The document discusses source-location privacy (SLP) in wireless sensor networks (WSNs). It proposes criteria to quantitatively measure information leakage about the source location from routing-based SLP protection schemes. The document also proposes a two-phase routing scheme using a randomly selected intermediate node and network mixing ring to provide both content confidentiality and SLP. Simulation results show the proposed scheme is efficient and achieves high message delivery while protecting source location privacy.
This document describes a Trust-Aware Routing Framework (TARF) designed to secure multi-hop routing in wireless sensor networks against attacks that misdirect traffic by replaying routing information to spoof identities. TARF evaluates the trustworthiness of neighboring nodes based on their past performance in delivering packets to the base station. It identifies untrustworthy or compromised nodes and routes data along paths that avoid those nodes, improving throughput. TARF requires neither tight time synchronization nor location information. Evaluation shows it effectively counters attacks using replayed routing data and maintains performance under dynamic network conditions.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
This document proposes methods for detecting and localizing multiple spoofing attackers in wireless networks. It discusses using received signal strength (RSS) spatial correlation, which is a physical property associated with each node's location, to detect spoofing attacks. It formulates determining the number of attackers as a multiclass detection problem and develops cluster-based mechanisms. When training data is available, it explores using support vector machines to improve accuracy. An integrated detection and localization system is developed that can localize multiple attackers with over 90% accuracy in experiments. Existing cryptographic approaches have overhead while the proposed RSS-based spatial correlation method does not require wireless device modification.
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
The document discusses techniques for secure neighbor discovery and position verification in mobile ad hoc networks (MANETs). It proposes a distributed protocol called Neighbor Position Verification (NPV) that allows nodes to verify the positions of neighboring nodes without relying on trusted third parties. The NPV protocol uses a 4-step message exchange and distance calculations to classify neighbor nodes as verified, faulty, or unverifiable. It aims to minimize false positives and negatives while being robust against adversarial attacks. The document also discusses extending NPV to dynamic source routing to allow for verification of mobile nodes rather than static node positions. This improves security and network performance for MANETs.
This document summarizes key routing protocols proposed for network structure in wireless sensor networks (WSNs). It classifies routing protocols into three categories: flat-based, hierarchical-based, and location-based routing. Flat-based routing treats all nodes equally, while hierarchical-based routing uses cluster heads to reduce energy consumption. Location-based routing exploits node positions. Key protocols discussed include SPIN, directed diffusion, LEACH, PEGASIS, and SOP. The document provides an overview of how each protocol operates and its advantages.
This document describes a Trust-Aware Routing Framework (TARF) designed to secure multi-hop routing in wireless sensor networks against attacks that misdirect traffic by replaying routing information to spoof identities. TARF evaluates the trustworthiness of neighboring nodes based on their past performance in delivering packets to the base station. It identifies untrustworthy or compromised nodes and routes data along paths that avoid those nodes, improving throughput. TARF requires neither tight time synchronization nor location information. Evaluation shows it effectively counters attacks using replayed routing data and maintains performance under dynamic network conditions.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
This document proposes methods for detecting and localizing multiple spoofing attackers in wireless networks. It discusses using received signal strength (RSS) spatial correlation, which is a physical property associated with each node's location, to detect spoofing attacks. It formulates determining the number of attackers as a multiclass detection problem and develops cluster-based mechanisms. When training data is available, it explores using support vector machines to improve accuracy. An integrated detection and localization system is developed that can localize multiple attackers with over 90% accuracy in experiments. Existing cryptographic approaches have overhead while the proposed RSS-based spatial correlation method does not require wireless device modification.
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
The document discusses techniques for secure neighbor discovery and position verification in mobile ad hoc networks (MANETs). It proposes a distributed protocol called Neighbor Position Verification (NPV) that allows nodes to verify the positions of neighboring nodes without relying on trusted third parties. The NPV protocol uses a 4-step message exchange and distance calculations to classify neighbor nodes as verified, faulty, or unverifiable. It aims to minimize false positives and negatives while being robust against adversarial attacks. The document also discusses extending NPV to dynamic source routing to allow for verification of mobile nodes rather than static node positions. This improves security and network performance for MANETs.
