In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Secure and efficient data transmission for cluster based wirelessSai Sirisha
This document proposes two secure data transmission protocols for cluster-based wireless sensor networks called SET-IBS and SET-IBOOS. SET-IBS relies on the Diffie-Hellman problem for security, while SET-IBOOS relies on the discrete logarithm problem. The protocols aim to securely and efficiently transmit sensor data to base stations while improving on existing protocols by reducing computational overhead and energy consumption through clustering and dynamic routing techniques. Evaluation of the protocols demonstrates their effectiveness compared to other secure clustering methods for wireless sensor networks.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
The document discusses wireless sensor networks and proposes improvements to address their limitations. Wireless sensor networks consist of small sensing nodes with wireless communication capabilities that are often limited by battery life. The proposed system uses hierarchical clustering to minimize energy usage and improve security and reliability of data transmissions between privileged users. Key distribution techniques and authentication of nodes and cluster heads are incorporated to securely transmit sensor data from nodes to the base station.
Ppt (secure and efficient data transmission 2)Raja Shekhar
This document proposes two secure and efficient data transmission protocols for cluster-based wireless sensor networks: SET-IBS and SET-IBOOS. SET-IBS uses identity-based digital signatures for authentication while SET-IBOOS uses identity-based online/offline digital signatures. Both protocols aim to authenticate encrypted sensor data with efficient digital signatures to maintain security and quality of service during data transmission for wireless sensor networks. The document reviews several related clustering and security protocols proposed in other literature and identifies providing secure and efficient data transmission as the problem statement.
This document summarizes a seminar on secure and efficient data transmission for cluster-based wireless sensor networks. It introduces wireless sensor networks and describes their centralized and hierarchical network architectures. It reviews previous work on the LEACH clustering protocol and its pros and cons. It then proposes two new secure transmission protocols called SET-IBS and SET-IBOOS that use identity-based signatures and offline/online signatures respectively to authenticate data transmitted between sensor nodes and cluster heads. The document analyzes the performance and security of the proposed protocols and discusses their applications and potential for future work.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Secure and efficient data transmission for cluster based wirelessSai Sirisha
This document proposes two secure data transmission protocols for cluster-based wireless sensor networks called SET-IBS and SET-IBOOS. SET-IBS relies on the Diffie-Hellman problem for security, while SET-IBOOS relies on the discrete logarithm problem. The protocols aim to securely and efficiently transmit sensor data to base stations while improving on existing protocols by reducing computational overhead and energy consumption through clustering and dynamic routing techniques. Evaluation of the protocols demonstrates their effectiveness compared to other secure clustering methods for wireless sensor networks.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
The document discusses wireless sensor networks and proposes improvements to address their limitations. Wireless sensor networks consist of small sensing nodes with wireless communication capabilities that are often limited by battery life. The proposed system uses hierarchical clustering to minimize energy usage and improve security and reliability of data transmissions between privileged users. Key distribution techniques and authentication of nodes and cluster heads are incorporated to securely transmit sensor data from nodes to the base station.
Ppt (secure and efficient data transmission 2)Raja Shekhar
This document proposes two secure and efficient data transmission protocols for cluster-based wireless sensor networks: SET-IBS and SET-IBOOS. SET-IBS uses identity-based digital signatures for authentication while SET-IBOOS uses identity-based online/offline digital signatures. Both protocols aim to authenticate encrypted sensor data with efficient digital signatures to maintain security and quality of service during data transmission for wireless sensor networks. The document reviews several related clustering and security protocols proposed in other literature and identifies providing secure and efficient data transmission as the problem statement.
