event in node .
Node achieves strong data freshness for a response from node through a nonce (which is a
random number sufficiently long such that it is unpredictable). Node generates randomly and
sends it along with a request message to node . The simplest way to achieve strong freshness is
for to return the nonce with the response message in an authenticated protocol. However,
instead of returning the nonce to the sender, we can optimize the process by using the nonce
implicitly in the MAC computation. The entire SNEP protocol providing strong freshness for
’s response is:
If the MAC verifies correctly, node knows that node generated the response after it sent the
request. The first message can also use plain SNEP if confidentiality and data authentication
are needed.
5.3. TESLA: Authenticated Broadcast
Current proposals for authenticated broadcast are impractical for sensor networks. First, most
proposals rely on asymmetric digital signatures for the authentication, which are impractical for
multiple reasons. They require long signatures with high communication overhead of 50-1000
bytes per packet, very high overhead to create and verify the signature. Even previously
proposed one-time signature schemes that are based on symmetric cryptography (one-way
functions without trapdoors) have a high overhead: Gennaro and Rohatgi’s broadcast signature
based on Lamport’s one-time signature [20] requires over 1 Kbyte of authentication information
per packet [11], and Rohatgi’s improved -time signature scheme requires over bytes per packet
[36].
The recently proposed TESLA protocol provides efficient authenticated broadcast [31, 30].
However, TESLA is not designed for such limited computing environments as we encounter in
sensor networks for three reasons.
8. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 162 editor@iaeme.com
First, TESLA authenticates the initial packet with a digital signature. Clearly, digital
signatures are too expensive to compute on our sensor nodes, since even fitting the code into
the memory is a major challenge. For the same reason as we mention above, onetime
signatures are a challenge to use on our nodes.
Standard TESLA has an overhead of approximately bytes per packet. For networks
connecting workstations this is usually not significant. Sensor nodes, however, send very small
messages that are around bytes long. It is simply impractical to disclose the TESLA key for the
previous intervals with every packet: with
In case the MAC does not match, the receiver can try out a fixed, small number of counter
increments to recover from message loss. In case the optimistic re-synchronization fails, the
two parties engage in a counter exchange protocol, which uses the strong freshness protocol
described below.
bit keys and MACs, the TESLA-related part of the packet would be constitute over of the
packet.
Finally, the one-way key chain does not fit into the memory of our sensor node. So pure
TESLA is not practical for a node to broadcast authenticated data.
We design TESLAto solve the following inadequacies of TESLA in sensor networks:
TESLA authenticates the initial packet with a digital signature, which is too expensive for
our sensor nodes. TESLA uses only symmetric mechanisms.
Disclosing a key in each packet requires too much energy for sending and receiving. TESLA
discloses the key once per epoch.
It is expensive to store a one-way key chain in a sensor node. TESLA restricts the number
of authenticated senders.
5.4. TESLA Overview
We give a brief overview of TESLA, followed by a detailed description.
As we discussed in Section 3, authenticated broadcast requires an asymmetric mechanism,
otherwise any compromised receiver could forge messages from the sender. Unfortunately,
asymmetric cryptographic mechanisms have high computation, communication, and storage
overhead, which makes their usage on resourceconstrained devices impractical. TESLA
overcomes this problem by introducing asymmetry through a delayed disclosure of symmetric
keys, which results in an efficient broadcast authentication scheme.
For simplicity, we explain TESLA for the case where the base station broadcasts
authenticated information to the nodes, and we discuss the case where the nodes are the sender
at the end of this section.
TESLA requires that the base station and nodes are loosely time synchronized, and each
node knows an upper bound on the maximum synchronization error. To send an authenticated
packet, the base station simply computes a MAC on the packet with a key that is secret at that
point in time. When a node gets a packet, it can verify that the corresponding MAC key was
not yet disclosed by the base station (based on its loosely synchronized clock, its maximum
synchronization error, and the time schedule at which keys are disclosed). Since a receiving
node is assured that the MAC key is known only by the base station, the receiving node is
assured that no adversary could have altered the packet in transit. The node stores the packet in
a buffer. At the time of key disclosure, the base station broadcasts the verification key to all
receivers. When a node receives the disclosed key, it can easily verify the correctness of the
key (which we explain below). If the key is correct, the node can now use it to authenticate the
packet stored in its buffer.
9. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 163 editor@iaeme.com
Each MAC key is a key of a key chain, generated by a public one-way function . To generate
the one-way key chain, the sender chooses the last key of the chain randomly, and repeatedly
applies to compute all other keys: . Each node can easily perform time synchronization and
retrieve an authenticated key of the key chain for the commitment in a secure and authenticated
manner, using the SNEP building block. (We explain more details in the next subsection).