This document summarizes key routing protocols proposed for network structure in wireless sensor networks (WSNs). It classifies routing protocols into three categories: flat-based, hierarchical-based, and location-based routing. Flat-based routing treats all nodes equally, while hierarchical-based routing uses cluster heads to reduce energy consumption. Location-based routing exploits node positions. Key protocols discussed include SPIN, directed diffusion, LEACH, PEGASIS, and SOP. The document provides an overview of how each protocol operates and its advantages.
SRWSN is a semantic routing algorithm for wireless sensor networks that aims to fulfill requests without knowing the network topology. It uses Bloom filters to reduce storage requirements and a learning table to select relevant peers for queries based on past responses. The algorithm was implemented and shown to learn from its environment, reduce storage needs by up to 92%, and improve routing efficiency through its adaptive capabilities. Further work could enhance alert management and implement location-based queries.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
- The document discusses a performance analysis of a transport layer based hybrid covert channel detection engine. A hybrid covert channel combines two or more types of covert channels, such as a simple network covert channel in TCP and a subliminal channel in SSL.
- The authors designed a hybrid covert channel involving a subliminal channel in the Digital Signature Algorithm of SSL and a simple network covert channel manipulating TCP sequence numbers. They also designed a detection engine to analyze TCP packet headers and SSL signature components.
- The detection engine was tested on an experimental test bed with 5 nodes. Testing showed the detection rate varied between 70-97% while detection content was between 15-30%, depending on the number of covert channel invocations.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
International Journal of Engineering and Science Invention (IJESI) inventionjournals
This document summarizes a research paper that proposes a scheme to protect the location privacy of source nodes in wireless sensor networks against hotspot-locating attacks. The scheme creates an irregularly shaped "cloud" of fake traffic around the real source node to camouflage its location. Cryptographic techniques are used to change packet appearances at each hop. This prevents packet correlation and makes the source node indistinguishable. Simulations show the scheme provides stronger privacy than routing-based schemes while requiring less energy than global-adversary schemes. The proposed neighbor discovery distance algorithm aims to find the minimum traffic path to efficiently transmit data without loss.
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...Vamsi IV
Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to lack of communication infrastructure, our detection adopts claim-carry-and check: each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact. The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace driven simulations.
This document reviews routing protocols in wireless sensor networks. It discusses three communication paradigms used in sensor networks - centralized, distributed, and localized algorithms - and how the routing protocol should support the type of algorithm used. The document also outlines key design constraints for routing protocols, including autonomy, energy efficiency, scalability, resilience, and handling device heterogeneity. It provides an overview of classification schemes for routing protocols and optimization techniques used before describing attribute-based, geographic, hierarchical, and multipath routing protocols in more detail.
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
This document proposes a cooperative method to detect malicious nodes in wireless sensor networks. It describes an existing Channel-aware Reputation System with adaptive detection threshold (CRS-A) that evaluates sensor nodes' data forwarding behaviors and identifies compromised nodes. The paper also discusses detecting malicious nodes by having each node transmit data, store a copy, and check if the next node forwarded it within a set time. If not, it increases a failure tally for that node. If the tally exceeds a threshold, the node is reported as malicious. The proposed method uses this process cooperatively across nodes to reliably analyze and detect malicious nodes. It aims to accurately detect selective forwarding attacks while limiting false detections of normal packet loss due to unstable wireless channels.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
The most emerging prominent sensor network applications collect data from sensor nodes and monitors
periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink
via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such
applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering
scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses
artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible
optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This
scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets.
This code and speed optimized block encryption provides confidentiality against critical data and
consumes less energy for encryption. This proposed method increases the network lifetime there by
reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network
Simulator (NS2) shows the superiority of the proposed scheme
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
SRWSN is a semantic routing algorithm for wireless sensor networks that aims to fulfill requests without knowing the network topology. It uses Bloom filters to reduce storage requirements and a learning table to select relevant peers for queries based on past responses. The algorithm was implemented and shown to learn from its environment, reduce storage needs by up to 92%, and improve routing efficiency through its adaptive capabilities. Further work could enhance alert management and implement location-based queries.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
- The document discusses a performance analysis of a transport layer based hybrid covert channel detection engine. A hybrid covert channel combines two or more types of covert channels, such as a simple network covert channel in TCP and a subliminal channel in SSL.
