IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Safest Way of Message or File Transfer using Key DistributionDeepika Shivagnanam
This idea has high scalability that it enhances security system for file transfers. This uses the safest algorithm of Key Distribution to provide confidentiality.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Safest Way of Message or File Transfer using Key DistributionDeepika Shivagnanam
This idea has high scalability that it enhances security system for file transfers. This uses the safest algorithm of Key Distribution to provide confidentiality.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
A servey on wireless mesh networking moduleeSAT Journals
Abstract
There is a rapid development in sensor devices as well as increase in communication range with various low power wireless radio
transmitter and receiver using wireless mesh network. Wireless mesh networking is useful to collect the information from different
sensors that are widely distributed over a large area. In this survey, we mainly focus on open source module that is shown by
various authors. For this purpose many authors use Zigbee module for the development of sensor systems with capability of mesh
networking. In this survey, we mainly focus on wireless mesh networking, for that we studied different wireless sensors to transmit
and receive the data from them and can monitor the output at regular interval on our screen. WSN consist of different sensors that
are distributed with the capabilities of computing, processing and communication can continuouslysense the data in terms of
packets and transmit that data at regular interval. They design such model in which integrates the various functions such as type
of network, data routing and scheduled of transmission data. Also design wireless mesh network structure for various monitoring
application such as industrial, agricultural, medical and so many with a good average packet delivery ratio upto 93%. This
proposed system has the advantage of low cost combined with high reliable information of transmitter without complications of
wireless mesh networking. And finally we conclude from that study of WMN, the range of communication can be increased by
Using Pro-Zigbee module (up to 1.6Km) as well as we can monitor that, if one of the node is fail to transmit a data ,then their
data will automatically stored in neighboring node as backup.
Keywords: Wireless Sensor Network, Wireless Mesh Network, Different Sensors, Zigbee Module.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of used metadata elements in digital libraries in iran with dublin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A servey on wireless mesh networking moduleeSAT Journals
Abstract
There is a rapid development in sensor devices as well as increase in communication range with various low power wireless radio
transmitter and receiver using wireless mesh network. Wireless mesh networking is useful to collect the information from different
sensors that are widely distributed over a large area. In this survey, we mainly focus on open source module that is shown by
various authors. For this purpose many authors use Zigbee module for the development of sensor systems with capability of mesh
networking. In this survey, we mainly focus on wireless mesh networking, for that we studied different wireless sensors to transmit
and receive the data from them and can monitor the output at regular interval on our screen. WSN consist of different sensors that
are distributed with the capabilities of computing, processing and communication can continuouslysense the data in terms of
packets and transmit that data at regular interval. They design such model in which integrates the various functions such as type
of network, data routing and scheduled of transmission data. Also design wireless mesh network structure for various monitoring
application such as industrial, agricultural, medical and so many with a good average packet delivery ratio upto 93%. This
proposed system has the advantage of low cost combined with high reliable information of transmitter without complications of
wireless mesh networking. And finally we conclude from that study of WMN, the range of communication can be increased by
Using Pro-Zigbee module (up to 1.6Km) as well as we can monitor that, if one of the node is fail to transmit a data ,then their
data will automatically stored in neighboring node as backup.
Keywords: Wireless Sensor Network, Wireless Mesh Network, Different Sensors, Zigbee Module.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of used metadata elements in digital libraries in iran with dublin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Stability analysis of orthotropic reinforce concrete shear walleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Coupling the bionic surface friction contact performance and wear resistance ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
Wireless Sensor Networks (WSN) is a group of sensor nodes, each equipped with its own sensors, processor
and radio transceiver. Sensor nodes are characterized by low bandwidth, small memory sizes, limited power supplies and
limited energy. Without physical protection and in unattended environments all the Sensor nodes are deployed in open, so
security is important, as they prone to different types of malicious attacks. Wireless Sensor Network (WSN) is useful for
collecting the information from the Environment. The nodes will sense the information from the environment and sends
the data to other nodes or Base Stations. During the process of transmission of data, many security techniques and
methods are used. But the Wireless Sensor Networks are very difficult to secure the data, due to its mobility. Key
Management is important for implementing security in a wireless Sensor Network. In this paper, moving sensors will
provide security for the data collected and transmitted. The security is provided by using the Virtual Certificate (VC),
issued by the Virtual Certificate Authority (VCA). This mechanism overcomes the difficulties in the Wireless Sensor
Network. This mechanism verifies the validity of the proposed schemes and analyzes the consumption of energy,
communication overhead and packet loss.
