International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Repairing of Concrete by Using Polymer-Mortar CompositesIJMER
Replacement of concrete buildings, bridges, roadways and other structures is becoming
more and more expensive as costs of materials and labor continue their upward spiral. Polymermodified or polymer cement mortar (PCM) and concrete (PCC) are a category of concrete-polymer composites which are made from cement mortar or concrete with polymers, The main application of polymer cements is in concrete repair. In this research two sets of mixtures were prepared that consist
of mortar and polymer to fabricate the polymer-cement composite. The first set include mortar with
ratio (1:1) (cement-sand) without water, while the other set include mortar with ratio (1:2) (cementsand)
without water. The polymer was Quickmast105 epoxy which is added to the mortar after mixing
the resin with the hardener in proportion of (1:3). Each set was consist of different percentage of polymer (50:50, 40:60 and 30:70). Tests were conducted, including compression, flexural and bonding strength, were several results obtained including, the highest compressive strength was about 102.889MPa and the highest value of flexural strength was about 57.648MPa for (1:1), the polymermortar with 40:60 ratio showed a higher bonding compressive strength. Proportionality between the
cement and sand and also between the polymer and mortar plays a major role in adhesion and strength are considered key factors in the bonding and portability to repairs.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Repairing of Concrete by Using Polymer-Mortar CompositesIJMER
Replacement of concrete buildings, bridges, roadways and other structures is becoming
more and more expensive as costs of materials and labor continue their upward spiral. Polymermodified or polymer cement mortar (PCM) and concrete (PCC) are a category of concrete-polymer composites which are made from cement mortar or concrete with polymers, The main application of polymer cements is in concrete repair. In this research two sets of mixtures were prepared that consist
of mortar and polymer to fabricate the polymer-cement composite. The first set include mortar with
ratio (1:1) (cement-sand) without water, while the other set include mortar with ratio (1:2) (cementsand)
without water. The polymer was Quickmast105 epoxy which is added to the mortar after mixing
the resin with the hardener in proportion of (1:3). Each set was consist of different percentage of polymer (50:50, 40:60 and 30:70). Tests were conducted, including compression, flexural and bonding strength, were several results obtained including, the highest compressive strength was about 102.889MPa and the highest value of flexural strength was about 57.648MPa for (1:1), the polymermortar with 40:60 ratio showed a higher bonding compressive strength. Proportionality between the
cement and sand and also between the polymer and mortar plays a major role in adhesion and strength are considered key factors in the bonding and portability to repairs.
While many different product protection measures have been developed and established in
recent years, there is still a great risk posed by the leakage of knowledge in production. These risks are
often downplayed by companies, although they directly relate to their own production and engineering
know-how. The various company-specific protection measures in production span a wide range, and
they can be applied both to production relocation (e.g. to China) and to existing facilities. A systematic
approach for identifying critical damage scenarios, and the methodically supported development and
selection of individual protection measures are required for effective protection of critical company
know-how in production
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay and Area in VL...IJMER
Abstract: Power reduction is a serious concern now days. As the MOS devices are wide spread, there is
high need for circuits which consume less power, mainly for portable devices which run on batteries, like
Laptops and hand-held computers. The Pass-Transistor Logic (PTL) is a better way to implement circuits
designed for low power applications.
Experimental Investigation of the Residual Stress and calculate Average Fatig...IJMER
Shot peening procedures developed over the ago in substantial improvements of fatigue properties and Fatigue life. The use of shot peening on aluminium 7075-T6 plates to improve fatigue properties and improve resistance to stress on the corrosion cracking with help of glass beads and various peening methods. When these components subsequently are loaded in tension or bending to a
stress level in the range below the required for yield, the actual tensile stress at the surface is lower than
that calculated on the basis of load and cross sectional area. Fatigue are major problem which normally
start at or near the surface stressed in tension, thus processes that produce residual surface compressive
stresses in components usually enhance the resistance to fatigue. The impact of glass shots which create
resistance after the shot penning process carried out and also control the effects of failure on aluminium
alloys
An Amalgamation-Based System for Micro aneurysm Detection and Diabetic Retino...IJMER
We propose an ensemble-based framework to improve microaneurysm detection. Unlike
the well-known approach of considering the output of multiple classifiers, we propose a combination of
internal components of microaneurysm detectors, namely preprocessing methods and candidate
extractors. We have evaluated our approach for microaneurysm detection in an online competition,
where this algorithm is currently ranked as first, and also on two other databases.