- The authors designed a hybrid covert channel involving a subliminal channel in the Digital Signature Algorithm of SSL and a simple network covert channel manipulating TCP sequence numbers. They also designed a detection engine to analyze TCP packet headers and SSL signature components.
- The detection engine was tested on an experimental test bed with 5 nodes. Testing showed the detection rate varied between 70-97% while detection content was between 15-30%, depending on the number of covert channel invocations.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
International Journal of Engineering and Science Invention (IJESI) inventionjournals
This document summarizes a research paper that proposes a scheme to protect the location privacy of source nodes in wireless sensor networks against hotspot-locating attacks. The scheme creates an irregularly shaped "cloud" of fake traffic around the real source node to camouflage its location. Cryptographic techniques are used to change packet appearances at each hop. This prevents packet correlation and makes the source node indistinguishable. Simulations show the scheme provides stronger privacy than routing-based schemes while requiring less energy than global-adversary schemes. The proposed neighbor discovery distance algorithm aims to find the minimum traffic path to efficiently transmit data without loss.
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...Vamsi IV
Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to lack of communication infrastructure, our detection adopts claim-carry-and check: each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact. The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace driven simulations.
This document reviews routing protocols in wireless sensor networks. It discusses three communication paradigms used in sensor networks - centralized, distributed, and localized algorithms - and how the routing protocol should support the type of algorithm used. The document also outlines key design constraints for routing protocols, including autonomy, energy efficiency, scalability, resilience, and handling device heterogeneity. It provides an overview of classification schemes for routing protocols and optimization techniques used before describing attribute-based, geographic, hierarchical, and multipath routing protocols in more detail.
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
This document proposes a cooperative method to detect malicious nodes in wireless sensor networks. It describes an existing Channel-aware Reputation System with adaptive detection threshold (CRS-A) that evaluates sensor nodes' data forwarding behaviors and identifies compromised nodes. The paper also discusses detecting malicious nodes by having each node transmit data, store a copy, and check if the next node forwarded it within a set time. If not, it increases a failure tally for that node. If the tally exceeds a threshold, the node is reported as malicious. The proposed method uses this process cooperatively across nodes to reliably analyze and detect malicious nodes. It aims to accurately detect selective forwarding attacks while limiting false detections of normal packet loss due to unstable wireless channels.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
The most emerging prominent sensor network applications collect data from sensor nodes and monitors
periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink
via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such
applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering
scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses
artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible
optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This
scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets.
This code and speed optimized block encryption provides confidentiality against critical data and
consumes less energy for encryption. This proposed method increases the network lifetime there by
reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network
Simulator (NS2) shows the superiority of the proposed scheme
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
Many nodes would not transmit during data transmission and they are considered to be in cooperative. To make them cooperative a fair charging policy is used by charging the since and destination nodes so that both of them can benefit from the communication and it can secure the payment. Charging since and destination nodes almost computationally free, and significantly reduce the number of generated and submitted checks. In this way, each intermediate node earns some credits and the destination node pays the total packet relaying cost. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...IJMER
The multi-hop routing in wireless sensor networks (WSNs) highly vulnerable against
identity cheating through replaying routing data. An attacker can uses this drawback to launch
various serious or even disturbing attacks against the routing protocols, like sinkhole attacks,
wormhole attacks and Sybil attacks. The situation is further forced by mobile and unkind
network conditions. old cryptographic techniques or efforts at developing trust-aware routing
protocols do not effectively address this serious problem. To secure the WSNs against attackers
misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware
routing framework for dynamic WSNs. Without tight time synchronization or known geographic
information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves
effective against those dangerous attacks developed out of identity cheat; the flexibility of
TARF is verified through extensive evaluation with both simulation and empirical experiments on
large-scale WSNs under various scenarios including mobile and RF-shielding network conditions.
Further, we have implemented allow-overhead TARF module in TinyOS; as demonstrated, this
implementation can be included into existing routing protocols with the little effort. Based on
TARF, we also demonstrated a proof-of-concept mobile target detection application that functions
well against an anti-detection mechanism. this
implementation can be included into existing routing protocols with the little effort. Based on
TARF, we also demonstrated a proof-of-concept mobile target detection application that functions
well against an anti-detection mechanism.