5.4.1. Example
Figure 2 shows an example of TESLA. Each key of the key chain corresponds to a time interval
and all packets sent within one time interval are authenticated with the same key. The time until
keys of a particular interval are disclosed is time intervals in this example.
Figure 2 Using a time-released key chain for source authentication.
We assume that the receiver node is loosely time synchronized and knows (a commitment
to the key chain) in an authenticated way. Packets and sent in interval contain a MAC with key
. Packet has a MAC using key . So far, the receiver cannot authenticate any packets yet. Let us
assume that packets , , and are all lost, as well as the packet that discloses key , so the receiver
can still not authenticate , , or . In interval
the base station broadcasts key , which the node authenticates by verifying , and hence
knows also , so it can authenticate packets , with , and with .
Instead of adding a disclosed key to each data packet, the key disclosure is independent
from the packets broadcast, and is tied to time intervals. Within the context of TESLA, the
sender broadcasts the current key periodically in a special packet.
5.5. TESLA Detailed Description
TESLA has multiple phases: Sender setup, sending authenticated packets, bootstrapping new
receivers, and authenticating packets. For simplicity, we explain TESLA for the case where the
base station broadcasts authenticated information, and we discuss the case where nodes send
authenticated broadcasts at the end of this section.
Sender setup The sender first generates a sequence of secret keys (or key chain). To
generate the one-way key chain of length, the sender chooses the last key randomly, and
generates the remaining values by successively applying a one-way function (e.g. a
cryptographic hash function such as MD5 [34]). Because is a one-way function, anybody can
compute forward, e.g. compute given , but nobody can compute backward, e.g. compute given
only, due to the one-way generator function. This is similar to the S/Key one-time password
system [14].
Broadcasting authenticated packets Time is divided into time intervals and the sender
associates each key of the one-way key chain with one time interval. In time interval , the sender
uses the key of the current interval, , to compute the message authentication code (MAC) of
packets in that interval. The sender will then reveal the key after a delay of intervals after the
end of the time interval . The key disclosure time delay is on the order of a few time intervals,
as long as it is greater than any reasonable round trip time between the sender and the receivers.
Bootstrapping a new receiver The important property of the one-way key chain is that
once the receiver has an authenticated key of the chain, subsequent keys of the chain are self-
10. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 164 editor@iaeme.com
authenticating, which means that the receiver can easily and efficiently authenticate subsequent
keys of the one-way key chain using the one authenticated key. For example, if a receiver has
an authenticated value of the key chain, it can easily authenticate , by verifying. Therefore to
bootstrap TESLA, each receiver needs to have one authentic key of the one-way key chain as a
commitment to the entire chain. Another requirement of TESLA is that the sender and receiver
are loosely time synchronized, and that the receiver knows the key disclosure schedule of the
keys of the one-way key chain. Both the loose time synchronization as well as the authenticated
key chain commitment can be established with a mechanism that provides strong freshness and
point-to-point authentication. A receiver sends a nonce in the request message to the sender.
The sender replies with a message containing its current time (for time synchronization), a key
of the one-way key chain used in a past interval (the commitment to the key chain), and the
starting time of interval , the duration int of a time interval, and the disclosure delay (the last
three values describe the key disclosure schedule).
Since we do not need confidentiality, the sender does not need to encrypt the data. The
MAC uses the secret key shared by the node and base station to authenticate the data, the nonce
allows the node to verify freshness. Instead of using a digital signature scheme as in TESLA,
we use the node-to-base-station authenticated channel to bootstrap the authenticated broadcast.
Authenticating broadcast packets When a receiver receives the packets with the MAC, it
needs to ensure that the packet could not have been spoofed by an adversary. The threat is that
the adversary already knows the disclosed key of a time interval and so it could forge the packet
since it knows the key used to compute the MAC. Hence the receiver needs to be sure that the
sender did not disclose the key yet which corresponds to an incoming packet, which implies
that no adversary could have forged the contents. This is called the security condition, which
receivers check for all incoming packets. Therefore the sender and receivers need to be loosely
time synchronized and the receivers need to know the key disclosure schedule. If the incoming
packet satisfies the security condition, the receiver stores the packet (it can verify it only once
the corresponding key is disclosed). If the security condition is violated (the packet had an
unusually long delay), the receiver needs to drop the packet, since an adversary might have
altered it.