This document summarizes a seminar on secure and efficient data transmission for cluster-based wireless sensor networks. It introduces wireless sensor networks and describes their centralized and hierarchical network architectures. It reviews previous work on the LEACH clustering protocol and its pros and cons. It then proposes two new secure transmission protocols called SET-IBS and SET-IBOOS that use identity-based signatures and offline/online signatures respectively to authenticate data transmitted between sensor nodes and cluster heads. The document analyzes the performance and security of the proposed protocols and discusses their applications and potential for future work.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
Wireless sensor network plays an vital role in research. clustering is introduced to enhance the performance of the WSNs. Cluster is nothing but a group of sensor nodes. Each cluster is having an one cluster head. Clusters are formed periodically, randomly and dynamically. Cluster concept introduced in wireless sensor network to increase the life cycle of sensor nodes,reduce / decrease the computational overhead and less power consumption.
IEEE base paper 2014 march go through completely for more information.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
This document proposes a lightweight searchable public key encryption (LSPE) scheme for cloud-assisted wireless sensor networks (CWSNs) to address issues with data confidentiality and energy efficiency. Existing searchable encryption schemes for CWSNs are computationally intensive and energy inefficient. The proposed LSPE scheme reduces computation costs compared to other searchable public key encryption schemes while still providing meaningful security. It constructs an LSPE based on star-like structures to achieve sub-linear search complexity. This allows keyword searches to be performed with lower energy consumption than existing schemes for CWSNs. The LSPE scheme divides the data retrieval process into setup, data collection, and data retrieval phases using algorithms like structure, encryption, and trapdoor to
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
Wireless sensor networks combine sensing, computation and communication capabilities into small sensor nodes. A wireless sensor network consists of multiple sensor nodes that communicate wirelessly to perform distributed sensing tasks. Each sensor node contains components for power, computation, sensing and communication. Security is important for wireless sensor networks due to their widespread applications and vulnerabilities like traffic analysis attacks and Sybil attacks. Common security techniques for wireless sensor networks include encryption, cryptography and access control protocols.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This is the third paper in a series of research papers exploring the history of mechanical engineering during the Ancient
Egypt era. The industry of necklaces in Ancient Egypt is investigated over seven periods of Ancient Egypt History from
Predynastic to Late Period. The paper presents samples of necklaces from the seven periods and tries to analyze each sample
showing its materials and location if known. The various designs of necklaces are outlined showing the characteristics of each
design.
The document discusses different maintenance practices for industrial electrical equipment. It describes four main types of maintenance: corrective, routine, preventive, and condition-based. It also discusses periodic, scheduled, and condition monitoring maintenance. Specific maintenance practices for batteries and identifying rotor unbalance and misalignment during condition monitoring are outlined. The document emphasizes that proper maintenance is important for maximizing equipment life and performance while minimizing downtime and failures.
strong passwords such as alphanumeric or graphical passwords. Alphanumerical passwords are not more secure
than graphical passwords. Hackers can easily guess the password with the help of tools such as dictionary attacks.
Information security is the most important factor now a days. To provide security for the cloud we are using
graphical password authentication. Graphical password is the alternative solution for alphanumeric passwords to
provide more security. Graphical password are more secure than alphanumeric passwords. It is quite difficult for the
users to remember the alphanumeric passwords. According to psychological studies the human mind can easily
capture images than alphabets or digits. In this paper we are going to give authentication to cloud services by using
graphical password authentication. We are providing an algorithm which is based on selection of username and
images as a password. In this paper we are to trying to give set of images on the basis of alphabets sequence position
of characters in username. In this paper we will access cloud services using graphical password authentication.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
Wireless sensor network plays an vital role in research. clustering is introduced to enhance the performance of the WSNs. Cluster is nothing but a group of sensor nodes. Each cluster is having an one cluster head. Clusters are formed periodically, randomly and dynamically. Cluster concept introduced in wireless sensor network to increase the life cycle of sensor nodes,reduce / decrease the computational overhead and less power consumption.