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pane...IJMER
Two degree of freedom Mechatronic solar tracking system was developed in the present study
to improve the performance of photovoltaic cell panels. The present tracking control algorithm was
applied on a small prototype, simulating a solar cells panel tracking system, designed and constructed in
this work. The Mechatronic tracking hardware section consists mainly of a commercial arduino microcontroller
with built in, two servo motor drivers, data input/output, and micro processor modules. Other
components of the tracking hardware are, servo motors actuators and four LDR light intensity sensors. A
feedback control soft ware program, designed and constructed in the present work, enables the solar
tracker to automatically compensate for the sun location’s change to enhance the PV cells efficiency. The
LDR sensors are employed to continuously detect the sun rays intensity at four, light exposed isolated
positions, representing up-right, up-left, down-right, and down-left sides of the solar panel. LDRs data is
hence sent to the control software. The data is used to decide proper actuation actions and send them to
the servomotors to redirect the PV cells panel perpendicular to incident sun rays. Sensors and actuation
signals are exchanged via the in/out data module of the Arduino package. Results of the present
experimental work show that using the present tracking system increases the PV cell out power by about
38% compared with that of a fixed collector
Trough External Service Management Improve Quality & ProductivityIJMER
Abstract: The challenges in Small car project, necessitated improvements in quality and productivity,
right from day one of implementation of project. Detailed studies on external management services,
manufacturing process, various departments involved, and procedures followed were done, and
problems in the existing system were identified and solutions were provided. The object of this paper is to
investigate methods of measuring performance. The subject of this paper is the process of implementing
methods to increase productivity. Methods (procedures) of the study. Pattern during the writing of this
work was used by scientist’s articles information about the measurement and implementation of systems
productivity. Since this work was written with the use of different methods and examples, not all of them
before writing the work were known to me, I want to present a certain part to improve the productivity of
some companies in my country.
This paper mainly discusses about the Transparent Antenna’s introduction, design, their feeding methods, the future scope and finally transition from 2D to 3D.
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...IJMER
In this article, 𝜆 − 𝑗𝑒𝑐𝑡𝑖𝑜𝑛 has been introduced which is a generalization of trijection
operator as introduced in P.Chandra’s Ph. D. thesis titled “Investigation into the theory of operators
and linear spaces” (Patna University,1977). We obtain relation between ranges and null spaces of two
given 𝜆 − 𝑗𝑒𝑐𝑡𝑖𝑜𝑛𝑠 under suitable conditions
A ZVS Interleaved Boost AC/DC Converter Using Super Capacitor Power for Hybri...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Orientation Effects of Stress Concentrators on the Material Deformation Behav...IJMER
Present investigation pertains to carry out to experimental work to generate data in order to
establish the mode of material deformation and fracture in AISI 316 stainless steel strips of 1.70mm thickness in
the presence of elliptical notches at the center of the specimen whose major axis were designed to incline to the
tensile axis at an angle of 0o
, 45o
and 90o
and the same happens to be the axis of rolling. An elliptical hole of
8.00mm (major axis) with 5.0mm (minor axis) were machined in each specimen so as to correspond to the above
angles of 0o
45o
and90o
and one specimen without any elliptical hole as a notch for comparative analysis of the
experimental data. These flat specimens with and without stress concentrators were tested under tension using
Hounsfield Tcnsomctcr and the changes in notch geometry have been recorded at various loadings. Further, the
visual appearance of the cracks initiation have been continuously observed and recorded. The effect of stress
ratio factors and the strain ratio parameters on the mode of fracture on material deformation in and around the
stress concentrator has been thoroughly analyzed and it has been established that the crack initiation began
either at the inner tips of the minor or the major axis of the elliptical stress concentrator, but, always
perpendicular to the direction of loading irrespective of the rolling direction and the orientations of the stress
concentrators. However, the changes in the rotation of the major and the minor axis of the elliptical stress
concentrators were found to alter, and, this alteration in fact assisted in estimating the strains along the major as
well as the minor axis of the stress concentrators. Relation between a plastic strain ratio with respect to the ratio
between the major and the minor strains was observed to be of extremely complex nature. The overall
observation in the present investigation has indicated that thin strips or sheet specimens containing a single or
multiple or a combined type of stress concentrators will create a keen interest in the research approach of the
investigators and make them aware of the seriousness of the presence of the stress concentrators and caution
them to incorporate any possible design notifications in order to avoid any catastrophic failure (s).