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
Abstract Wireless Sensor Network (WSN) comprises of sensor nodes, which form a network by building connections wirelessly, to send detected information from source to destination. Routing Protocols are utilized to shape honest to goodness and littlest routes between a starting node (source) and ending node (destination). Numerous WSN applications use various hierarchical routing protocols. Low Energy Adaptive grouping (LEACH) is the first hierarchical routing protocols and it takes after the standard of forming cluster of nodes and picking a cluster head randomly among the nodes for inter cluster communication. This type of cluster head election leads to attack by adversary node, hence a Modified LEACH algorithm is proposed in this paper. The execution of LEACH and Modified LEACH is assessed utilizing distinctive performance measurements and Modified LEACH was discovered to be extremely compelling in enhancing overall performance of the WSN. MATLAB is made use of, to simulate the undertaking situation. Keywords: WSN, LEACH, Hierarchical protocols, Cluster Head.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
Kavita Sunchu, Dhainje Prakash " Structure less Efficient Data Aggregation and Data Integrity in Sensor Network ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation techniques provide higher security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead. Data aggregation protocol can reduce the communication cost, so the life time of sensor network is extended. The structure based has the overhead in dynamic scenarios for any event based application. The goal of our work is to design techniques and protocol that is structure free and ensure data integrity and aggregation with low transmission overhead and transmission cost. Experiment results demonstrate that the transmission overhead is still reduced even if on sensing data. Further, the design has been generalized and adopted in wireless sensor networks.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
Energetic key for protected communication in wireless
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 193
ENERGETIC KEY FOR PROTECTED COMMUNICATION IN WIRELESS
SENSOR NETWORK
S.Selvi1
, G.Sankareeswari2
, Vidhyalakshmi3
1, 2
Assistant Professor, CSE, 3
Assistant Professor, IT, Sri Vidya college of Engineering and Technology, Tamilnadu, India
sselvi201987@gmail.com, sankariram90@gmail.com, vidhyarajme@gmail.com
Abstract
The enormous world wide web and its application of sending data have caused a tremendous increase in stolen or attach the false
data with the original data while sending from one node to another node through the intermediate nodes for that we have to securely
send the data from source to destination. Virtual energy based encryption and keying has introduced an effective solution to the
problem of detection of false data over the network. In the virtual energy based encryption and keying technique we introduced an
concept is one time dynamic key (i.e.).The data which is to be send from source to destination is encrypted using the secret key and
the encryption algorithm. The secret key is generated, one time dynamic key is employed for one packet only and different keys are
used for the successive packets. Virtual energy based encryption and keying is a secure communication framework the data to be send
is encrypted using the AES algorithm. The intermediate nodes are verified the incoming packets if the incoming packet is false packet
injected in the network by the malicious outsiders those packets are detected and dropped otherwise the packet is forwarded to the
next node. In the virtual energy based encryption and keying there are two modes of operations they are virtual energy based
encryption and keying-I and virtual energy based encryption and keying- II. In the virtual energy based encryption and keying-I each
node monitors their neighbor node and in the virtual energy based encryption and keying-II each nodes randomly choose the nodes
and monitors those nodes. These two modes of operation monitor the nodes and detect the false packet and drop those false packets.