As soon as the node receives a key of a previous time interval, it authenticates the key by
checking that it matches the last authentic key it knows , using a small number of applications
of the one-way function : . If the check is successful, the new key is authentic and the receiver
can authenticate all packets that were sent within the time intervals to . The receiver also
replaces the stored with. Nodes broadcast authenticated data New challenges arise if a node
broadcasts authenticated data. Since the node is severely memory limited, it cannot store the
keys of a one-way key chain.
Moreover, re-computing each key from the initial generating key is computationally
expensive. Another issue is that the node might not share a key with each receiver, hence
sending out the authenticated commitment to the key chain would involve an expensive node-
to-node key agreement, as we describe in Section 8. Finally, broadcasting the disclosed keys to
all receivers can also be expensive for the node and drain precious battery energy.
Here are two viable approaches to deal with this problem:
The node broadcasts the data through the base station. It uses SNEP to send the data in an
authenticated way to the base station, which subsequently broadcasts it.
11. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 165 editor@iaeme.com
The node broadcasts the data. However, the base station keeps the one-way key chain and
sends keys to the broadcasting node as needed. To conserve energy for the broadcasting node,
the base station can also broadcast the disclosed keys, and/or perform the initial bootstrapping
procedure for new receivers.
6. IMPLEMENTATION
Due to the rigorous resource constraints of the sensor nodes, the implementation of the
cryptographic primitives is a major challenge. Usually for the sake of feasibility and efficiency,
security is sacrificed. Our belief, however, is that strong cryptography is necessary for
trustworthy devices. Hence, one of our main goals is to provide strong cryptography despite the
severe hardware restrictions.
A hard constraint is the memory size: Our sensor nodes have 8 KBytes of read-only program
memory, and 512 bytes of RAM. The program memory is used for TinyOS, our security
infrastructure, and the actual sensor net application. To save program memory we implement
all cryptographic primitives from one single block cipher [22, 38].
Block cipher We evaluated several algorithms for use as a block cipher. An initial choice
was the AES algorithm Rijndael [6]; however, after closer inspection, we sought alternatives
with smaller code size and higher speed. The baseline version of Rijndael uses over 800 bytes
of lookup tables which is too large for our memorydeprived nodes. An optimized version of
that algorithm which runs about a 100 times faster, uses over 10 Kbytes of lookup tables.
Similarly, we rejected the DES block cipher which requires a 512-entry SBox table, and a 256-
entry table for various permutations [42]. We defer using other small encryption algorithms
such as TEA [43] or TREYFER [44] until they matured after thorough scrutiny of cryptanalysts.
We chose to use RC5 [33] because of its small code size and high efficiency. RC5 does not rely
on multiplication, and does not require large tables. However, RC5 does use 32-bit
datadependent rotates, and our Atmel processor only has an 8-bit single bit rotate, which makes
this operation expensive.
Even though the RC5 algorithm can be expressed very succinctly, the common RC5
libraries are too large to fit on our platform. With a judicious selection of functionality, we were
able to use a subset of RC5 from OpenSSL, and after further tuning of the code we achieve an
additional 40% reduction in code size.
Encryption function To save code space, we use the same function both for encryption
and decryption. The counter (CTR) mode of block ciphers, shown in Figure 3 has this property.
Another property of the CTR mode is that it is a stream cipher in nature. Therefore the size of
the ciphertext is exactly the size of the plaintext and not a multiple of the block size.3
This
property is particularly desirable in our environment. Message sending and receiving is very
expensive in terms of energy. Also, longer messages have a higher probability of data
corruption. Therefore, message expansion by the block cipher is undesirable. CTR mode
requires a counter for proper operation. Reusing a counter value severely degrades security. In
addition, CTR-mode offers semantic security, since the same plaintext sent at different times is
encrypted into different ciphertext because the encryption pads are generated from different
counters. To an adversary who does not know the key, these messages will appear as two
different, unrelated, random strings. Since the sender and the receiver share the counter, we do
not need to include it in the message. If the two nodes lose the synchronization of the counter,
they can simply transmit the counter explicitly to resynchronize using SNEP with strong
freshness.
The same property can also be achieved with a block cipher and the “ciphertext-stealing”
method described by Schneier [38]. The downside is that this approach requires both
encryption and decryption functions.
12. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 166 editor@iaeme.com
Figure 3 Counter mode encryption and decryption. The encryption function is applied to a
monotonically increasing counter to generate a onetime pad. This pad is then XORed with the
plaintext. The decryption operation is identical.
Freshness Weak freshness is automatically provided by the CTR encryption. Since the
sender increments the counter after each message, the receiver verifies weak freshness by
verifying that received messages have a monotonically increasing counter. For applications that
require strong freshness, the node creates a random nonce
(a 64-bit value that is unpredictable) and sends in the request message to the receiver. The
receiver generates the response message and includes the nonce in the MAC computation (see
Section 5). If the MAC of the response verifies successfully, the node knows that the response
was generated after it sent out the request message and hence achieves strong freshness.
