One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
A lightweight secure scheme for detecting provenance forgery and packet drop ...LeMeniz Infotech
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
Source node privacy and message authentication are the most important issues to be addressed in wireless sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes have stood by with some limitations like lack of scalability and high communication and computational overhead. Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A comparative study is done for the work that is implemented using ns2 and matlab.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
A lightweight secure scheme for detecting provenance forgery and packet drop ...LeMeniz Infotech
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
Source node privacy and message authentication are the most important issues to be addressed in wireless sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes have stood by with some limitations like lack of scalability and high communication and computational overhead. Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A comparative study is done for the work that is implemented using ns2 and matlab.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Presented by Mike Dougherty to LivHOME in July 2008. Mike Dougherty is a seasoned public speaker. As a professional in the financial world, Mike has spoken to countless audiences, large and small, about financial planning and products.
Today, Mike loves to share about his journey with cancer and inspire audiences to embrace hope into their lives.
Mike is honored to have spoken to audiences at LivHome and Accuray about his journey with cancer. His firm belief that “with hope, anything is possible,” has inspired and energized audiences touched by cancer and the many other challenges life presents.
Mike welcomes the opportunity to speak to large and small audiences. To contact Mike, please visit http://www.possiblewithhope.com/speaking
Thank you!
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
However, the problem of authentication and pairwise key
establishment in sensor networks with MSs is still not solved
in the face of mobile sink replication attacks. For the basic
probabilistic [12] and q-composite [13] key predistribution
schemes, an attacker can easily obtain a large number of keys
by capturing a small fraction of the network sensor nodes,
making it possible for the attacker to take control of the
entire network by deploying a replicated mobile sink,
preloaded with some compromised keys to authenticate
and then initiate data communication with any sensor node.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 11, Issue 03 (March 2015), PP.01-16
1
SEAD: Source Encrypted Authentic Data for Wireless Sensor
Networks
Lata B T1
, Vidya Rao1
, Sivasankari H1
, Tejaswi V2
, Shaila K1
,
Venugopal K R1
, L M Patnaik3
1
Department of Computer Science and Engineering University Visvesvaraya College of Engineering,
Bangalore University, Bangalore- 560 001.
2
Department of CSE, National Institute of Technology, Surathkal, India.
3
Honorary Professor, Indian Institute of Science, Bangalore, India.
Abstract:- One of the critical issues in WSNs is providing security for the secret data in military applications. It
is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data
transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes
communicate with each other using their public identity, which is prone to security attacks like sink replication
and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm
(SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing
symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink.
When data encounters a malicious node in a path, then data transmission path is diverted through a secure path.
SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data.
Simulation results show that the proposed algorithm ensures data integrity and node authenticity against
malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the
existing algorithms.
Keywords:- Cryptography, Mobile Sink, Secure Routing, Wireless Sensor Networks, Advanced Encryption
Standard, Elliptic Curve Cryptography.
I. INTRODUCTION
Wireless Sensor Network (WSNs) is an infrastructure having less, low cost, dynamic topology with
tiny sensor nodes distributed across the region. The sensor nodes are capable of sensing, data processing and
communicating. WSN is an emerging field of technological research with a wide range of applications, such as
detecting and tracking the passage of troop and tanks in a battle field, environmental monitoring, and measuring
traffic flow on road etc.
WSNs needs certain security covers to information and resources from attacks and misbehaviors, i.e.,
Authenticity, integrity, availability, non-repudiation and confidentiality. Among all, authentication and integrity
are important principles in military applications.
It is vital to provide security for sensed data in WSNs. Selection of an appropriate cryptographic
algorithm preserves the security of data. Cryptographic algorithm meets the constraints of sensor nodes such as
memory, data size, processing time and battery. Symmetric key encryption and asymmetric key encryption
techniques are commonly used in WSNs.
During symmetric key encryption, a single secret key is shared between the entities in a
communication. Each entity uses shared key to encrypt and decrypt the data. In asymmetric key encryption, a
pair of keys are used; they are public key and private key. Each node generates both the keys and distributes
their public key among other nodes in a network by keeping their private key undisclosed. The sender encrypts
the data using the receiver public key and at the receiver, the data is decrypted using receiver‟s private key.
One of the major applications of WSNs is military application, where the sensor nodes are deployed in
unattended and vulnerable regions. Here, the sensor nodes are static and carry mission critical information that
needs to be protected. These applications use Mobile Sink (MS) to collect the information from all the nodes.
MS maximizes the lifetime of sensor networks as it moves within the range and collects the data from the nodes.
Sensor nodes communicate with MS using their public identities which results in node replication and
sink replication attacks. When the network is compromised, malicious nodes replicate indefinitely and
influences the network. The replicated malicious nodes hack the aggregated data and inject false data into the
2. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
2
network. Hence, it is essential to provide secure communication along the link with data integrity. Appropriate
cryptographic schemes are needed to provide data integrity and authentication against malicious nodes.
A. WSN Architecture
A typical WSN environment is composed of a large number of small, low data rate and
inexpensive nodes. Nodes are scattered in a controlled environment and interacts with the physical world. The
objective of the sensor nodes are to collect specific type of data by monitoring and controlling the predefined
areas. The data collected at each sensor node is transmitted to the base station (the sink/ the control station) via
collaborative routing. In collaborative routing, the sensor node in the network behave like a data source, which
senses specific data by interacting with the physical environment or like a data router, which transmits the
processed data to its immediate neighboring nodes to reach the sink.