IEEE base paper 2014 march go through completely for more information.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
This document proposes a lightweight searchable public key encryption (LSPE) scheme for cloud-assisted wireless sensor networks (CWSNs) to address issues with data confidentiality and energy efficiency. Existing searchable encryption schemes for CWSNs are computationally intensive and energy inefficient. The proposed LSPE scheme reduces computation costs compared to other searchable public key encryption schemes while still providing meaningful security. It constructs an LSPE based on star-like structures to achieve sub-linear search complexity. This allows keyword searches to be performed with lower energy consumption than existing schemes for CWSNs. The LSPE scheme divides the data retrieval process into setup, data collection, and data retrieval phases using algorithms like structure, encryption, and trapdoor to
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
Wireless sensor networks combine sensing, computation and communication capabilities into small sensor nodes. A wireless sensor network consists of multiple sensor nodes that communicate wirelessly to perform distributed sensing tasks. Each sensor node contains components for power, computation, sensing and communication. Security is important for wireless sensor networks due to their widespread applications and vulnerabilities like traffic analysis attacks and Sybil attacks. Common security techniques for wireless sensor networks include encryption, cryptography and access control protocols.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This is the third paper in a series of research papers exploring the history of mechanical engineering during the Ancient
Egypt era. The industry of necklaces in Ancient Egypt is investigated over seven periods of Ancient Egypt History from
Predynastic to Late Period. The paper presents samples of necklaces from the seven periods and tries to analyze each sample
showing its materials and location if known. The various designs of necklaces are outlined showing the characteristics of each
design.
The document discusses different maintenance practices for industrial electrical equipment. It describes four main types of maintenance: corrective, routine, preventive, and condition-based. It also discusses periodic, scheduled, and condition monitoring maintenance. Specific maintenance practices for batteries and identifying rotor unbalance and misalignment during condition monitoring are outlined. The document emphasizes that proper maintenance is important for maximizing equipment life and performance while minimizing downtime and failures.
strong passwords such as alphanumeric or graphical passwords. Alphanumerical passwords are not more secure
than graphical passwords. Hackers can easily guess the password with the help of tools such as dictionary attacks.
Information security is the most important factor now a days. To provide security for the cloud we are using
graphical password authentication. Graphical password is the alternative solution for alphanumeric passwords to
provide more security. Graphical password are more secure than alphanumeric passwords. It is quite difficult for the
users to remember the alphanumeric passwords. According to psychological studies the human mind can easily
capture images than alphabets or digits. In this paper we are going to give authentication to cloud services by using
graphical password authentication. We are providing an algorithm which is based on selection of username and
images as a password. In this paper we are to trying to give set of images on the basis of alphabets sequence position
of characters in username. In this paper we will access cloud services using graphical password authentication.
A dual band inverted f
antenna operating at 2.4 GHZ and 5.2
GHZ is designed. The antenna is
designed by using Advance Design
System (ADS) and dissected by the
method of moments (MOM’s) in the
Numerical Electromagnetic Code
(NEC). The complete analysis of
antenna parameters shows the ability of
the designed antennas to operate in the
above specified bands in terms of return
loss, bandwidth, efficiency, gain and
directivity. This antenna is proposed to
obtain less return loss for multi-serving
purposes such as military and the
wireless communication. The antenna
provides a return loss of -3.675 at 2.429
GHZ and -27.906 at 5.4 GHZ
Images of different body organs play very important role in medical diagnosis. Images can be taken
by using different techniques like x-rays, gamma rays, ultrasound etc. Ultrasound images are widely used
as a diagnosis tool because of its non invasive nature and low cost. The medical images which uses the
principle of coherence suffers from speckle noise, which is multiplicative in nature. Ultrasound images are
coherent images so speckle noise is inherited in ultrasound images which occur at the time of image
acquisition. There are many factors which can degrade the quality of image but noise present in ultrasound
image is a prime factor which can negatively affect result while autonomous machine perception. In this
paper we will discuss types of noises and speckle reduction techniques. In the end, study about speckle
reduction in ultrasound of various researchers will be compared.