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Nowadays, managing for optimal security to wireless sensor networks (WSNs) has emerged as an active research area. The challenging topics in this active research involve various issues such as energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, and efficiency. Despite the open problems in WSNs, already a high number of applications available show the activeness of emerging research in this area. Through this paper, authors propose an alternative routing algorithmic approach that accelerate the existing algorithms in sense to develop a power-efficient crypto system to provide the desired level of security on a smaller footprint, while maintaining real-time performance and mapping them to customized hardware. To achieve this goal, the algorithms have been first analyzed and then profiled to recognize their computational structure that is to be mapped into hardware accelerators in platform of reconfigurable computing devices. An intensive set of experiments have been conducted and the obtained results show that the performance of the proposed architecture based on algorithms implementation outperforms the software implementation running on contemporary CPU in terms of the power consumption and throughput.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
A Security Framework for Replication Attacks in Wireless Sensor Networks
1. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
A Security Framework for Replication Attacks in Wireless
Sensor Networks
T. Subramani1, S.Ravi Varma2, R.Kabileshwaran 3
1
Professor & Dean, Department of Civil Engineering, VMKV Engg College, Vinayaka Missions University, Salem, India
2
Application Engineer, IBM Pvt. Ltd., India
3
Application Engineer, IBM Pvt. Ltd., India
ABSTRACT: Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation,
localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor
networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can
easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is
more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage
caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes
is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over
the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and
access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted
text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security
mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.
Keywords: Security, Replication Attack, Wireless Sensor Networks, Whirlpool, Key Management
I. INTRODUCTION
A Wireless sensor network (WSN) consists of spatially distributed autonomous sensors. These sensors are used to
monitor physical or environmental conditions, such as temperature, sound, pressure, etc. To cooperatively pass their data
through the network to a main location, the more modern networks are bi-directional which enables control of sensor
activity. The industrial and consumer applications, such as industrial process monitoring and control, machine health
monitoring, and so on. Compromising security in networks is very easy unless we supply strong authentication schemes. The
idea of using single polynomial pool is certainly outdated as it opens windows to many node replication attacks. Since single
polynomial authentication is compromised, we move on to create two polynomial pools namely static polynomial pool and
mobile polynomial pool. Static polynomial pool will supply keys to sensor nodes and access points whereas Mobile
polynomial pool will supply keys to access points and mobile sinks [7].
Using two separate key pools and having few sensor nodes that carry keys from mobile key pool will make it more
difficult for the attacker to launch a mobile sink replication attack on the sensor network by capturing only few arbitrary
sensor networks. Although the above security approach makes the network more resistant to mobile sink replication attack
compared to single pool based key pre-distribution scheme, it is still vulnerable to stationary node replication attack. In order
to resist this attack, one-way hash algorithm is paired with static polynomial pool based scheme to enhance the security.
In order to enhance the security scheme, stationary nodes (access points) are divided into two layers Access NodesD and Access Nodes-I consisting of nodes with direct contact and nodes with indirect contact respectively.
1.2 KEY PRE-DISTRIBUTION
The term Key Pre-distribution could be defined as loading keys into sensor nodes prior to deployment. Two nodes
find a common key between them after deployment. The various challenges in key pre-distribution are memory/energy
efficiency, security and scalability.
II. RELATED WORK
2.1 SECURITY IN WIRELESS SENSOR NETWORKS
Many works in past has been carried out by various researchers. Some of the important citations has been presented
here. Among them, Hasan Tahir presented his work on Wireless Sensor Networks. In his work, the current applications of
wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and
disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile,
inaccessible and mission critical. Keeping this in mind a network administrator has to see the security risks involved and
how to tackle it if a security threat arises.
Security Methods for Wireless Sensor Networks is proposed by Xiuli Ren in which wireless sensor networks can be
used for a wide range of potential applications such as military target tracking, environment monitoring, patient monitoring
and scientific exploration in dangerous environments. When sensor networks are deployed in a hostile terrain, security
becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource limitations of
sensor nodes, existing network security methods, including those developed for Mobile Ad-Hoc Networks, are not well
suitable for wireless sensor networks.
www.ijmer.com
2908 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
Routing in Wireless Sensor Networks was proposed and implemented by Rachid Ennaji. Their system in which routing
takes place using protocols such as AODV and DSDV. It brings out all methods to transfer data and also the best optimum
protocol for each type of data transfer.
Stephen Olariu, et al presented his work Information Assurance in Wireless Sensor Networks, that assures security.