This document discusses secure routing in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and wireless sensor networks, and some of the key issues in designing them including routing and security. The document then discusses several routing protocols for MANETs, including DSDV and WRP. It also analyzes security threats to routing like black hole attacks, wormhole attacks, and selfish node behavior. The document proposes analyzing routing protocols like OLSR to understand their security vulnerabilities. Finally, it discusses future research directions like generalizing the security threat analysis methodology to other routing protocols and types.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This summarizes an academic paper that proposes an efficient and active data delivery method for highly dynamic mobile ad hoc networks. It introduces the Fish Eye State Routing protocol to overcome limitations of existing position-based opportunistic routing protocols. FSR uses a fisheye technique to reduce routing overhead by maintaining more accurate information about nearby nodes. It also proposes a virtual destination-based void handling scheme to address communication breaks. The paper analyzes FSR's performance and ability to deliver data reliably and securely in large, high-mobility networks.
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
This paper presents load balancing and provides security using RSA algorithm. This is brief introduction to handle the traffic on node. This represents the converge-casting protocol in wireless sensor networks. The protocol is localized and distributed, and adapts efficiently to vary traffic. Graphs are analyzed using NS-2 simulator, here end-to-end packet latency, packet delivery ratio, throughput are analyzed. This is done for 30 nodes in NS-2 simulation.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Securing Data Communication for Node Anonymization Using Location InformationIJMER
MANET is a type of wireless ad-hoc network that usually has a routable networking
environment. Mobile Ad Hoc Networks use unidentified routing protocols that hide node identities and
routes from outside observers to provide anonymity protection. Our existing anonymous routing
protocols depending on either hop-by-hop encryption, redundant traffic either produce high cost or it
cannot provide privacy protection to data sources, destinations, and routes. We propose a new location
based routing protocol which offers high privacy protection at low cost to sources, destinations, and
routes. It also has approaches to effectively counter intersection and timing attacks. The proposed plan
ensures the privacy of both route and nodes which westudy and simulate the result. This existing
protocol achieves better route privacy protection and its lower cost compared to other unidentified
routing protocols, and also improving the routing efficiency compared to other geographical routing
protocol.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
List of Wireless Communication IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Wireless Communication for M.Phil Computer Science students.
Similar to ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS (20)
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...pharmaindexing
Background
The objective of this study was to investigate the degree of compliance among cardiac patients who attend the health facilities in Kuala Lumpur and Perak, Malaysia. The reasons for non-compliance and recommendations from healthcare professionals were also evaluated.
Method
A cross-sectional study of 400 patients and 100 healthcare professionals was carried out. This study utilizes variables on external factors and internal factors as the measurement tools. The questionnaire which consists of Morisky self-reported medication adherence questions was administered to patients and causes for non-compliance sought. Questionnaire for healthcare professionals was used to determine strategies that can improve compliance rate.
Results
The study revealed a 15.8% of high adherence rate, 54.3% of moderate adherence rate and 30% of poor adherence to cardiovascular disease medications. The chi-square tests showed the strong association between dependent and independent variables. The model chosen for testing the patient compliance through external and internal factors gives an R2 value of 85.0% with an adjusted R2 of 84.7%. The F value (317.187) was also significant (p=0.000) which means that the variables have better fit in the multivariate model. The major reasons determined for non-adherence were attitudes and beliefs, lifestyle, side effects and cost of medications. The study recommends that pharmacists and dispensing technicians should be adequately qualified to provide proper counselling to cardiac patients on their medicines and disease conditions.
Conclusion
The result of this study is of value to health care providers. Compliance to cardiovascular medications will avoid treatment failures encountered in therapy.