Keywords: Wireless sensor networks, security, one time dynamic key
--------------------------------------------------------------------***----------------------------------------------------------------------
1. OBJECTIVE
When the important data’s are send from one node to another
node through the wireless sensor networks some false packets
are attached with the original data by malicious outsiders. For
that we have to detect and drop those packets. Successful
implementation of this project solves those above problems.
2. INTRODUCTION
The explosive growth of networks offers enormous benefits in
terms of increased exchange of information. There are two
basic key management schemes for WSNs: fixed and active.
In fixed key management schemes, key management functions
(i.e., key generation and distribution) are handled statically.
That is, the sensors have a permanent number of keys loaded
either prior to or shortly after network deployment. On the
other hand, active key management schemes perform keying
functions (rekeying) either periodically or on demand as
needed by the network. The VEBEK structure based on the
two types of operational modes. The VEBEK means Virtual
Energy based encryption and key. They are VEBEK-I,
VEBEK-II[1]. These modes are suitable for different
scenarios. VEBEK-I nodes contain only one hop. VEBEK-II
contains full of downstream nodes. We easily analyze the
VEBEK’s possibility and performance in two ways. They are
1.Analytic process 2.Simulations.These two processes based
on the reception module and sink. Performance analysis also
checks the routing path from source to sink. It also analyzes
the performance of the nodes. During the rescue of the data
the path is stable or fixed. VEBEK [1] is a secure process
because the sensitive’s data’s are encoded using permutation
code through AES encryption process. The same key never
appears for the same data. It increases the packet size of the
sending data and it avoids the unnecessary data in an efficient
manner. Many encryption algorithms used to send only 40 bits
of message, through wireless network. So the message is not
fully secured that is the level of security is reduced. But the
VEBEK[1] overcome these types of problems. It has the
ability to transmit 64 bit data. It provides full security to the
whole message. It encrypts the whole data. The key generation
based on the 8 or 10 digits. Here sensor is used in between the
process of the crypto module and packet transmission. The
virtual energy of the sensor is dynamically changed through
AES encryption mechanism.
3. WIRELESS SENSOR NETWORK (WSN)
A wireless sensor network (WSN) consists of spatially spread
autonomous sensors to monitor physical or natural situation,
such as temperature, sound, pressure, etc. and to freely pass
their data through the network to a main location. The
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 194
expansion of wireless sensor networks was forced by military
applications such as battleground observation; today such
networks are used in many industrial and consumer
applications.
The WSN is built of "nodes" – from a little to a number of
hundreds or even thousands, where each node is related to one
(or sometimes several) sensors. Each such sensor network
node has usually several parts: a radio transceiver with an
interior antenna or link to an outside antenna, a
microcontroller, an electronic circuit for interfacing with the
sensors and an energy resource, usually a battery or an
surrounded form of energy harvesting. Size and cost constraint
on sensor nodes outcome in equivalent constraints on
resources. The topology of the WSNs can differ from a easy
star network to an superior multi-hop wireless mesh network.
The transmission technique between the hops of the network
can be routing or flooding.
3.1 Platforms
3.1.1 Software
Energy is the scarcest source of WSN nodes, and it determines
the life span of WSNs. WSNs are proposed to deployed in vast
number in a mixture of environments, jointly with distant and
destructive regions, where ad hoc communications are a key
component. For this basis, algorithms and protocols require to
address the following issues:
• Lifetime maximization
• Robustness and fault tolerance
• Self-configuration
Lifetime maximization: Energy/Power utilization of the
sensing device should be minimized and sensor nodes should
be energy efficient since their partial energy resource
determines their lifetime. To save power the node should shut
off the radio power supply when not in use.
3.1.2 Hardware
One main challenge in a WSN is to generate low cost and
small sensor nodes. There are an growing number of small
companies producing WSN hardware and the commercial
circumstances can be compared to home computing in the
1970s. Many of the nodes are still in the study and growth
stage, mainly their software. Also natural to sensor network
acceptance is the use of very low power methods for data
achievement.