However, a Wireless Sensor Network is only as good as the information it produces. But, the most important concern is
information assurance. Information sent through wireless sensor nodes may be subjected to certain risks and danger. When
considering very confidential data any flaw in security can be catastrophic.
Methods for Sensors Localization in Wireless Sensor Networks was discussed by Zenon Chaczko, et al. In their
work, self-organization and routing algorithms dedicated to wireless sensor networks usually assume that sensors absolute
positions are unknown and all decisions are based on sensors own local information. But sooner or later we need to find the
positions of the sensor nodes for various purposes such as maintenance etc., so we need effective localization algorithms to
find out the relative position of the sensor nodes.
Fatemeh Nourani, et al presented his work Improved Circles Intersection Algorithm for Localization in Wireless
Sensor Networks in which they determined the relative position between nodes is very difficult. In fact it is an NP problem.
Each node has its own range i.e., a circular range. Their paper brings out effective algorithms to find relative positions of
nodes based on intersection of ranges. This idea is used by us in differentiating the direct and indirect contact nodes in the
middle layer of the architecture.
An Efficient Approach for Sensor Deployments in Wireless Sensor Network was presented Sujata Dhanorkar that
describes the connectivity can be defined as the ability of the sensor nodes to reach the data sink. If there is no available
route from a sensor node to the data sink then the data collected by that node cannot be processed. Most of the works discuss
in this paper deal with area coverage where the objective is to maximize the coverage percentage; ratio of area covered by at
least one sensor to the total area of the region of interest (ROI). In addition, the relation between the number of sensors and
efficient coverage area ratio is discussed.
2.2 KEY MANAGEMENT IN WIRELESS SENSOR NETWORKS
Similarly, many works have been proposed in the past and some of them are cited here. Eric Ke Wang, et al
proposed an Efficient and Secure Key Establishment Scheme for Wireless Sensor Network. The data authentication becomes
very important when transferring data. Key management and generation becomes a must to do task. But public key
management is not secure enough. Their paper proposes an effective way to generate keys and enhance security using diffiehelmann key exchange algorithm.
A Key Management Method ofWireless Sensor Network was proposed by Xuemei You. In his work, the actual
situation of current wireless sensor network pair-wise key management research, analysis and comparison between the
existing two type of pair-wise key management solution is made according to the evaluation metrics proposed in this article.
This cited paper brings out the fact that proper pair wise key management can be chosen according to the environment
chosen. Also, this paper also brings out the basic limitations when we are using WSN.
Kirti Sharma, et al proposed Flexible and Efficient Scheme for Static Wireless Sensor Networks. Key distribution
and management is the core issue of any security approaches. Due to extremely resource-constrained SNs and lack of any
infrastructure support, traditional public key based key distribution and management mechanisms are commonly considered
as too expensive to be employed in WSNs. Also, they have proposed an efficient individual, pair-wise and cluster key
establishment mechanisms EIPCKM for static WSNs, which enable establishing secure links between any two SNs located
within their communication range. It removes the Node Addition Attack, Node Cloning Attack and also increases the
security within the cluster by introducing the cluster key.
The Study on Key Distribution and Management Mechanisms in Wireless Sensor Networks presented by Liu Feng
states that the polynomial pools provide a wide range of good keys. In fact polynomial based key generation is widely used
in most of the authentication mechanisms in WSNs.
Walid Bechkit, et al presented an Efficient and Highly Resilient Key Management Scheme for Wireless Sensor
Networks. They used the concept of probabilistic key distribution. Deterministic schemes ensure that each node is able to
establish a pair-wise key with its neighbors. To guarantee determinism, protocols such as LEAP make use of a common
transitory key that is preloaded into all nodes prior to deployment.
Secure and Efficient Key Management Scheme for Wireless Sensor Networks proposed by Shobhit Tiwari that
provides a key management technique to ensure maximum security of the wireless sensor network and also of every
individual node subject to various hostile environments and situations. This scheme ensures that compromised sensor nodes
are resilient towards attack before and after mutual pairwise path establishment. It is a self-enforcing scheme and analysis
shows that it is more resilient to sensor capture attacks than the previous schemes.
Walid Bechkit, et al presented a New Key Management Schemes for Resource Constrained Wireless Sensor
Networks.In their paper, without effective key management and generation the authenticity of the data sent moves to a
questionable state. This paper brings out a concept called Hash chaining by which key pre-distribution schemes are
established.