Overview on Recurrence Pregnancy Loss etiology and risk factorspharmaindexing
Recurrent pregnancy loss (RPL) can be defined as more than two to three consecutive miscarriages before 20 weeks’ gestation; it affects approximately 1% to 2% of women. RPL is a multifactorial disease. It is very important to study the etiology and risk factors of RPL to find the best diagnostic tests and suitable therapeutic intervention. This article will discuss the current understanding etiologies and risk factors of RPL.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.pharmaindexing
Asthma management is a challenge due to the prevalence of disease in the world. Based on the immunological and inflammatory mechanisms of asthma, corticosteroids and anti-inflammatory participate greatly in the treatment plan. Due to different reasons, there is still an unmet need to develop new agents in this field. A lot of compounds with anti-inflammatory effect are investigated in both pre-clinical and clinical studies.
A review on liver disorders and screening models of hepatoprotective agentspharmaindexing
The liver is a vital organ present in vertebrates and some other animals. It has a wide range of functions, including detoxification, protein synthesis, and production of bio chemicals necessary for digestion. The liver is necessary for survival; there is currently no way to compensate for the absence of liver function long term, although liver dialysis can be used short term.
Carbamazepine induced Steven Johnson syndrome: A case reportpharmaindexing
Drugs are the most common cause that induces Steven Johnson syndrome (SJS) and includes antiepileptic drugs, antiretroviral drugs, anti-tuberculosis drugs, Sulphonamides, fluoroquinolones, penicillins, non-Steroidal anti-inflammatory drugs, Multivitamins. The genetic markers are also the cause for carbamazepine induced Steven Johnson Syndrome. In our study, the antiepileptic drug (Carbamazepine) is the cause for Steven Johnson Syndrome. A female patient aged 25 years came to the hospital with the complaints of bubbling over the skin and all over the body with papillary vesicles associated with pain and irritation, fever, myalgia, and nausea. The patient is known case of Phenytoin induced Steven Johnson Syndrome. In this case the patient developed the Steven Johnson Syndrome approximately after one month after starting the carbamazepine.By the withdrawal of the drug, the condition of the patient was improved.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Pneumonia and respiratory failure from swine origin influenza H1n1pharmaindexing
Swine influenza (swine flu) became alarming health concern when World Health Organization declared as “public health emergency of international concern” on April 25, 2009. After documentation of human-to-human transmission of the virus in at least three countries of two WHO regions, the WHO raised the pandemic level to 6.1 During the 1918, flu pandemic infected one-third of the world's population (an estimated 500 million people) and caused approximately 50 million deaths.2 In 1976, an outbreak of swine influenza occurred in New Jersey, USA, which involved more than 200 cases, some of them severe, resulting in one death.3 In 1988, another fatality was reported as a complication of swine influenza.
A descriptive study on newborn care among postnatal mothers in selected mater...pharmaindexing
The newborn health challenge faced by India is more formidable than that experienced by any other country in the world. The newborn health is inevitably affected by the traditional care practices of the mothers causing high infant morbidity and mortality.The aim of the study were determine the knowledge, attitude and practice of postnatal mothers regarding new born care and find out the association between knowledge, attitude and practice of postnatal mothers regarding new born care and to determine the association between these as well as with the selected demographic variables. A descriptive study was conducted to assess the knowledge, attitude and practice of postnatal mothers regarding new born care in selected maternity centres in Madurai. Survey approach was employed to select sample and it consisted of 100 postnatal mothers. Data was collected using structured interview schedule. Findings of the study showed that 65% of postnatal mothers had moderate knowledge; 61% had favourable attitude and 57% of them had high practice of new born care. There was a significant association between knowledge and attitude (r=+0.567), knowledge and practice (r=+0.388), attitude and practice (r=+0.321) .There was a significant association between knowledge and education, monthly family income and obstetrical score at p<0.05. Findings of the study indicated the need to conduct frequent assessment of knowledge, attitude and practice of postnatal mothers regarding new born care. Awareness and attitude of the mothers towards new born care still has lots of lacunae especially in those who belong to the lower socio economic statusand poorly educated postnatal mothers. So it is imperative to provide comprehensive training in the field of new born care for mothers during pregnancy
Late 19th century was evident of intelligent biomaterial; which has changed researcher’s perspective towards science and technology. This intelligent biomaterial are envisioned to have huge impact on Healthcare from sequential signalling of biomedical molecule, mimicking natural gene, an effective drug carrier, to high resolution diagnostic tool.From drug discovery aspect many of NCE fail to reach therapeutic potential due to PK/ PD profile. Nanotechnology has changed the face of drug discovery form chemical evaluation to structure of proteins in signalling pathways and development of chemical antibody. Nanotechnology from lab to market approval is long process due to regulatory evaluation. Though it seems to be bright future market it has to go through a long process from being innovation to complete market product. This makes whole process expensive making investor reluctant to invest in big projects.Western world is aware of dramatic potential of nano-projects; which has its limitation in financial investments; with major challenge of transforming nano science to commercial pharmaceutical product.