Random-number generation Although the node has its own sensors, radio receiver, and
scheduling process, from which we could derive random digits, we choose to minimize power
requirements and select the most efficient random number generation. We use a MAC function
as our pseudo-random number generator (PRG), with the secret pseudo-random number
generator key rand. We also keep a counter that we increment after each pseudo-random block
we generate. We compute the -th pseudo-random output block as MAC rand . If wraps around
(which should never happen because the node will exhaust its energy before then), we derive a
new PRG key from the master secret key and the current PRG key using our MAC as a pseudo-
random function (PRF): rand MAC rand.
Message authentication We also need a secure message authentication code. Because we
intend to re-use our block cipher, we use the well-known CBC-MAC [41]. A block diagram for
computing CBC MAC is shown in Figure 4.
To achieve authentication and message integrity we use the following standard approach.
Assuming a message, an encryption key, and a MAC key, we use the following construction:
MAC . This construction prevents the nodes from decrypting erroneous ciphertext, which is a
potential security risk.
In our implementation, we decided to compute a MAC per packet. This approach fits well
with the lossy nature of communications within this environment. Furthermore, at this
granularity, MAC is used to check both authentication and integrity of messages, eliminating
the need for mechanisms like CRC.
Key setup Recall that our key setup depends on a secret master key, initially shared by the
base station and the node. We denote that key with for node . All keys consequently needed are
bootstrapped from the initial master secret key. Figure 5 shows our key derivation procedure.
We use the pseudo-random function
(PRF) to derive the keys, which we implement as
13. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 167 editor@iaeme.com
Figure 4 CBC MAC. The output of the last stage serves as the authentication code.
Figure 5 Deriving internal keys from the master secret key
MAC . Again, this allows for more code reuse. Since MAC has strong one-way properties,
all keys derived in this manner are computationally independent. Even if the attacker could
break one of the keys, the knowledge of that key would not help it to determine the master
secret or any other key. Additionally, if we detect that a key has been compromised, both parties
can derive a new key without transmitting any confidential information.
7. EVALUATION
We evaluate the implementation of our protocols in terms of code size, RAM size, and
processor and communication overheads.
Code size Table 2 shows the code size of three implementations of crypto routines in
TinyOS. The smallest version of the crypto routines occupies about 20% of the available code
space. Additionally, the implementation of TESLA protocol uses another 574 bytes. Together,
the crypto library and the protocol implementation consume about 2 KBytes of program
memory, which is quite acceptable in most applications.
While optimizing the crypto library, it became apparent that at this scale it is important to
identify reusable routines to minimize the call setup costs. For example, OpenSSL
implements the RC5 encryption routine as a function. In the case of a sensor network it
became clear that the costs of call setup and return outweigh the costs of the RC5 itself.
Thus, we made the decision to implement RC5 encryption as a macro, and only expose
interfaces to the MAC and CTR-ENCRYPT functions.
Table 2 Code size breakdown (in bytes) for the security modules.
Version Total Size MAC Encrypt Key Setup
Smallest 1594 480 392 622
Fastest 1826 596 508 622
Original 2674 1210 802 686
Table 3 RAM requirements of the security modules
Module RAM size (bytes)
RC5 80
TESLA 120
Encrypt/MAC 20
Performance The performance of the cryptographic primitives is adequate for the
bandwidth supported by the current generation of network sensors. The RC5 key setup requires
instruction cycles ( ms, the time required to send bits). Encryption of a byte block instruction
cycles. Our sensors currently support a maximum throughput of twenty 30-byte messages per
second, with the microcontroller being idle for about 50% of the time [16]. Assuming a single
14. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 168 editor@iaeme.com
key setup, one MAC operation, and one encryption operation, our code is still able to encrypt
and sign every message.
We infer the time required for TESLA based on static analysis of the protocol. As stated in
the previous section, TESLA has a
disclosure interval of 2. The stringent buffering requirements also dictate that the we cannot
drop more that one key disclosure beacon. Thus, we require a maximum of two key setup
operations and two CTR encryptions to check the validity of a disclosed TESLA key.