Fig. 1: Wireless Sensor Node Architecture
Figure 1, depicts the architecture of sensor node, which integrates software and hardware components
for sensing, data processing and communication. These components are classified into transceiver unit, power
unit, sensing unit and processing unit. They are embedded with application dependent components such as
location finding system and mobilizing unit. The sensor interacts with physical environment and converts the
data into digital signal by the analog-to-digital converter. The digital signals are fed into processing unit which
transmits to the network through the transceiver unit.
Location finding system provides position of nodes which is essential for routing process. Nodes are
identified by the node ids. Nodes can be moved to collect information from a desired area using mobile unit.
Motivation: Preserving confidentiality and ensuring integrity of data against malicious nodes is
achieved through cryptographic algorithms. Symmetric Key Cryptography (SKC), Public Key Cryptography
(PKC), hash functions etc, are different cryptographic algorithms [13]. The Advance Encryption Standard
(AES) is widely used in WSNs as it employs single key which are shared among the two entities for encryption
and decryption. In WSNs, these shared keys are exchanged through broadcast mode of communication which is
vulnerable to attacks. Hence it is essential to secure the key exchange mechanism in WSNs against malicious
entities.
Contribution: This paper proposes a light weighted cryptosystem called Source Encrypted Authentic
Data (SEAD), a combination of AES and PKC. The authentic source node tracks the location of the mobile sink
using the basic overhearing property of WSNs. Nodes in the network gets the sink location from Mobile Sink
Tracking System (MSTS). In MSTS, it is assumed that all the nodes are aware of their position and the location
of one hop neighbor. These neighboring nodes can overhear the transmitted packets even when they are not
destined to them. Using this overhearing property, MSTS updates the location of mobile sink to the source node.
Once the mobile sink is tracked, the source node encrypts the data using SEAD algorithm.
Organization: The rest of this paper is organized as follows. Related works are discussed in Section II.
Background including concepts of malicious nodes and some of the cryptographic methods are described in
Section III. System analysis and problem definition are presented in Section IV. The proposed algorithm SEAD
and its mathematical model are developed in Section V and VI respectively. Finally, the performance analysis of
the proposed algorithm is explained in section VII. Conclusions are presented in section VIII.
II. RELATED WORK
Data security is a challenge in WSN, as sensor network suffers from many constraints like, limitation
of energy, low computational capability, small memory, and the use of unsecured communication channel.
3. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
3
Yong et al., [1] have discussed the above constraints along with security requirements and attacks with
corresponding counter measures in WSNs. The attacks are classified under five categories like, cryptography,
secure routing, secure data aggregation, intrusion detection and key management.
Jamal et al., [2] analyzed flat-based routing, hierarchical-based routing and location-based routing in
WSNs. It addresses the issues on multipath query, negotiation of network architecture and quality based
protocols.
Tung et al.., [3] presented a MoteSec-Aware protocol for security. Virtual Counter Manager (VCM) is
implemented to detect replay and jamming attacks based on symmetric key cryptography using AES. It achieves
high security by consuming less energy. Energy consumption is approximately proportional to the number of
users. This work can be further enhanced to reduce storage overhead by using Bloom Filter for large-scale
networks.
Pawan et al., [4] exploited public key nature protocols to define a hybrid key establishment algorithm
for symmetric key cryptography. A certificate scheme has been proposed based on Elliptic Curve Cryptography
for deriving pairwise link keys in WSNs. Though this scheme is more expensive than symmetric key algorithms,
it is inherently secure due to the PKC (Public Key Cryptography) characteristics. This protocol is resilient to
node compromise attacks. This work can provide higher security for mobile sensor nodes in massive scale
networks by changing the content of the certificate.
Li et al., [5] introduced a scalable authentication scheme based on Elliptic Curve Cryptography which
enables intermediate node authentication. It allows any node to transmit unlimited number of messages without
suffering threshold problem. It provides message source privacy by incurring little communication overhead. It
is more efficient in terms of computational and communication overhead compared with polynomial-based
approach.
Nachiketh et al., [6] focus on battery life and energy requirements on cryptographic algorithms such as
AES, ECC, RSA, SSL, Blowfish, SHA, SHA1, RC5, 3DES. They observe that asymmetric and hash algorithms
have the highest and least energy cost, respectively and the energy consumption of symmetric algorithms
depend on encryption/decryption cost and key size.
Noemie et al., [7] adopted the Differential Fault Analysis (DFA) techniques originally used on AES-
128 in order to obtain the keys of AES-192 and AES-256 and based on a known DFA on key expansion.
Ohyoung et al., [8] designed an optimal AES algorithm for low-power WSN node. It uses only one S-Box by
which power consumption and logic usage is reduced compared with the block-wide and folded designs at the
same throughput(1 Mbps). It satisfies the data rate requirements of the IEEE 802.15.4 standard.
Shi et al., [9], developed a Design-For-Secure-Test (DFST) technique for pipelined AES. It is a
countermeasure to prevent secret information being leaked out of crypto hardware during test. It significantly
reduces the application time, test data volume and test generation effort. Lu [10] proposed a key management
scheme for WSN based on ECC and clustering by which computation speed has been improved.
Yun et al.., [11] presented a comprehensive survey of WSN security issues. Ho et al., [12] presented
the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the
execution of cryptography algorithms such as AES, KASUMI, SEED, triple-DES, ECC, RSA crypto
algorithms. It consists of a 32-bit RISC processor block and co-processor blocks. This work does not have
resilence to side channel attacks in the private and public key cryptographics.
Saif et al., [13] designed a security protocol for ZigBee wireless sensor network in MAC layer. By
generating 128-bits secrete key using AES algorithm over 128-bits of data, they have achieved security towards
data. With this secrete key, they have mixed the Elliptic Curve Cryptography (ECC) algorithm which provides
authentication over communication link. Through this parallel execution of AES and ECC, the scheme has
provided both encryption process and authentication respectively against the cipher text and replay attacks. The
results have failed to show same performance for larger data size.