In many applications, a WSN communicates with a Local
Area Network or Wide Area Network during a gateway. The
access acts as a link between the WSN and the other network.
4. EXISTING SYSTEM
Some of the drawbacks occurred in the existing system. RC4
algorithm is used. In that security is low and only 40 bit is
transmitted. It follows simple and ancient techniques. It will
encrypt the stream of bytes using Stream-Cipher technology.
5. PROPOSED SYSTEM
The complete project deals with the key process of WSN’s.
WSN’s is a technique to verify the data or message line by
line and give up the fake packets. It also maintain the
condition of the sensor. Here the proposed system uses AES
algorithm instead of using the RC4 algorithm. The proposed
system has some merits compared with the existing system.
The proposed system uses the recent and superior encryption
technique. The block of the data encrypted using the block-
cipher technique. Using WSN 64 bits of data are transmitted.
Based on the encryption technique the whole process is
completely secured.
6. OPERATIONS
The VEBEK contains the following four operations:
1. Virtual energy based keying module.
2. Encryption.
3. Packet transmission and reception module.
4. Performance analysis module.
6.1. Virtual Energy Based Keying Module
The virtual energy-based keying process involves the creation
of active keys. Opposite to other active keying schemes, it
does not exchange extra messages to create keys. A sensor
node computes keys based on its enduring virtual energy of
the sensor. The key is then feed into the next module.
6.2. Encryption
The encryption module in VEBEK employs a simple encoding
process, which is basically the process of variation of the bits
in the packet according to dynamism created variation code
generated via AES encryption technique. The encoding is a
simple encryption mechanism adopted for VEBEK. However,
VEBEK’s elastic architecture allows for adoption of stronger
encryption mechanisms.
6.3. Packet Transmission and Reception Module
The Packet transmission and reception module handles the
process of sending or receiving of encoded packets along the
path to the sink. And also get the acknowledgement from the
receiver side to conform the delivery status of the node.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 195
6.4. Performance Analysis Module
In the performance analysis module we are going to consider
the false injection and eavesdropping of messages from an
outside malicious node. And also check a routing path is
established from the sources in the event region to the sink.
We assume that the path is permanent during the delivery of
the data and the route setup is secure. So the sensor network is
thickly occupied generate reports for the same event. This
module will help to analyze the performance of the nodes.
7. ARCHITECTURE
In our general architecture of implementation we use the
concept of AES encryption algorithm.
Fig 1.General architecture for Key management scheme for
wireless sensor networks
The dynamic key is generated from the base station. (i.e.) one
time dynamic key is employed for one packet only and
different keys are used for the successive packets. The original
message is encrypted using the AES encryption algorithm and
with the secret key (dynamic key).Then the encrypted message
is given to the sensor.
In the sensor, it will decrypt the message and verify the
packets whether the message is came from correct source or it
is send by the malicious outsider. If the message is send by the
malicious outsider it is detected and dropped by the sensor.
Otherwise it is forwarded to the mobile sink i.e. to the
receiver.
8. ALGORITHM
1. Cipher (byte in[4*Nb], byte out[4*Nb], word
w[Nb*(Nr+1)])
2. begin
3. byte state[4,Nb]
4. State = in
5. AddRoundKey (state, w)
6. for round = 1 step 1 to Nr-1
7. SubBytes(state)
8. ShiftRows(state)
9. MixColumns(state)
10. AddRoundKey(state, w+round*Nb)
11. end for
12. SubBytes(state)
13. ShiftRows(state)
14. AddRoundKey(state, w+Nr*Nb)
15. out = state
16. end
AES is based on a design principle known as a substitution-
permutation network, and is fast in both software and
hardware. AES is a adjustment of Rijndael which has a preset
block size of 128 bits, and an input size of 128, 192, or 256
bits. By difference, the Rijndael arrangement per se is
specified with block and key sizes that may be any multiple of
32 bits, both with a least of 128 and a greatest of 256 bits.