Additionally, we perform up to two key setup operations, two CTR encryptions, and up to four
MAC operation to check an integrity of a TESLA message.4
That gives an upper bound of
17,800 s for checking the buffered messages. This amount of work is easily performed on our
processor. In fact, the limiting factor on the bandwidth of authenticated broadcast traffic is the
amount of buffering we can dedicate on individual sensor nodes. Table 3 shows the amount of
RAM that the security modules require. We configure the TESLA protocol with 4 messages:
the disclosure interval dictates a buffer space of 3 messages just for key disclosure, and we need
an additional buffer to use this primitive in a more flexible way. Despite allocating nominal
quantities of memory to TESLA, the protocols we implement ingest nearly half of the available
RAM, and we do not feel that we can afford to dedicate any more RAM to security related
tasks.
Energy costs Finally we inspect the energy costs of security mechanisms. Most of the
energy costs will come from extra transmissions mandatory for the protocols. Since we use a
stream cipher for encryption, the size of encrypted message is the same as the size of the
plaintext. The MAC uses 8 bytes of every 30 byte message, however, the MAC also attains
integrity so we do not need to use other message integrity mechanisms (e.g. a 16-bit CRC).
Thus, encrypting and signing messages enforces an overhead of 6 bytes per message over an
unencrypted message with integrity checking, or about 20 %. Figure 6 expresses the costs of
computation and communication in terms of energy required for the SNEP protocol. The
messages broadcast using TESLA have the same costs of authentication per message.
Additionally, TESLA requires a periodic key disclosure, but these messages are grafted onto
routing updates (see Section 8). We can take two dissimilar views about the costs of these
messages. If we accept that the routing beacons are necessary, then TESLA key disclosure is
nearly free, because energy of transmitting or receiving dominate the computational prices of
our protocols. On the other hand, one might claim that the routing beacons are not necessary
and that it is possible to construct an ad hoc multihop network implicitly. In that case the
overhead of Key setup operations are dependent on the minimal and maximal disclosure
interval, whereas the number of MAC operations depends on the number of buffered messages.
Figure 6 Energy costs of adding security protocols to the sensor network. Most of the overhead arises
from the transmission of extra data rather than from any computational costs.
15. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 169 editor@iaeme.com
key disclosure would be one message per time interval, regardless of the traffic pattern
within the network. We believe that the benefit of authenticated routing explains the costs of
explicit beacons.
Remaining security issues Although this protocol suite does address many security related
complications, there remain many additional issues. First, we do not address the problem of
information leakage through covert channels. Second, we do not deal completely with
cooperated sensors, we merely ensure that compromising a single sensor does not disclose the
keys of all the sensors in the network. It is an interesting research problem on how to design
well-organized protocols that scale down to sensor networks which are robust to compromised
sensors. Third, we do not deal with denialof-service (DoS) attacks in this work. Since we
operate on a wireless network, an opponent can always perform a DoS attack by jamming the
radio channel with a strong signal. Finally, due to our hardware limitations, we cannot provide
Diffie-Hellman style key agreement or use digital signatures to attain non-repudiation. We
believe that for the majority of sensor network applications, authentication is enough.
8. APPLICATIONS
In this section we demonstrate how we can build safe protocols out of the SPINS secure building
blocks. First, we build an authenticated routing application, and second, a two-party key
agreement protocol.
8.1. Authenticated Routing
Using the TESLA protocol, we developed a lightweight, authenticated ad hoc routing protocol
that builds an authenticated routing topology. Ad hoc routing has been an active area of research
[5, 13, 17, 18, 26, 29, 28, 37]. However, none of these solutions offer authenticated routing
messages. Hence it is potentially easy for a malicious user to take over the network by injecting
erroneous, replaying old, or advertise incorrect routing information. The authenticated routing
scheme we developed mitigates these problems.
The routing scheme within our prototype network assumes bidirectional communication
channels, i.e. if node hears node ,then node hears node . The route discovery depends on
periodic broadcast of beacons. Every node, upon reception of a beacon packet, checks whether
it has already received a beacon (which is a normal packet with a globally unique sender ID
and current time at base station, protected by a MAC to ensure integrity and that the data is
authentic) in the current epoch 5
. If a node hears the beacon within the epoch, it does not take
any further action. Otherwise, the node accepts the sender of the beacon as its parent to route
towards the base station. Additionally, the node would repeat the beacon with the sender ID
changed to itself. This route discovery resembles a distributed, breadth first search algorithm,
and produces a routing topology similar to Figure 1 (see [16] for details).
However, in the above algorithm, the route discovery depends only on the receipt of route
packet, not on its contents. It is easy for any node to claim to be a valid base station. We note
that the TESLA key disclosure packets can easily function as routing beacons. We accept only
the sources of authenticated beacons as valid parents. Reception of a TESLA packet guarantees
that that packet originated at the base station, and that it is fresh. For each time interval, we
accept as the parent the first node that sends a packet that is later successfully authenticated.