Kishore et al., [14], used Elliptic Curve Cryptography (ECC) for data security in WSNs. They have
generated a secret key using corresponding point on elliptic curve and this secret key is used to generate private
key ring and is embedded into sensor nodes at the time of deployment. When two nodes share common private
key, a link is established between them. The proposed system is checked based on various sensor network
attacks like Sybil, brute force and random attacks. They have evaluated the performance based on connectivity
and resilience against node capture.
Manju et al., [15] described the malicious node behaviour under Ad-Hoc network. They have surveyed
methods to defend against these malicious nodes which includes security through cryptographic (Message
Digest 5 (MD5), Digital Signatures, Secure Hash Algorithms etc), Trusted Third Party (TTP), secure protocols
(Secure Aware Ad-Hoc Routing protocol (SAR), ARAN (Authenticated Routing for Ad Hoc Networks),
Efficient security Ad-Hoc On-Demand distance vector(ES-AODV) etc) and Intrusion Detection System (IDS).
Sung et al., [16] depicted a neighbor-based malicious node detection scheme for WSN. This scheme is
based on trustworthiness of sensor nodes during normal operation. Trustworthiness of sensor nodes depends on
4. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
4
confidence level which is analyzed based on occurrence of normal nodes and malicious nodes. In this scheme,
detection and mis-detection rates are maintained with high and low values, respectively. It is shown that event
detection accuracy is high while maintaining low false alarm rate. Calculating the confidence level would lead
to increase of processing time.
Sung et al., [17] designed a dual threshold scheme to detect malicious node in a WSN. This scheme
employs two thresholds to bridge the gap event detection accuracy and false alarm rate. They have analyzed
their work with respect to Malicious Node Detection Rate (MDR), Mis-detection Rate (MR), False Alarm Rate
(FAR), Event Detection Accuracy (EDA), Event Region Detection Rate (ERDR) and Boundary False Alarm
Rate (BFAR). Results obtained for MDR, EDA, FAR, ERDR and BFAR shows that the proposed dual threshold
system performs better than single threshold for detecting the malicious nodes. Though this technique bridges
the gap between event detection and false rate, the selection of dual threshold values is crucial and it works for
only static sink and not suitable for mobile sink.
Lin et al., [18] proposed concealed data aggregation scheme for multiple applications (CDAMA) in
WSNs. The proposed scheme is designed as a multi-application environment in which the base station extracts
application specific data from aggregated cipher text. CDAMA provides Concealed Data aggregation (CDA)
between multiple groups and includes scalar multiplication on elliptic curve for encryption and decryption.
Selecting a point on elliptic curve would always be a challenge as they have selected a constant value obtained
by Broker's approach.
Du et al., [19] presented an efficient key management scheme for hybrid sensor network which utilizes
the special communication pattern in sensor networks and ECC. They have proposed a centralized key
management scheme where a server generates a pair of ECC public and private keys for each pair of low-end
sensors. Each low-end sensor is preloaded with the private keys and each high end sensor are preloaded with
public keys. Using these keys, the data could be encrypted and decrypted. The proposed scheme is compared
with Eschenauer and Gligor (E-G) scheme: the comparison is done based on total storage, energy consumption
and probability of an independent secure link being compromised under which ECC based key management
shows better performance than E-G scheme. But the same scheme would consume more energy when
homogeneous sensor network is considered.
Liu et al., [20] have proposed PKC based broadcast authentication scheme using signature amortization
for WSN. The broadcast messages are authenticated using one signature.
III. BACKGROUND WORK
A. Malicious Node Behaviour
In WSN, malicious nodes are identified through the compromised behaviour of node which threatens
the security principles (Confidentiality(C), Integrity (I), Availability (Av), Authenticity (Au) and Non-
Repudiation (NR)). Malicious node generates incorrect readings which are not relevant [15], [16], [17]. The
characteristic of malicious nodes are identified by the following characteristics:
Fake routing: Whether there exists a path between nodes or not, a malicious node can send fake routes to
the legitimate nodes in order to get the packets or to disturb the operations.
Stale Packets: Malicious nodes create stale packets to create confusion in the network.
Message Tampering: A malicious node alters the content of the packets.
Denying from Sending Message: Malicious node denies from sending messages to the legitimate nodes.
Fig. 2: Flowchart for Malicious Node Behaviour
5. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
5
The behaviour of a malicious node is explained in Figure 2.
B. Advance Encryption Standards (AES)
Advance Encryption Standard (AES) is a successor of symmetric encryption called Data Encryption
Standard (DES). AES is based on the logic known as Substitution and Permutation Network (SPN). AES
operates on 4x4 arrays of bytes and has a fixed block size of 128-bits and a flexible key size of 128, 192, or 256-
bits. Encryption takes place in series of rounds, and each round have four stages as in Figure 3 [23]. These
stages include:
Sub-byte generation: Every byte in the plain text is replaced by a lookup table content called S-box table.
Shift-rows: Every row in this stage is shifted cyclically for k-bytes and k depends on the key and the row
number.
Mix-column: Four bytes in each column is combined by linear mixing generated in the column.
Add-round key: Each byte of the stage is combined with a round key; round key is different from secrete
key, which is different for each round derived from Rijndale (Rijndale is a family of ciphers with
different key and block sizes) key scheduler.
Fig. 3: AES round transformations
C. Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography is a public key cryptography or asymmetric key cryptography that
encrypts the data by particular individuals [13], [14], [18], [19], [20], [24]. ECC uses smaller key size to reduce
the time required for encryption process. ECC is more compatible to sensor network as it consumes lower
energy to generate keys.