Research on Key Pre-distribution Scheme of Wireless Sensor Networks was presented by Zhao Jinchao, et al. A
novel pairwise key management scheme to enhancing the security is proposed and part of keys in the key pool are computed
by using hash function and the hash value are as new keys and put back into the key pool.
www.ijmer.com
2909 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
Vijay Anand presented the Dynamic Key Management Method for Wireless Sensor Networks that has a static key pool
which gives us a greater risk of attack. They also proposed an idea of using dynamic generation of keys to reduce an attack.
But this type of generation requires more computational time and a good processor with large processor speed.
Node Replication Attacks inWireless Sensor Networks was proposed byWen Tao Zhu in which replication attack
makes it possible for an adversary to prepare her own low-cost sensor nodes and induce the network to accept them as
legitimate ones. The adversary only needs to physically capture one node, reveal its secret credentials, replicate the node in
large quantity, and deploy these malicious nodes back into the network so as to attack the network with little effort. Their
paper brings to our attention the various attacks possible with WSNs and how to develop a contingency plan if an attack
takes place.
2.3 CRYPTOGRAPHIC ALGORITHMS
There are many works pertaining to cryptographic algorithms. Some of the important works have been cited in the
project work. Archana Tiwari, et al presented Performance Evaluation of Cryptographic Algorithms. They presented two
most widely used symmetric encryption techniques Data Encryption Standard (DES) and Advanced Encryption Standard
(AES). From their paper it is very much clear that DES and AES are very much fragile because of the avalanche effect.
Modied-DES Encryption Algorithm was proposed by Walid Zibideh, et al. In their work, due to the fact that
wireless channels are an open medium to intruders and their attacks, encryption is a vital process to assure security over
these channels. However, using well-known encryption algorithms to encrypt data in wireless communication will result in a
catastrophic error due to the avalanche effect, which is implemented in these algorithms to assure security. In their paper, we
propose a modication to the Data Encryption Standard (DES) to make it secure and prone to the bit errors caused by the
wireless channel. We observe that using the modied algorithm in wireless channels, improves the Bit Error Rate (BER)
performance as well as security compared to DES. But we have used the simple version of DES so that it can be used to
efficiently simulate an attack. Based on the above literature survey, it is found that, still there is a need for further
improvements over the existing work. Hence, we propose a new security framework for replication attacks in Wireless
Sensor Networks that possibly tries to prevent such attacks in this project work.
III. WIRELESS SENSOR NETWORKS
A Wireless Sensor Networks is built of ”nodes” from a few to several hundreds or even thousands, where each node
is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio
transceiver with an internal antenna or connection to an external antenna, a micro controller, an electronic circuit for
interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor
node might vary in size from that of a shoe box down to the size of a grain of dust, although functioning ”motes” of genuine
microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to
hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes
result in corresponding constraints on resources such as energy, memory, computational speed and communications
bandwidth.
Security is important for many sensor network applications. Wireless sensor networks (WSN) are often deployed in
hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, adversary
collects all the credentials like keys and identity etc. The attacker can re program it and replicate the node in order to eaves
drop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone
and Sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an
identity as replicas is known as the Node Replication attack. The replication attack can be exceedingly injurious to many
important functions of the sensor network such as routing, resource allocation, miss-behaviour detection, etc. This paper
analyses the threat posed by the replication attack, several novel techniques to detect and defend against the replication
attack, and analyses their effectiveness.
Wireless sensor networks are used in many applications, in sensing the environmental conditions and transmitting it
over longer distances to the base stations. When the base station is far away from the sensing field (where sensors are fixed),
the data is sent by a multi-hop. As the data is passing through multiple hops, an intruder can easily cause the attack at any
stage in the network.
3.1 TOOL COMMAND LANGUAGE
Tcl is a Tool Command Language in which everything is represented as a string, although the internal
interpretation may be of any kind. The command set is used for assingnment in tcl. In puts statement the argument must be
preceeded with the $ sign , for procedures args can be passed as both values and names. E.g. Set a 10
3.2 NETWORK ANIMATOR
Network Animator(NAM) is a tool used for network simulation traces, supports topology layout and packet level
animation. Provides integrated network monitoring within the switch. Collects the network traffic statistics for real time
traffic analysis, performance monitoring and trouble shooting. NS with NAM is an efficient tool for dealing the networking
concepts. All the routing protocols are in NS and these protocols can be very easily visualized with the NAM. NAM
Graphical editor is a latest addition to the NAM, with this there is no need to create a tcl script separately to show the
animation. We can make our own network topology, simulate the traffic sources.