Combining TESLA key disclosure with the distribution of routing beacons allows us to charge
the costs of the transmission of the keys to network maintenance, rather than the encryption
system.
This scheme leads to a lightweight authenticated routing protocol. Since each node accepts
only the first authenticated packet as the one to use in routing, it is impossible for an attacker
to reroute arbitrary links within the sensor network. Furthermore, each node can easily verify
16. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 170 editor@iaeme.com
whether the parent forwarded the message: by our assumption of bidirectional connectivity, if
the parent of a node forwarded the message, the node must have heard that.
The authenticated routing scheme above is just one way to build authenticated ad hoc
routing protocol using TESLA. In protocols where base stations are not involved in route
construction, TESLA can still be used for security. In these cases, the initiating node will
temporarily act as base station and beacons authenticated route updates 6
.
8.2. Node-to-Node Key Agreement
A convenient method to bootstrap secure connections is public-key cryptography protocols for
symmetric-key setup [2, 15]. Unfortunately, our resource-constrained sensor nodes prevent us
from using computationally expensive public-key cryptography. Therefore, we need to
construct our protocols solely from symmetric-key algorithms. Hence we design a symmetric
protocol that uses the base station as a trusted agent for key setup.
Assume that the node wants to establish a shared secret session key with node . Since and
do not share any secrets, they need to use a trusted third party , which is the base station in our
case. In our trust setup, both and share a secret key with the base station, and , respectively. The
following protocol achieves secure key agreement as well as strong key freshness:
MAC
MAC
MAC
The protocol uses our SNEP protocol with strong freshness. The nonces and guarantee
strong key freshness to both and The SNEP protocol is in charge to ensure secrecy
(through encryption with the keys and) of the estab. Epoch means the interval of a routing
updates.
However, the node here will need to have significantly more memory resource than the
sensor nodes we discovered here in order to store the key chain lished session key , as well as
message authentication (through the MAC using keys and ) to make sure that the key was really
created by the base station. Note that the MAC in the second protocol message helps defend the
base station from denial-ofservice attacks, so the base station only sends two messages to and
if it received a legitimate request from one of the nodes.
A nice feature of the above protocol is that the base station performs most of the
transmission work. Other protocols usually involve a ticket that the server sends to one of the
parties which forwards it to the other node, which requires more energy for the nodes to forward
the message.
The Kerberos key agreement protocol attains similar properties, except that it does not
provide strong key freshness [19, 23]. However, it would be straightforward to implement it
with strong key freshness by using SNEP with strong freshness.
9. RELATED WORK
We review related work that deals with security issues in a ubiquitous computing environment.
We also review work on cryptographic protocols for low-end devices.
Fox and Gribble present a security protocol that provides secure access to application-level
proxy services [10]. Their protocol is designed to interact with a proxy to Kerberos and to
facilitate porting services that rely on Kerberos to wireless devices. The work of Patel and
Crowcroft focuses on security solutions for mobile user devices [27]. Unfortunately, their work
uses asymmetric cryptography and is hence too expensive for the environments we envision.
The work of Czerwinski et al. also relies on asymmetric cryptography for authentication [4].
17. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 171 editor@iaeme.com
Stajano and Anderson discuss the issues of bootstrapping security devices [39]. Their solution
requires physical contact of the new device with a master device to imprint the trusted and
secret information. Zhou and Hass propose to secure ad-hoc networks usi a wide variety of
approaches for key agreement and key distribution in sensor networks [3]. They analyze the
overhead of these protocols on a variety of hardware platforms.
A number of researchers investigated the problem to provide cryptographic services in low-
end devices. We first discuss the hardware efforts, followed by the algorithmic work on
cryptography. Numerous systems integrate cryptographic primitives with low cost
microcontrollers. Examples of such systems are secure AVR controllers [1], the Fortezza
government standard, and the Dallas iButton [7]. These systems support primitives for public
key encryption, with instructions for modular exponentiation, and attempt to zeroize their
memory if tampering is sensed. However, these devices were intended for different
applications, and are not meant as low-power devices.
On the cryptographic algorithm front for low-end devices the majority of research focuses
on symmetric cryptography. A notable exception is the work of Modadugu, Boneh, and Kim
which offload the heavy computation for finding an RSA key pair to untrusted servers [24].
Symmetric encryption algorithms seem to be essentially wellsuited for low-end devices,
due to their comparatively low overhead. In practice, nevertheless, low-end microprocessors
are only 4-bit or 8-bit, and do not provide (efficient) multiplication or variable rotate/shift
instructions. Hence many symmetric ciphers are too costly to implement on our target platform.