Elliptic Curve Cryptography is an asymmetric or public key cryptography. ECC is mathematically
defined over the elliptic curve y2
=x3
+ ax + b; where 4a3
+ 27b2
!=0; for each value of 'a' and 'b' there exist
different elliptic curve. All points (x, y) which satisfies the above equation plus a point at infinity lie on the
elliptic curve. The public key is obtained by multiplying the private key with the generator point G in the curve.
The parameters of ECC include the generator point G, the curve parameter 'a' and 'b', together with few more
constants. The security is based on the difficultly of a different problem, which is called the Elliptic Curve
Discrete Logarithm Problem (ECDLP).
ECDLP can be defined by considering two points S and T on an elliptic curve such that k * S = T,
where k is a scalar. It is difficult to obtain k, for a given value of S and T. k is the discrete logarithm of T to the
base S. multiplication of a scalar k with any point S on the curve to obtain another point T is called point
multiplication on the curve which is the major operation in ECC.
D. Encryption using ECC
Sender „A‟ communicates to the receiver „B‟ by encrypting the data with public key of „B‟ which is
known to all. Only „B‟ can decrypt the message with its private key. To encrypt and send a message Ym to B, A
chooses a random positive integer k and produces the cipher text Cm by using B‟s public key YB as shown below.
6. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
6
Cm = [k*G, Ym +k*YB]
Where G is a point on elliptic curve defined over the Galios Field Eq(a,b) whose order is a large value n.
E. Decryption using ECC
To decrypt the cipher text, B multiples the first point in the pair by B's private key nB and subtracts the
result from the second point as shown by equation.
Ym + k * YB - nB (k*G)
= Ym+ k (nB* G) - nB (k*G)
= Ym
A key exchange between users A and B can be explained in following steps:
1. A selects a positive integer nA < n as A's private key. where n is a set of random numbers.
2. A generates a public key YA = nA * G which is a point in Eq(a, b).
3. B select an integer nB < n as B's private key.
4. B generates a public key YB= nB * G which is a point in Eq(a, b).
5. Public keys are exchanged between A and B. A generates the secret key k = nA * YB and B generates
the secret key k = nB * YA
F. Shortest path routing:
Finding the shortest path is essential in WSN. Dijkstra invented an algorithm to find the shortest path
throughout the network. Dijkstra‟s algorithm computes the least cost path from source node to all other nodes in
the network graph G = (V, E), with non-negative arc weight Ѵ(i, j).
IV. SYSTEM MODEL AND PROBLEM DEFINITION
A. Network Model
In routing against malicious node, we assume that N sensor nodes are deployed randomly in the
monitored region. The network is modeled as an undirected graph G=(V,E), where V = v1,v2,.. vn is a set of
sensor nodes. All nodes are connected when they are in the transmission range. E is the set of edges representing
the connection between the nodes with respect to their communication range Rc. Event can occur anywhere in
the monitored region having a radius of Re, the sensor nodes present in the sensing region Re forms a cluster Ci,
where i indicates the node id. A source node Ns is elected from the cluster Ci, and forwards the encrypted data
towards the mobile sink (MS) by tracing the position of MS.
B. Problem Definition
Wireless Sensor Network is considered as a graph G=(V,E) where V is the vertex/node set and E is an
edge set. Given the cluster nodes set Ci ∈ V, the objective is to design a secure routing algorithm to ensure data
integrity and authentication over communication channel. The proposed system Source Encrypted Authentic
Data (SEAD) provides integrity and authentication to the sensed data and avoids anonymity among the keys of
different source. The objectives of this work are:
1. To provide integrity to sensed data.
2. To route the data securely among authentic nodes.
Assumptions:
1. The sensor nodes are static and contain uniform energy of 50J.
2. Single sink node, which moves randomly inside the monitored region
3. Variable cryptographic key size (128, 192 and 256 bits).
4. Data packet size 128 bits.
5. Communication range of about 20m.
6. Number of rounds is four.
V. DESCRIPTION OF PROPOSED ALGORITHM
Source Encrypted Authentic Data (SEAD) forwards data through hop-by-hop forwarding and provides
security against intruders in suspicious WSNs. It works in three phases they are (i) source election, (ii)
encryption of source data with AES and (iii) authentication of data with ECC. SEAD uses three keys: (i) Public
key for encryption/signature verification, (ii) Private Key for decryption/signature generation and (iii) Secrete
key for data encryption.
7. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
7
The network is deployed with (N-1) number of nodes having equal amount of energy Pi and
communication range Rc across 100X100 meters. The Nth
node is assumed to be the sink, which is mobile in
nature. When an event S occurs in the network, the nodes within the event range Re forms a cluster Ci, where i
indicate number of nodes within the cluster C. A source node Ns is selected among Ci which has more energy
i.e., 0 < Pi < Pt. The Ns tracks the MS using tracking mechanism. Once MS is tracked, the Ns encrypts the
communication data using secrete key encryption algorithm to obtain Source Encrypted Data (SED) which is a
mixture of cipher text and last round key. Ns authenticates the communication link by executing Source
Encrypted Authentic Data (SEAD). Each node in the shortest path route authenticates itself by executing SEAD.
Finally SEAD reaches MS where the decryption is applied by reverse process.
A. Mobile Sink Tracking System (MSTS)
Overhearing property of wireless communication plays an important role in tracking the Mobile Sink
(MS) [21]. Here it is assumed that, all nodes are static and a sink can move freely; each node is aware of their
position and the location of one-hop neighbor. Two nodes can communicate with each other only if they have a
bidirectional link between them. The neighboring nodes can over hear the transmitted packets even when they
are not destined to them. This property is called overhearing property of nodes.