The Flaws in health practice in post-operative management of a patient in ter...pharmaindexing
This case study summarizes the treatment of a 4-year old child with congenital urinary tract obstruction who presented with constipation, fever, and cough. Laboratory tests found low electrolyte levels, high blood acids, and kidney damage. The child's treatment included surgery, dialysis to correct electrolyte imbalances, and antibiotics for chest infection. However, the case study notes discrepancies in the post-operative treatment, including questionable antibiotic selection and prescribing of calcium channel blockers not recommended for children. The study concludes there is a need for clinical pharmacists on the healthcare team to improve rational medication use.
Corticosteroid induced disorders – An overviewpharmaindexing
Glucocorticoids are important in the treatment of many inflammatory, allergic, immunologic, and malignant disorders, and the toxicity of glucocorticoids is one of the commonest causes of iatrogenic illness associated with chronic inflammatory disease.Glucocorticoid-induced muscle atrophy is characterized by fast-twitch or type II muscle fiber atrophy. Corticosteroid (CS) therapy is widely used in the treatment of rheumatic diseases.Osteoporosis remains one of its major complications.Steroid induced glaucoma is a form of open angle glaucoma occurring as an adverse effect of corticosteroid therapy. Glucocorticoids induce hepatic and extrahepatic insulin resistance.Glucocorticoid treatment impairs both glucose transport in fat and muscle cells. Corticosteroid-induced psychosis represents a spectrum of psychological changes that can occur at any time during treatment. Cushing’s syndrome describes the signs and symptoms associated with prolonged exposure to inappropriately high levels of the hormone cortisol. Physicians must be aware of these adverse effects and be equipped to manage them.
Anti-inflammatory activity of pupalia lappacea L. Jusspharmaindexing
Pupalia lappacea (L) Juss is an erect shrub used in folklore medicine to treat bone fractures and in inflammatory conditions. Methanolic extract of aerial parts shown is claimed in traditional medicine that the leaves of the plant are used in the treatment of inflammation. In the present study, the methanolic extract of Pupalia lappacea was screened for its anti-inflammatory activity using carageenan induced rat paw edema egg white induced paw oedema models. The methanolic extract at the dose of 200 mg/kg p.o exhibited significant anti-inflammatory activity in carrageenan induced paw edema model (p<0.01). In egg white induced model, methanolic extract at the dose of 200 mg/kg inhibited paw oedema significantly (p<0.01) indicating that both test samples inhibit the increase in number of fibroblasts and synthesis of collagen and mucopolysaccharides during prostaglandin formation during the inflammation. These experimental results have established a pharmacological evidence for the folklore claim of the drug to be used as an anti inflammatory agent. HPTLC analysis of the extract shows the presence of gallic acid 1.24mg/ml, ferulic acid 2.00mg/ml, chlorogenic acid 46.25mg/ml and rutin 7.02mg/ml of the extract which were responsible for the claimed anti-inflammatory action in the animal models studied.
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...pharmaindexing
This document summarizes research on Lucinactant, a novel synthetic surfactant approved by the FDA in 2012 for treatment of neonatal respiratory distress syndrome (RDS). It contains a peptide called sinapultide that mimics the function of human surfactant protein B. Studies found Lucinactant was as effective as or more effective than previous animal-derived surfactants in reducing mortality from RDS, but its pharmacokinetics are not fully understood. The document reviews clinical trials and mechanisms of Lucinactant and discusses its efficacy, safety profile, and potential cost benefits compared to other surfactants.