www.ijmer.com
2910 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
3.3 NETWORK SIMULATOR
Network Simulator(NS) is a simulator used for research in networks. It supports for simulating Transmission
Control Protocol(TCP), routing and multicast protocols over wired and wireless networks. Software used to predict the
characteristics of large scale complex network systems. Discrete event simulator uses C++ with oTcl interpreter shell (user
interface) which allows the i/p model files to get executed. Almost all network elements are developed as classes. It supports
a class hierarchy in C++, very similar class hierarchy in oTcl. The root of this class hierarchy is Tcl Object. User tend to
create a new simulation objects through the oTcl interpreter and these objects get mirrored by corresponding objects in the
class hierarchy in C++.
3.4 SPECIFICATIONS OF WIRELESS SENSOR NETWORKS
3.4.1 Access Points
These are the intermediaries in data transfer. Some of the mobile sinks acts as intermediates. They share keys from
both the key pools (static and mobile key pool). Keys from the static key pool facilitates the data transfer between the sensor
nodes and them, while the keys from mobile key pool provides authentication for the data transfer between them and the
mobile sinks.
3.4.2 Mobile Sinks
Mobile sinks informs the sensor nodes about their location updates, frequent changes in the locations of the mobile
sinks causes the sensor nodes to collide in the network. Instead of transferring the information to the entire network at each
time, the sinks broadcast the update to the local LAN
.
3.4.3 Key and Key Pools
In order to maintain security, it is very important to encrypt the messages sent among the nodes, so keys must be
mutually agreed by the communicating nodes. Establishing the keys for the wireless nodes is a challenging task. Key
agreement schemes such as Diffie-Hellman and public key schemes are not suitable for wireless sensor networks. Key pre
distribution depends upon the size of the key pool, and the maximum size of the key pool that can be used by the scheme
would be s2p, where s is the size of the key pool and p is the probability that two nodes share a common key. Key pre
distribution is also not possible since it consumes large amount of memory when the network size is large. So instead of
assigning key prior to the data transmission, a scheme is proposed to assign keys randomly [2].
IV. ENHANCED THREE TIER SYSTEM ARCHITECTURE
Basically a sensor node in a wireless sensor networks performs some operations, gathers information and
communicates with the other nodes. The main components of the sensor nodes are micro-controller, transceiver, external
memory and power source. The enhanced three tier architecture scheme discussed here consists of four layers namely sensor
nodes, access nodes with direct contact, and access nodes in indirect contact and mobile sinks. At the initial stage keys from
the single polynomial pool has been shared between the sensor nodes and the mobile sinks for communication. Since the
single polynomial has been used, the attacker can easily replicate the node, capture the key and misbehave in the network.
Therefore in order to enhance the security, two polynomial pools namely static polynomial pool and mobile polynomial pool
are created which is called the three tier security mechanism. Even though there is a security mechanism by sharing key from
two polynomial key pool for layered communication between layers, the replication attacks still persists.
The attacks that are possible in the three tier security scheme are mobile sink replication attack and access point
replication attack, out of which mobile sink replication attack is reduced to small percentage by the implementation of this
scheme. In order to avoid the access point replication attack, it is divided into access points which are in direct contact with
the sensor nodes mobile sinks and access points which are not in direct contact with the sensor nodes-mobile sinks. In this
enhanced scheme, keys from static polynomial pool is shared by the following layers namely sensor nodes, D access nodes, I
access nodes. And keys from the mobile polynomial pool are shared by the following layers namely I access nodes and
mobile sinks. The access nodes which are in indirect contact share the keys from the mobile polynomial pool and some
percentile of keys from the static polynomial pool. Therefore an attacker who captures an access node will get either a static
key alone or both static and mobile key(hybrid key).
By capturing a node with the direct contact, which has only static key, an attacker cannot be able to send the data to
intended destination because the data will be re routed. Once again an attacker capturing the access node which is indirect
will get both the keys, but then also it is least possible for an attacker to reach the destination as intended. The following
architecture describes the enhancement of the three tier security scheme, which is more resilient towards replication attacks
[3].
Figure 4.1 Enhanced three tier Architecture
www.ijmer.com
2911 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
4.1 LAYER CONSTRUCTION
In wireless sensor networks, to implement the enhanced scheme stated above three layers are to be created namely
sensor nodes, access nodes and mobile sinks. Transmission control Protocol is used in communication to transfer the data
between the layers. A single polynomial pool is created. Keys from this pool are used for communication between sensor
nodes- access points and access points-mobile sinks. The figure 4.2 depicts the same.