For example consider the Figure 4, it is assumed that the source node Ns has obtained location of MS
by some destination location service and forwards data packets continuously to MS along the path Ns →N1
N1→N2→ N3→MS by Geographic routing. Now consider Ns is the near dead node and wants to communicate
with sink MS. The dashed circle represents the radio range of node. The MS broadcasts its Location
Announcement Message (LAM) periodically to its neighboring nodes as it moves in the monitored region.
When MS moves to a new site as shown in Figure Fig. 4 (a), node N3 can obtain the new location of
MS by intercepting the Location Announcement Message (LAM). Thus node N3 resets the new LAM message
information of MS in the header of subsequently received data packet to the newly obtained location, and then
forwards them to the MS. At the same time, the node N2 which is in radio range of node N3 can overhear the
transmission from node N3 to MS, and updates the MS location on its header as in Figure Fig. 4 (b). Similarly,
node N1 obtains MS location by the node N2 as node N1 lies in node N2's radio range. The LAM finally reaches
the source node, where it gets the exact current location of MS and tries to forward the data to MS through the
path Ns →N1 N1→N2→ N3→MS as in Figure Fig. 4 (c) and (d).
Fig. 4: Mobile Sink Tracking Scenario
B. Source Encrypted Authentic Data (SEAD)
In this SEAD algorithm there are two parts: first, selecting the source node from the cluster having
more energy and secondly to provide security to data. The overview of SEAD is explained in the Figure 5 and
Algorithm 1.
8. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
8
Initially, the sensor nodes are deployed randomly within the defined area. Each node stores its location
and one hop neighbor location in their database. A Mobile Sink (MS) is deployed randomly which broadcast its
location as it moves from one location to other.
In Figure 5, when event 'S' occurs, the nodes in the vicinity of the event form a cluster. One of the 'ith '
node and which is responsible for forming the cluster is elected as Source Node Ns , which tracks the location of
Mobile Sink(MS). The location of Source Node (Ns) and message will be encrypted by Advanced Encryption
standard (AES) algorithm during the first round of encryption is called as Source Encrypted Data (SED). SED is
encrypted by ECC during the second round of encryption which is called as Source Encrypted Authentic Data
(SEAD). Doubly encrypted message is transmitted to the Mobile Sink. During the transmission phase, when it
encounters malicious node, it changes the transmission path and tries to reach the MS. SEAD will be decrypted
by the MS and decrypted message is saved at the MS.
In Algorithm 1, when an event (S) is generated, the nodes in the vicinity of the event form a cluster. A
node is elected among this cluster as a source node which forwards the sensed data to the mobile sink. The
source node has to secure the data before it has to be forwarded and hence encrypts the data using the Advance
Encryption Standard (AES) as in phase II of Source Encrypted Authentic Data (SEAD) Algorithm. The sensed
data follows four steps. Firstly, the sensed data is matched onto the predefined table and a new matched data is
obtained. This new data is shifted cyclically row wise in second step. In step three, shifted data is again mixed
linearly among the columns with 4-bytes at a time. Finally, the round key is XOR'd to obtain the cipher text.
To make the cipher data more secure, the last round key is mixed in-between the cipher text to obtain
the Source Encrypted Data (SED) in phase II.
Fig. 5: Overview of Proposed SEAD System
In phase III, public and private keys are generated and the shared key is exchanged for authentication
purpose. The public key is generated using private key of the node and a point on the elliptic curve whose order
is n. A secret key is generated using this public key, and is shared among other nodes. At the time of second
encryption, this shared secret key along with public key of receiver is used by sender to encrypt the SED to form
a Source Encrypted Authentic Data (SEAD).
At the time of decryption, the private key of receiver is used to decrypt the SEAD to SED and
decryption of AES is executed to obtain the secured data.
9. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
9
VI. MATHEMATICAL MODEL
Once the network is deployed, each node can communicate with its one hop neighbor if and only if the
distance among them is less than their communication range i.e., if nodes have overlapping communication
range (Rc, then they can communicate with neighbors. This can be obtained as:
Rc > (x1-x2) 2
+ (y1-y2)2 (1)
where (x1, y1) and (x2, y2) are the coordinates of the source node and its neighbor. When an event
occurs, the nodes within the range of an event form a cluster / group. A source node is elected from this cluster,
based on available energy of the node and it plays a role of forwarding the sensed data towards mobile sink.
Mathematical equations for integrity, authentication and calculation of energy is explained in three phases. (i)
encryption of source data, (ii) authentication of source data and (iii) energy model.
A. Phase 1: Encryption of Source Data
The source node tracks the location of sink based on over-hearing property as described in Mobile Sink
Tracking System (MSTS). Once the sink traces the source node and it calculates the shortest route towards sink
and forwards the sensed data by encrypting it.
1) Case 1: Generation of Cipher text
The sensed data undergoes AES encryption with four rounds. In the first round, the data is matched
with a predefined block of data called S-box and it is replaced with S-Box data as in Figure 6.