Bioactivity screening of Soil bacteria against human pathogenspharmaindexing
This study aimed to isolate soil bacteria with potential bioactive properties against human pathogens. 36 bacterial strains were isolated from 3 soil samples and screened against common pathogens. 14 isolates showed antibacterial activity, including against Staphylococcus aureus, Streptococcus faecalis, E. coli, Klebsiella aerogenes, Proteus vulgaris, Pseudomonas aureginosa and Salmonella typhi. The 3 most active bacterial isolates were selected for further production and isolation of their bioactive metabolites. Testing found the metabolites had prominent antibacterial effects against the clinical pathogens studied, indicating their potential as a source of new antimicrobials given the rise in drug resistance.
A study on sigmoid Volvulus presentation and managementpharmaindexing
A study on sigmoid volvulus presentation and management was a 2yr retrospective study done at RMMCH.The diagnosis of sigmoid volvulus was made from a history of large bowel obstruction (constipation, abdominal distension, and abdominal pain), which were often recurrent and plain abdominal radiographs.The morbidity associated isSuperficial wound infection occurred in four patients. All the infected wounds eventually healed with conservative measures. Clinical anastomotic dehiscence was noted in 1 patient for which during relaparotomy proximal colostomy and mucous fistula was done. The mortality associated is shown is there were 9 deaths of which 7 were due to sepsis and 2 were due to comorbid illness. Two out of eight patients for whom a colopexy was done had a recurrent attack of sigmoid volvulus. The duration of hospital stay ranged between 10 and 21 days. Use of sigmoidoscopic detorsion for viable colon should be encouraged. Sigmoidopexy, which is associated with a recurrence rate of 20% in our series of patients, should be used selectively.Hartmann’s procedure is a safe option in sigmoid volvulus with gangrenous bowel. Primary anastomosis in emergency situation can be carried out with morbidity and mortality in patients with viable colon
Evaluation of Preliminary phytochemical on various some medicinal plantspharmaindexing
The present study was carried out to evaluate the physical status and percentage yield of methanolic extract and its fractions of whole plant of Leucas cephalotes, leaves of Hiptage benghalensis and leaves of Kydia calycina were recorded for future references and Preliminary phytochemical screening of MLC, MHB and MKC revealed the presence of carbohydrates, glycosides, saponins, flavonoids, steroidal and phenolic compounds. MLC revealed the presence of all the above mentioned phytoconstituents except saponins and also MKC steroidal compounds. The fractions of MLC, MHB and MKC revealed the presence of glycosides, phenolic compounds, steroids and flavonoids.
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...pharmaindexing
This study compared the in vitro antibacterial activity of cefoperazone and levofloxacin against various clinical isolates. 120 bacterial isolates from patient samples were tested for susceptibility to cefoperazone and levofloxacin using disc diffusion. Results showed levofloxacin had lower resistance than cefoperazone for E. coli and P. aeruginosa, while cefoperazone was more effective against S. aureus. However, resistance to both antibiotics was gradually increasing, highlighting the need for regular surveillance of antibiotic susceptibility.
Concept of srotas from ayurvedic perspective with special reference to neurologypharmaindexing
Ayurveda is a life science. The researchers of ayurveda could rule out the presence of srotas (channels) spreading throughout the human body. These srotas (channels) are governed by vayu which is using all the srotas (channels) of the body to carry out the functional and physiological activities of the human body without which the human society will not exist. Several synonymous words have been described by the ayurvedicacharyas for srotas. Some are micro and some are macro in structures and they adopt the same colour of the particular dhatus of the body to which it belongs. The aim of the study is to justify that srotas are nothing but innurmerable channels or pathways of the nervous system governed by electric current without which no functional and physiological activities of the human body will develope.
Health promotion survey in overweight and obese students of universities in n...pharmaindexing
Introduction
Overweight and obesity is one of the major health problems in the UK and worldwide. Approximately two-thirds of the population in the UK is either overweight or obese. Overweight and obesity is an important issue that causes distress to most women. Health promotion is the best method to educate overweight and obese women. It is defined as the process enabling people to increase control over and to improve their health by Ottawa Charter for Health Promotion. It is aimed to enhance the well-being of the individuals and their positive attitudes towards prevention of various diseases. In order to make any improvement to the health promotion for overweight and obesity, the risk factors and the opinions from the public should first be identified and addressed.