AES operates on a 4×4 column matrix of bytes, termed the
position, although some versions of Rijndael have a larger
chunk size and have additional columns in the position. Most
AES calculations are done in a special finite field.
The input size used for an AES cipher specifies the number of
repetitions of change rounds that change the input, called the
plaintext, into the last output, called the cipher text.
Each round consists of several processing steps, each
containing four related but dissimilar stages, as well as one
that depends on the encryption input itself. A set of reverse
rounds are applied to convert cipher text back into the unique
plaintext using the same encryption key.
High-level Description of the Algorithm
1. KeyExpansion—round keys are resulting from the
cipher key using Rijndael's input plan. AES requires
a separate 128-bit round key block for each round
plus one more.
DYNAMIC KEY
GENERATION
AES
ENCRYPTION,
MESSAGE
DYNAMIC
KEY, AES
DECRYPTION,
MESSAGE
ORIGINAL
MESSAGE
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 196
2. InitialRound
1. AddRoundKey—each byte of the position is
combined with a block of the round key
using bitwise xor.
3. Rounds
1. SubBytes—a non-linear substitution step
where each byte is replaced with another
according to a lookup table.
2. ShiftRows—a transposition step where each
row of the state is shifted cyclically a certain
number of steps.
3. MixColumns—a mixing operation which
operates on the columns of the position,
merge the four bytes in each column.
4. AddRoundKey
4. Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey.
CONCLUSIONS
This paper describes the concept of One time dynamic key
structure used for only one packet and variant keys are used
for the successive packets. It protects the entire data against
the unauthorized users or hackers. It protects the data by
generating different keys for each time and it shows the path
and size of the file in the text box. It helps to send the message
in highly secure manner.
REFERENCES
[1]. Arif Selcuk Uluagac, Student Member, IEEE, Raheem A.
Beyah, Senior Member, IEEE,Yingshu Li, Member, IEEE,
and John A. Copeland, Fellow, IEEE” VEBEK: Virtual
Energy-Based Encryption and Keying for Wireless Sensor
Networks” IEEE TRANSACTIONS ON MOBILE
COMPUTING, VOL. 9, NO. 7, JULY 2010
[2]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci,“Wireless Sensor Networks: A Survey,” Computer
Networks,vol. 38, no. 4, pp. 393-422, Mar. 2002.
[3]. C. Kraub, M. Schneider, K. Bayarou, and C. Eckert,
“STEF: A Secure Ticket-Based En-Route Filtering Scheme for
Wireless Sensor Networks,” Proc. Second Int’l Conf.
Availability, Reliability and Security (ARES ’07), pp. 310-
317, Apr. 2007.
[4]. Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for
Filtering False Data Injection in Wireless Sensor Networks,”
Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.
[5]. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route
Filtering of Injected False Data in Sensor Networks,” IEEE J.
Selected Areas in Comm., vol. 23, no. 4, pp. 839-850, Apr.
2005.
BIOGRAPHIES
Ms. S. Selvi Working as a assistant
professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
Coimbatore Institute of Engineering &
Technology,Coimbatore. Her under graduation in computer
science and Engineering at PSR Engineering
College,Sivakasi.Her area of interest is Network Security.
Ms. G. Sankareeswari Working as a
assistant professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
Mohamed Sathak Engineering College at
Kilakarai. Her under graduation in Information Technology
at Raja College of Engineering Technology, Madurai. Her
area of interest is Cloud Computing and Networks security.
Ms. R. Vidhyalakshmi Working as a
assistant professor in Sri Vidya College of
Engineering and Technology . She has
completed Master of Engineering in
computer science and Engineering at
P.S.R Engineering College at Sivakasi.
Her under graduation in Information Technology at P.S.R
Engineering College at Sivakasi. Her area of interest is Cloud
Computing and Networks security.