After matching with S-box (Figure 6), the newly obtained sensed data called state is shifted row wise
(Figure 7) and mixed column wise (Figure 8) as follows:
Fig. 6: Matching of Sensed Data with S-box
The Mix columns transformation operates on the State column-by-column, treating each column as a
four-term polyn
b(x)= d(x) ⊕ a(x) (2)
b(0,1) 01 02 03 01 a(0,1)
b(0,c) 02 03 01 01 a(0,c)
b(0,2) = 01 01 02 03 a(0,2)
b(0,3) 03 01 01 02 a(0,3)
Where a(x) is the state of previous step and b(x) is new state. As a result of this multiplication the four
bytes are replaced as follows:
10. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
10
b(0,C) = (02 ⊕ a(0,C) ) ⊕ (03 ⊕ a(1,C) ) ⊕ a(2,C) ⊕ a(3,C)
b(1,C) = a(0,C) ⊕ (02 ⊕ a(1,C) ) ⊕ (03 ⊕ a(2,C) ) a(3,C)
b(2,C) = a(0,C) ⊕ (a(1,C) ) ⊕ (02 ⊕ a(2,C) ) ⊕ (03 ⊕ a(3,C) )
b(3,C) = (03 ⊕ a(0,C) ) ⊕ (a(1,C) ) ⊕ (a(2,C) ) ⊕ (02 ⊕ a(3,C) ) (3)
The State b(x) is XOR'd with secret round key matrix to obtain the cipher text. In each round, a
different secrete key is generated by random function and the cipher data is obtained. After the final round, the
last round secrete key is mixed in-between the cipher data for better encryption. We insert the secrete key at
every even position of the cipher data to obtain Source Encrypted Authentic Data.
(Secrete_key % 2, cipher) ≥SED (4)
The SED is encrypted using Elliptic Curve Cryptography to provide authentication over the cipher
data. This is done by assuming, S and T as two points on elliptic curve, defined by the Elliptic Curve Discrete
Logarithm Problem (ECDLP) as
K * S = T = S + S + S... k times = O (5)
O is defined as point of infinity.
Definition of Elliptic Curve: Let p > 3 be a prime. Let a, b є Zp be constants such that 4a3
+ 27b2
!= 0 mod p.
A non-singular elliptic curve is the set E of solutions (u, v) є Zp X Zp to the equation
v2
mod p = u3
+ a * u + b mod p (6)
together with a special point O called the point at infinity.
The same formulas can be used to define addition. (E, +) forms a addition group. We denote this group
as E(GF(q)). To determine elements of E(GF(q)), we have to try all possible u є Zp, compute u3
+ a * u + b mod
p and then find if the resulting value is a quadratic residue of mod p.
2) Case 2: Public Key Generation
The source node generates a random key nSA < n as its private key (i) and calculates its public key as (ii) YSA
= nSA * β, where (iii) β is called set of generator point on the elliptic curve with n as its order. The next
node/hop in the path selects as random nSB < n as its private key and generates its public key as YSB = nSB ∗ β.
3) Case 3: Key Exchange Mechanism
The source node computes its shared key as
K = YSA * nSB (7)
The next node in the path computes its shared key as,
K = YSB * nSA (8)
4) Case 4: Encryption Process
Encryption of data i.e., SED from source node Ns to next hope is shown as
SEAD = [ K ⊕ β, SED + K ⊕ YSB ] (9)
Here the source node Ns uses the public key of next hop to obtain the Source Encrypted Authentic Data
(SEAD).
11. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
11
5) Case 5: Decryption Process
SEAD can be decrypted by substituting the product of first point on pair G from the second point with
the private key nSB.
SEAD= SED + K ⊕ ( nSB ⊕ β) nSB (K ⊕ β)
= SED (10)
Finally, the SED undergoes the reverse process of AES to decrypt and to obtain secured sensed data
information at mobile sink.
After matching with S-box, the newly obtained sensed data called State is shifted row wise (Figure 7)
and mixed column wise (Figure 8).
B. Energy Model
Total energy total dissipated PTdiss at a sensor node is attributed to four basic energy consumption
sources: (i) energy used for sensing Psense, (ii) transmission Ptrans, (iii) reception Precp and (iv) encryption Pencrypt.
Here all the nodes are homogeneous in nature and power consumed for sensing Psense and reception Precp is same
for all the nodes. The transmitting and receiving power of MS are higher than other nodes because of the
additional data processing and aggregation task associated with it. The total energy dissipated by a sensor node
is given as
PTdiss = Psense + Ptrans + Precp + Pencrypt (10)
The energy dissipated for transmission depends on the distance between the transmitter and receiver
nodes which are located at Nt (Xt,Yt) and Nr (Xr,Yr) respectively. i.e.,
Dist= ((Xt,Xr)2
+ (Yt,Yr)2
)
(12)
Through distance formula, we can calculate energy dissipated at transmission as,
Ptrans = Pi * Dist (13)
where, Pi is the available energy at the node “i”. The energy consumed during encryption, depends on
size of the encryption key Ksize, size of data Sdata, amount of available energy at the node, time taken to encrypt
Tencryp and total number of rounds in AES encryption (NOR = 4).
Pencrypt = ( Sdata +Ksize) * Pi * Tencryp * NOR (14)
Fig. 7: Row-shift of Sensed Data
12. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
12
Table I: Notations
Symbols Definitions Symbols Definitions
N Total Number of Sensor Nodes Deployed MS Mobile Sink
Pi Available Energy at node i Pmin Threshold Energy of Each Node
Pt Average Energy of WSN S Event
Rc Communication Range of Sensor Nodes Re Sensing Range of event
Ci Cluster with I number of Nodes Ns Source node from the cluster
LAM Location announcement message R Number of round in symmetric
encryption
nSA & nSB Private keys of adjacent nodes YSA &
YSB
Public keys of adjacent nodes
β A point on elliptic curve with an order of
n
Psense Sensing Power
Precep Reception Power PTdis Total Energy Dissipated
Pencrypt Encryption Power Ptrans Transmission Power
NOR Number of Rounds
Table II: Energy Dissipation in SEAD Based on Different Key Size
Energy
Dissipated(nJ)
Key Size (bits) Encryption Time(ms)
6.452 128 1.356
10.167 192 2.054
13.107 256 2.350
VII. IMPLEMENTATION AND PERFORMANCE ANALYSIS
In MATLAB simulation setup, 100 nodes are deployed randomly within the area of 100m X 100m;
among them we have assumed to have 20 malicious nodes. The sink is made to move randomly within the
defined region. The simulation set up is varied from 10, 20, 30, ..., 100 nodes with a single mobile sink.