4.2 KEY POOL SEGREGATION
To enhance the security scheme, two polynomial key pools are created. Keys from static polynomial pool are used
for data transfer between sensor nodes and
Figure 4.2 Layer Construction
access points and a key from the mobile polynomial pool is used for data transfer between access points and mobile sinks.,
which is described through the below block diagram in figure 4.3.
Figure 4.3 Key Pool Segregation
4.3 SECURITY ENHANCEMENT
The access point layer is separated into nodes with direct and indirect contact with respect to interference range. An
enhancement of Advanced Encryption standard called the Whirlpool algorithm is used for authentication between access
points and the mobile sinks. Once the layer is segregated and key distribution is done coupled with strengthening by means
of Whirlpool algorithm, the probability of the attack decreases, i.e. an attacker cannot easily create a replicated node, and
transfer the data. The following block diagram describes the steps to be carried out after implementing the three tier security
approach.
Figure 4.4 Security Enhancement
V. SECURITY MECHANISMS
5.1 DATA ENCRYPTION STANDARD
DES is a 64-bit block cipher. Both the plain text and cipher text are 64 bits wide. The key is 64-bits wide, but every
eighth bit is a parity bit yielding a 54-bit key. The DES algorithm involves a step by step procedure or rounds to make up the
cipher text needed. The initialization round is where the plain text is subjected to initial permutation and is split into left and
right sub parts [6] [4].
Before the start of the first round the key that should be used is subjected to various processes. The 64 bit key is
converted into a 48 bit key. After the key is prepared the execution of rounds start.The left and the right part of the plain text
is permuted,XORED and then the output this round is given as input to the next round. The number of rounds depend on the
length of the plain text. This algorithm is no longer in use because it can be easily attacked. So simulating an attack becomes
easier if we use the above algorithm.
www.ijmer.com
2912 | Page
6. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
Figure 5.1 Overview of Data Encryption Standard
5.2 WHIRLPOOL
WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages
less than 2256 bits in length, and produces a message digest of 512 bits. Historically, WHIRLPOOL had three versions. The
first version, WHIRLPOOL-0, was submitted to the NESSIE project. Its ”tweaked” successor, WHIRLPOOL-T, was
selected for the NESSIE portfolio of cryptographic primitives. A flaw in its diffusion layer reported by Shirai and Shibutani
(”On the diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards,
and the final version (called simply WHIRLPOOL for short) was adopted by the International Organization for
Standardization (ISO) in the ISO/IEC 10118-3:2004 standard. WHIRLPOOL uses Merkle-Damgrd strengthening and the
Miyaguchi-Preneel hashing scheme with a dedicated 512-bit block cipher called W. This consists of the following. The bit
string to be hashed is padded with a lquo;’1’-bit, then with a sequence of ’0’-bits, and finally with the original length (in the
form of a 256-bit integer value), so that the length after padding is a multiple of 512 bits. The resulting message string is
divided into a sequence of 512-bit blocks m1, m2,... mt which is then used to generate a sequence of intermediate hash
values H0, H1, H2, ... Ht. By definition, H0 is a string of 512 ’0’-bits. To compute Hi, W encrypts mi using Hi-1 as key, and
XORs the resulting ciphertext with both Hi-1 and mi. Finally, the WHIRLPOOL message digest is Ht.
Figure 5.2 Miyaguchi-Preneel Scheme
The W block cipher used by WHIRLPOOL is very similar to the AES algorithm, RIJNDAEL, the main differences
being sketched in the following table: The coding for this algorithm is very much similar to that of AES.The W S-box, which
in the original submission is generated entirely at random (i.e. lacks any internal structure), by a recursive structure: the new
88 substitution box is composed of smaller 44 ”mini-boxes” (the exponential E-box, its inverse, and the pseudo-randomly
generated R box). The coding for the algorithm involves the following steps.
5.2.1 Initialisation Function
The initialisation function given below creates a basic hashing state for each new input given. The hashing state
defines a basic skeleton for the hashing function.
5.2.2 Addition Function
The snippet shown below declares the position of the pointers in the plain text. A buffer is also created. Also the
data is processed 8 bit at a time. Before this process the data is split into blocks in such a way that each block has 512 bits.