Even though one of the goals for
the Advanced Encryption Standard (AES) [25] was efficiency and small code size on low-
end processors, the chosen Rijndael block cipher [6] is nevertheless too expensive for our
platform. Depending on the implementation, AES was either too big or too slow for our
application. Due to our severely limited code size, we chose to use RC5 by Ron Rivest [33].
Algorithms such as TEA by Wheeler and Needham [43] or TREYFER by Yuval [44] would be
smaller alternatives, but we still choose RC5 to achieve high security because the security of
these other ciphers is not yet comprehensively analyzed.
10. CONCLUSION
We have successfully established the feasibility of implementing a security subsystem for an
extremely limited sensor network platform. We have identified and implemented useful
security protocols for sensor networks: authenticated and confidential communication, and
genuine broadcast. To illustrate the utility of our security building blocks, we implemented an
authenticated routing scheme and a secure node-to-node key agreement protocol.
Many elements of our design are universal and apply effortlessly to other sensor networks.
Since our primitives are solely based on fast symmetric cryptography, and use no asymmetric
algorithms, our building blocks are applicable to a wide variety of device configurations. The
computation costs of symmetric cryptography are low. Even on our limited platform the energy
spent for security is negligible compared with the energy cost of sending or receiving messages.
In the absence of other constraints, it should be possible to encrypt and authenticate all sensor
readings.
The communication costs are also small. Since the data authentication, freshness, and
confidentiality properties require transmitting a mere 8 bytes per unit, it is feasible to guarantee
these properties on a per packet basis, even with small 30 byte packets. It is difficult to improve
on this scheme, as transmitting a MAC is fundamental to guaranteeing data authentication.
Certain elements of the design were influenced by the available experimental platform. The
selection of RC5 as our cryptographic primitive falls into this category; on a more powerful
platform we could use any number of shared key algorithms with equal success. The extreme
18. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 172 editor@iaeme.com
emphasis on code reuse is another property forced by our platform. A more powerful device
would also allow for more basic modes of authentication. The main drawback of our platform
was existing memory. In particular, the buffering restrictions inadequate the effective
bandwidth of legitimate broadcast.
Despite the shortcomings of our target platform, we were able to prove a security subsystem
for the prototype sensor network. With our techniques, we believe that security systems can
become an vital part of practical sensor networks.
ACKNOWLEDGMENTS
We thank Monica Chew, Dawn Song and David Wagner for helpful discussions and comments.
We also thank the anonymous referees for their comments.
REFERENCES
[1] Secure Microcontrollers for SmartCards. http://www.atmel.com/atmel/acrobat/1065s.pdf.
[2] Steven Bellovin and Michael Merrit. Augmented encrypted key exchange: a password-
based protocol secure against dictionary atttacks and password file compromise. In First
ACM Conference on Computer and Communications Security CCS-1, pages 244–250,
1993.
[3] David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for
distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.
[4] Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes,Anthony D. Joseph, and Randy H.
Katz. An architecture for a secure service discovery service. In Fifth Annual ACM/IEEE
International Conference on Mobile Computing and Networking, pages 24 – 35, Seattle,
WA USA, August 1999.D. Johnson and D.A. Maltz and J. Broch. The dynamic source
routing protocol for mobile ad hoc networks (internet-draft). In Mobile Ad-hoc Network
(MANET) Working Group, IETF, October 1999.
[5] Joan Daemen and Vincent Rijmen. AES proposal: Rijndael, March 1999.
[6] Ibutton: A Java-Powered Cryptographic iButton.
http://www.ibutton.com/ibuttons/java.html.
[7] W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory,
IT-22:644–654, November 1976.
[8] Whitfield Diffie and Martin E. Hellman. Privacy and authentication: An introduction to
cryptography.Proceedings of the IEEE, 67(3):397–427, March 1979.
[9] Armando Fox and Steven D. Gribble. Security on the move: indirect authentication using
Kerberos. In Second Annual International Conference on Mobile Computing and
Networking (MOBICOM 1996), pages 155–164, White Plains, NY USA, November 1996.
[10] R. Gennaro and P. Rohatgi. How to sign digital streams. In Burt Kaliski, editor, Advances
in Cryptology - Crypto ’97, pages 180–197, Berlin, 1997. Springer-Verlag. Lecture Notes
in Computer Science Volume 1294.
[11] Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer
Security, 28:270–299, 1984.
[12] Z.J. Haas and M. Perlman. The zone routing protocol (ZRP) for ad hoc networks (Internet-
Draft). 1998.
[13] Neil M. Haller. The S/KEY one-time password system. In ISOC, 1994.