Fig. 8: Column Mixing of State
13. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
13
Table III: Simulation Parameters
Parameter Type Test values
Number of Authentic Nodes 80
Number of Malicious Nodes 20
Data Packet Size 128 Bits
Encryption Key Size 128 Bits
Sensor Node Transmission
Range
20mtr
Sensor Node Static
Sink Location Mobile
The communication path between source and destination is chosen randomly. Path is changed when it
encounters a malicious node. Initially, the data size and key size is taken as 128-bits, which is later varied to
check the performance.
The malicious node generates incorrect reading and misleads the report generated with respect to the
event detection accuracy. It is observed that the malicious nodes consume more energy and minimizes the
network lifetime. Figure 9 infers the relationship between number of nodes in the network and number of
malicious nodes in the communication path. It shows that the path is hacked maximum number of times in ECC
algorithm than AES algorithm. SEAD shows minimized number of occurrences of malicious nodes in the
communication path.
Table IV: Decryption time of SEAD with variable key size
Key Size Decryption Time(ms)
128 1.35
192 2.10
256 2.40
Table IV presents the decryption time of SEAD for variable key size. The time taken to decrypt the
data with key size of 128-bits, 192-bits and 256-bits is 1.35ms, 2.10ms and 2.40ms respectively.
Table V: Crypt Analysis with Respect to Different Algorithms
Algothims Encryption
Time(ms)
Decryption
Time(ms)
AES 1.32 1.25
ECC 0.95 0.48
SEAD 1.6 1.46
The time taken to encrypt and decrypt the data at the node level based on SEAD, AES and ECC
algorithm is shown in Table V. It is observed that to encrypt the 128-bits data, the AES encryption takes about
1.32ms and ECC encryption takes 0.95ms and SEAD requires 1.6ms to encrypt the same data. The decryption of
128-bits data using AES and ECC takes about 1.25ms and 0.48ms respectively. Whereas SEAD takes about
1.46ms to decrypt the same data. The encryption and decryption of data using SEAD takes maximum time when
compared to other algorithms but is more secure than AES and ECC.
Fig. 9: Occurrences of malicious nodes in the communication path
14. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
14
Fig. 10:Time delay in network for AES, ECC and SEAD.
Algorithm 1: SEAD: Source Encrypted Authentic Data.
Input: Total number of nodes, Location of the nodes;
Output: Secure Routing
Source Encrypted Authentic Data (SEAD)
Phase I:
begin
Initialize N, Pmin to record the coordinates of
sensor nodes and save the location of nodes
N = 0;
Pmin = 0
Ni,x = Ni,y = location
if (event == true) then
event = S
Ci = nearest(S)
if (Pi > Pmin) then
Ns = Ni
Phase II: Encryption of Source Data with AES
begin
Initialize rounds (R = 4) and event;
predefinedtable[ ] = sensed data[ ];
void SEAD(plaintext, exp cipher, Key);
state = plaintext; Nb = exp cipher;
for R = 0; R _ round; R + +; do
AddRoundKey(state, key, 0, Nb);
Subytes(State);
ShiftRows(State);
MixColumn(State);
AddRoundKey(State, key, rand*Nb, (R+1)*Nb-1);
SubByte(State);
ShiftRow(state);
AddRoundKey(State, key, Nr*Nb, (Nr+1)*Nb-1);
out = state;
return out;
15. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
15
Phase III: Authentication of Source Data with ECC
begin
Select Source Encrypted Data (SED);
nSA = nSB = Privatekeysofcorrespondingnodes.
β = nth order of a point on elliptic curve;
n = smallest positive integer on curve;
begin
public key generation.
YSA = nSA * β;
YSB = nSB* β ;
Key exchange.
A secret key (K) is generated using public and private keys;
Secret key is exchanged among the nodes;
Encryption at source;
SED is again encrypted using secret key and public key of destination node = SEAD;
decryption at destination; SEAD is decrypted back to SED using private key of destination
Figure 10 describes the comparison between SEAD, AES and ECC for network delay. The total delay
in the network when AES and ECC are used is approximately 2.8ms and 1.3ms for 100 nodes. As the SEAD is a
combination of AES and ECC, the delay is 3.3ms for 100 nodes. It is observed that the delay in network is more
when SEAD is implemented. Though the SEAD algorithm is slower it is more secure than AES and ECC.
Fig. 11: Cryptanalysis of network with respect to SEAD, AES and ECC.
Figure 11 depicts the time required to break the variable size data for SEAD, AES and ECC encryption
algorithm. It shows that to break a 128-bits of data, AES takes about 1.6ms, ECC takes 1.4ms and SEAD
requires 2.3ms to break a data of size 128-bits. The performance of crypt analysis using SEAD is much better
than AES and ECC.