Methods
Cross-sectional survey design was selected with a questionnaire that consisted of 20 open and close ended questions. A sample size of 196 was determined. The data thus gathered was analyzed using SPSS V20 (Statistical Package for Social Science version 20). Descriptive statistics (fx) and (SD) were used and Chi-square X2 test for association was employed.
Results
Out of the total 196 responses, only (40%) of the students had normal weight (SD 1.1), (25%) students had a good understanding of health promotion (SD 1.6), half (50%) appeared concerned about their weight (SD 0.5), (60%) had an obese family member (0.5). The BMI of students was associated with the presence of an obese member in their family and their weight as a concern for them. (P-value <0.05).
Conclusion
The health promotion service is beneficial as it was found to have raised concerns in the mind of the students regarding over weight and obesity. However it was observed that the understanding of health promotion service was different among students and this is the root of the problem.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
1. www.ijiarec.com
DEC 2013
International Journal of Intellectual Advancements
and Research in Engineering Computations
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
*1
Mr. S.Aravinth, 2
Mr. N.M.K.Ramalingam Sakthivelan,M.E.,
ABSTRACT
Wireless sensor networks (WSNs) are used in many areas for critical infrastructure monitoring and
information collection. For WSNs, SLP service is further complicated by the nature that the sensor nodes generally
consist of low-cost and low-power radio devices. Computationally intensive cryptographic algorithms (such as
public-key cryptosystems), and large scale broadcasting-based protocols may not be suitable. Propose criteria to
quantitatively measure source-location information leakage in routing-based SLP protection schemes for WSNs.
Through this model, identify the vulnerabilities of SLP protection schemes. Propose a scheme to provide SLP
through routing to a randomly selected intermediate node (RSIN) and a network mixing ring (NMR). The security
analysis, based on the proposed criteria, shows that the proposed scheme can provide excellent SLP. The message
will send securely. The adversaries cannot able to identify the source location. The adversaries cannot make any
interruption to the message because of the secure algorithms. The comprehensive simulation results demonstrate that
the proposed scheme is very efficient and can achieve a high message delivery ratio. It can be used in many practical
applications.
Index terms: Light key cryptosystems,randomly selected intermediate node, Network mixing ring, Source location
privacy.
I INTRODUCTION
Wireless sensor networks (WSNs) have been
envisioned as a technology that has a great potential to
be widely used in both military and civilian
applications. Sensor networks rely on wireless
communication, which is by nature a broadcast medium
and is more vulnerable to security attacks than its wired
counterpart due to lack of a physical boundary. In the
wireless sensor domain, anybody with an appropriate
wireless receiver can monitor and intercept the sensor
network communications. The adversaries may use
expensive radio transceivers, powerful workstations,
and interact with the network from a distance since they
are not restricted to using sensor network hardware. It is
possible for the adversaries to identify the message
source or even identify the source location, even if
strong data encryption is utilized. Source-location
privacy (SLP) is an important security issue. Lack of
SLP can expose significant information about the traffic
carried on the network and the physical world entities.
While confidentiality of the message can be ensured
through content encryption, it is much more difficult to
adequately address the SLP. Preserving SLP is even
more challenging in WSNs since the sensor nodes
consist of only low-cost and low-power radio devices,
and are designed to operate unattended for long periods
of time. Battery recharging or replacement may be
infeasible or impossible. Computationally intensive
cryptographic algorithms, such as public-key
cryptosystems, and large scale broadcasting based
protocols, are not suitable for WSNs.To optimize the
sensor nodes for the limited node capabilities and the
application specific nature of the WSNs, traditionally,
security requirements were largely ignored. This leaves
WSNs vulnerable to network security attacks. In the
worst case, adversaries may be able to undetectably
take control of some wireless sensor nodes,
compromise the cryptographic keys, and reprogram the
wireless sensor nodes. In this paper, first propose some
Author for Correspondence:
*1
Mr.S.Aravinth, PG Scholar, Department of CSE, Sri Krishna Engineering College Panapakam, Chennai-301, India.
E-mail: cool88boy@gmail.com
2
Mr.N.M.K.Ramalingam Sakthivelan, M.E., Asso.Professor Department of CSE, Sri Krishna Engineering College, Panapakam,
Chennai-301, India.