[14] D. Harkins and D. Carrel. The internet key exchange (IKE). Request for Comments 2409,
Information Sciences Institute, University of Southern California, November 1998.
[15] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture
directions for networked sensors. In Proceedings of the 9th International Conference on
19. A Security Protocol for Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 173 editor@iaeme.com
Architectural Support for Programming Languages and Operating Systems, November
2000.
[16] D.B. Johnson and D.A. Maltz. Dynamic source routing in ad-hoc wireless networks. In
Mobile Computing, 1996.
[17] Young-Bae Ko and Nitin Vaidya. Location-aided routing (LAR) in mobile ad hoc networks.
In Proceedings of the Fourth International Conference on Mobile Computing and
Networking (MobiCom’98), October 1998.
[18] J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5),
September 1993. Status:PROPOSED STANDARD.
[19] L. Lamport. Constructing digital signatures from a one-way function. Technical Report
CSL-98, SRI International, October 1979.
[20] H. Lipmaa, P. Rogaway, and D. Wagner. Counter mode encryption.
http://csrc.nist.gov/encryption/modes/.
[21] Alfred J. Menezes, Paul van Oorschot, and Scott Vanstone. Handbook of Applied
Cryptography. CRC Press, 1997.
[22] S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and
authorization system. In Project Athena Technical Plan, page section E.2.1, 1987.
[23] N. Modadugu, D. Boneh, and M. Kim. Generating RSA keys on a handheld using an
untrusted server. In RSA 2000, 2000.
[24] NIST. Advanced encryption standard (AES) development
effort.http://csrc.nist.gov/encryption/aes/, October 2000.
[25] V.D. Park and M.S. Corson. A highly adaptable distributed routing algorithm for mobile
wireless networks. In IEEE INFOCOMM’97, 1997.
[26] Bhrat Patel and Jon Crowcroft. Ticket based service access for the mobile user. In Third
annual ACM/IEEE international conference on Mobile computing and networking, pages
223–233, Budapest Hungary, September 1997.
[27] C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector
routing (DSDV) for mobile computers. In ACM SIGCOMM Symposium on Communication,
Architectures and Applications, 1994.
[28] C.E. Perkins and E.M. Royer. Ad hoc on-demand distance vector routing. In IEEE
WMCSA’99, February 1999.
[29] Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar.
[30] Efficient and secure source authentication for multicast. In Network and Distributed System
Security Symposium, NDSS ’01, February 2001.
[31] Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient authentication and
signing of multicast streams over lossy channels. In IEEE Symposium on Security and
Privacy, May 2000.
[32] K. S. J. Pister, J. M. Kahn, and B. E. Boser. Smart dust:Wireless networks of millimeter-
scale sensor nodes, 1999.
[33] R. L. Rivest. The RC5 encryption algorithm. Proc. 1st Workshop on Fast Software
Encryption, pages 86–96, 1995.
[34] Ronald L. Rivest. The MD5 message-digest algorithm.Internet Request for Comments,
April 1992. RFC 1321.
[35] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital
signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126,
1978.
[36] Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet
authentication. In 6th ACM Conference on Computer and Communications Security,
November 1999.
20. Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali
http://www.iaeme.com/IJARET/index.asp 174 editor@iaeme.com
[37] S. Marti and T. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile
ad hoc networks. In Proceedings of Mobicom 2000, August 2000.
[38] Bruce Schneier. Applied Cryptography (Second Edition). John Wiley & Sons, 1996.
[39] Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc
wireless networks. In B. Christianson, B. Crispo, and M. Roe, editors, Security Protocols,
7th International Workshop. Springer Verlag Berlin Heidelberg, 1999.
[40] David Tennenhouse. Embedding the Internet: Proactive computing. Communications of the
ACM, 43(5):43–43, 2000.
[41] U. S. National Institute of Standards and Technology (NIST). DES model of operation.
Federal Information Processing Standards Publication 81 (FIPS PUB 81).
[42] U. S. National Institute of Standards and Technology (NIST). Data Encryption Standard
(DES). Draft Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3),
January 1999.
[43] David Wheeler and Roger Needham. TEA, a tiny encryption algorithm.
http://www.ftp.cl.cam.ac.uk/ftp/ papers/djw-rmn/djw-rmn-tea.html, November 1994.
[44] Gideon Yuval. Reinventing the Travois: Encryption/MAC in 30 ROM bytes. In Proc. 4th
Workshop on Fast Software Encryption, 1997.
[45] L. Zhou and Z.J. Hass. Securing ad hoc networks. 13(6), November/December 1999.