VIII. CONCLUSIONS
Wireless Sensor Networks are constrained with limited battery, lifetime and security issues. In this
paper, we propose Source Encrypted Authentic Data (SEAD) algorithm to provide confidentiality and
authentication for secure routing. A mathematical model is proposed to generate a private key. The proposed
algorithm follows double encryption using Advanced Encryption Standard (AES) and Elliptical Curve
Cryptography (ECC) to ensure data integrity and authentication respectively. Each source node checks their
neighbor through the node identifier. When the source node encounters the malicious node in the selected path,
it changes the existing path for the successful transmission of data. Though the time and energy consumption of
the proposed algorithm is higher, it is inevitable where the security of the data is crucial. Security algorithm with
lower energy consumption and delay for the same level of security has to be addressed in future work.
16. SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
16
REFERENCES
[1]. Y. Wang, G. Attebury and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor
Networks,” IEEE Communications and Survey Tutorials, 2nd Quarter, vol. 6, no. 2, pp. 1-15, 2006.
[2]. J. N. Al-Karaki, and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,”
ICUBE initiative of Iowa State University, Ames, IA 50011.
[3]. Y. Tsou, C. Lu, and S. Kuo, “MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor
Networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2817-2829, June
2013.
[4]. P. Porambage, Pardeep Kumar, C. Schmitt, A. Gurtov and M. Ylianttila, “Certificate-Based Pairwise
Key Establishment Protocol for Wireless Sensor Networks,” IEEE, 16th International Conference on
Computational Science and Engineering (CSE), pp. 667-674, 2013.
[5]. Y. Li, J. Li, J. Ren and J. Wu, “Providing Hop-by-Hop Authentication and Source Privacy in Wireless
Sensor Networks”, 31st Annual IEEE International Conference on Computer Communications, pp.
3353-3357, 2012.
[6]. N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, “A Study of the Energy Consumption
Characteristics of Cryptographic Algorithms and Security Protocols,” IEEE Transactions on Mobile
Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
[7]. N. Floissac and Y. L‟Hyver, “From AES-128 to AES-192 and AES-256, How to Adopt Differential
Fault Analysis Attacks,” IEEE Workshop on Fault Dianosis and Tolerance in Cryptography (FDTC),
Nara, Japan, pp. 43-53, Sept. 2011.
[8]. O. Song and J. Kim, “Compact Design of the Advanced Encryption Standard Algorithms for IEEE
802.15.4 Devices,” Journal of Electrical Engineering and Technology , vol. 6, no. 3, pp. 418-422, 2011.
[9]. Y. Shi, N. Togawa, M. Yanagisawa and T. Ohtsuki, “Design for Secure Test - A Case Study on
Pipelined Advanced Encryption Standard,” IEEE International Symposium on Circuits and Systems
(ISCAS), Southeastern Louisiona, US, pp. 142-152, May 2007.
[10]. M. Lu, ”Study on Secret Key Management Project of WSN Based on ECC,” Journal of Networks, vol.
7, no. 4, pp. 652-659, April 2012.
[11]. Y. Zhou, Y. Fang, and Y. Zhang, “Securing Wireless Sensor Networks: A Survey,” IEEE
Commmunications, vol. 10, no. 3, pp. 6-28, 2008.
[12]. H. W. Kim, and Sunggu, “Design and Implementation of a Private and Public Key Crypto Processor
and Its Application to a Security System,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1,
pp. 214-224, Feb. 2014.
[13]. Saif A., Z. Ahmed, A. Abdullah and S. Subramiam, “AES and ECC mixed for ZigBee Wireless Sensor
Networks,” World Academy of Science, Engineering and Technology, 2011.
[14]. K. Rajendiran, R. Sankararajan, and R. Palaniappan, “A Secure Key Predistribution Scheme for WSN
using Elliptic Curve Cryptography,” ETRI Journal, vol. 33, no. 5, Oct. 2011.
[15]. R. Saini and M. Khari, “Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc
Network”, International Journal of Computer Applications, vol. 20, no. 4, pp. 1-20, Apr. 2011.
[16]. S. Yim and Y. Choi, “Neighbor-Based Malicious Node Detection in Wireless Sensor Networks”,
Scientific Research on Wireless Sensor Network, vol. 4, pp. 219-225, Sept. 2012.
[17]. S. Lim and Y. Choi, “Malicious Node Detection using a Dual Threshold in Wireless Sensor Networks”,
Journal of Sensor and Actuator Network, vol. 2, pp. 70-84, Feb. 2013.
[18]. Y. Lin, S. Chang and H. Sun, “CDAMA: Concealed Data Aggregation Scheme for Multiple
Applications in Wireless Sensor Networks”, IEEE Transactions on Knowledge and Data Engineering,
vol. 25, no. 7, pp. 791-801, July 2013.
[19]. X. Du, M. Guizani, Y. Xiao and H. Chen, “A Routing-Driven Elliptic Curve Cryptography Based Key
Management Scheme for Heterogeneous Sensor Networks”, IEEE Transactions on Wireless
Communication, vol. 8, no. 3, March 2009.
[20]. Y. Liu, J. Li and M. Guizani, ”PKC Based Broadcast Authentication using Signature Amortization for
WSNs”, IEEE Transactions on Wireless Communication, vol. 11, no. 6, June 2012.
[21]. Fucai Y., E. Lee, S. Park, J. Lee, M. Jin, and S. Kim, “Location Update Scheme for Mobile Sink in
Wireless Sensor Networks,” IEEE Communications Society , ICC 2010.
[22]. N. Koblitz, and A. J. Menezes, “A Survey of Public-Key Cryptosystems”, http://www.uncc.edu, Aug.
7, 2004.
[23]. N. Kangude, P. Wani, S. Raut, “Advanced Encryption Standard (AES),” ijcse.net, Computer Security
Standard, Cryptography (IJCSE), vol. 1, no. 3, pp. 118-126, April 2011.
[24]. William Stallings, Cryptography and Network Security, Fourth Edition, Prentice Hal, 2011.