The last block is padded at the end with zeroes.
www.ijmer.com
2913 | Page
7. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
Figure 5.4 Tweaked S-Box Preparation
5.2.3 Finalising Function
The function given below generates the 512 bit cipher text by processing block by block. The above function also
makes use of the miyaguchi-preneel scheme of cipher text generation.
VI. PERFORMANCE ANALYSIS
Let K1, K2 denotes the keys in the key pool.
Let Ks, Km denotes the number of keys in the static and mobile key pool.
DK1,K2 denotes the data transfer using the keys K1 and K2.
Access point involved in data transmission picks a key K1 from the Ks number of keys in the static pool and a key K2 from
the Km number of keys in the mobile pool.
Selecting a key from the static key pool: Ks C1
Probability of choosing a key from the static key pool, PK1 = 1/Ks C1
Selecting a key from the mobile key pool: Km C1
Probability of choosing a key from the static key pool, PK2 = 1/Km C1
Let PCC denotes the probability of arriving at the correct combination of keys.
Let S denotes the strength of the algorithm which depends on the length of the key, length of the encrypted text and the
encrypted mechanism.
Let Pbef denote the probability of access point replication attack before separation of layers.
Pbef = (1/Ks C1) + (1/Km C1) + PCC + S …(1)
Let Paft denote the probability of access point replication attack after node separation.
Direct contact nodes will share the key only from the static key pool. Let x be the small percentage of the keys gets added to
the mobile key pool(Hybrid key pool)
Selecting key from the static and mobile key pool,
Y = (Km C1) * (x C1)
Paft = (1/Ks C1) + (1/Y) + PCC + S …(2)
Comparing (1) and (2), its clear that
Paft << Pbef
The factor 1/Y slightly less than 1/Km C1 which makes Paft to decrease, therefore the probability of attack after the
node separation is reduced. Even though, an attacker creates the node, the chance of getting the correct combination of these
is difficult i.e the attacker has to search for the correct combination of keys over large coverage of nodes. Since the keys are
altered, it becomes a difficult task for the attacker to retrieve the data transferred in the network. A graph is plotted with Pbef
on the Y axis and the trial number on the X axis.
From equation number 2 we then calculate Paft. A graph is also drawn with Paft on the Y axis and Trial Number on the X
axis.
Figure 6.1 Graph of Proposed Probability Pbef
www.ijmer.com
2914 | Page
8. www.ijmer.com
International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2908-2915
ISSN: 2249-6645
Figure 6.2 Graph of Enhanced Probability Paft
VII. CONCLUSION
The enhanced three-tier security framework has increased the security between sensor nodes and mobile sinks. By
splitting the access point layer, we have achieved more resilience and protection against access point and mobile sink
replication attacks. Analysis indicates that after separation of layers and key distribution, the probability of access point
replication attack is reduced. The proposed scheme on polynomial pool based key pre distribution substantially improved the
network resilience to mobile sink replication attacks compared to single polynomial pool based scheme. We have further
improved the security performance of the proposed scheme against access point replication attack by strengthening the
authentication between access nodes and mobile sinks.
7.1 FUTURE WORK
Although the enhanced three tier security scheme is more resilient towards access point replication attack, it is weak
against wormhole attack. As time progresses, more type of threats will haunt WSNs. So, more complex security frameworks
and stronger authentication schemes should be developed.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
R.Mahapatra A.Rashid, “An efficient key distribution scheme for establishing pairwise key in distributed sensor networks”,
Proceedings of IEEE, , 2008.
R.Mahapatra A.Rashid, “A key predistribution scheme for heterogenous sensor networks”, IEEE Conference, 2009.
R.Mahapatra A.Rashid, “The three tier security scheme in wireless sensor networks with mobile sinks”, IEEE transactions, vol. 23,
num. 5, pp. 958–965, 2012.
L.Lamport, “Password authentication with insecure communication”, Comm.ACM, vol. 24, num. 11, pp. 770–772, 1981.
M.Praveen Kumar Naregalkar Akshay, “An efficient approach for sensor deployments in wireless sensor network”, IEEE
conference, 2011.
Mustafa M. Matalgah Walid Y. Zibideh, “Modified-des encryption algorithm with improved ber performance in wireless
communication”, IEEE conference, 2011.
E.Cayirci Y.Shankarasubramaniam, “Wireless sensor networks: A survey”, Proceedings of the IEEE, vol. 38, num. 4, 2002.
Wen Tao Zhu, “Node replication attacks inwireless sensor networks: Bypassing the neighbor-based detection scheme”, IEEE
conference, 2011.
www.ijmer.com
2915 | Page