The dynamic nature of Information security scenario these days due to the popularity of online
businesses has posed a daunting challenge to the organizations security paradigm. Organizations are
looking for new policies to be implemented to provide the best possible security mechanism. However,
they tend to ignore the human side of the security compliance measures. Every piece of information that
has been secured using various technologically advanced policies has to be accessed ultimately by the
employees of the organization. Their attitude and commitment to safeguard the interests of the
organization plays a significant role in all measures being taken for information security. Humans and
technology has to play an integrative part in order to guarantee the safety of information assets. This paper
reviews the existing literature of information security management in a comprehensive manner focusing
on the role of top management and employers for effective security measures.
In MANET, the mobiles nodes are connected dynamically with the help of wireless links without
having a fixed infrastructure or centralized administration. These nodes move freely and organize
themselves arbitrarily thus change the network topology rapidly and unpredictably. As a result, there exits
frequent link breakages which leads to path failures and route discoveries. The route discovery can lead to
overhead which cannot be neglected. Therefore, the fundamental challenge of MANET is to develop a
dynamic routing protocol that efficiently establish routes to deliver the packets with minimum overhead,
high throughput and low end to end delay. In order to handle overhead issues, the proposed system has
presented a novel scheme rebroadcast delay and a rebroadcast probability which will help to reduce the
number of retransmissions thereby improving routing performance. In addition, the proposed system is
compared with existing routing protocol AODV in terms of packet delivery ratio, packet loss and end to
end delay
The increased trend to use websites for various purposes has also increase in different domains such
as education, health, government and business. Organizations seeking to obtain benefits from their
websites need to create and maintain websites that are successful in supporting the interaction and
communication of the organization with their users. The main goal of this paper is to design the website
evaluation framework for academic websites. For this purpose the study of academic websites, website
quality models and their quality factors. A new quality evaluation framework consisting of five high level
quality factors namely: Usability, Content, Presentation, Functionality and Reliability
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
This is ninth paper in a series of research papers exploring the history of mechanical engineering during the
Ancient Egypt era. The paper investigates the industry of pottery in Ancient Egypt over periods from Predynastic
to Old Kingdom. The paper presents samples of pottery ware and tries to analyze each sample showing its
characteristics and location if known. The designs of each pottery ware is outlined. The decorations of the pottery
ware are outlined with emphases on the innovations in the pottery industry during the studied periods. The
manufacturing technique of pottery ware is stresses from point of view of mass production.
This document discusses properties of LA-semirings where the multiplicative structure (S,.) is an anti-inverse semigroup. It proves several theorems about the structures of the additive and multiplicative semigroups in such LA-semirings. Specifically, it shows that if a LA-semiring satisfies the identity a+1=1, then (1) the additive semigroup (S,+) is anti-inverse and abelian, and (2) the sum of two anti-inverse elements is again anti-inverse. It also proves that if the multiplicative semigroup is anti-inverse, then the additive semigroup and product of elements are abelian.
A class of coupled neural networks with different internal time-delays and coupling delays is
investigated, which consists of nodes of different dimensions. By constructing suitable Lyapunov
functions and using the linear matrix inequality, the criteria of exponential stabilization for the coupled
dynamical system are established, and formulated in terms of linear matrix inequality. Finally, numerical
examples are presented to verify the feasibility and effectiveness of the proposed theoretical results.
Aco mmpecahreasn iac arlo ttaorryq uien ptruatn sshmaifsts aiodna pptreodd ufocri nagt taanch omuetpnut tt ow itthhe vraortiaarbyl ep coownetrr oslolaubrlcee scpoenende tcotreqdu teo c ah amraacitne rsihstaifcts.
This invention relates to a mechanism transferring torque from one rotating shaft to another and in particular to a
ltreavneslsm. iCssoinotnr oml eccahna nbies mut itlhizaet dw tioll aecntaivbalete a onr ednegaicnteiv oart em tohteo rc ltuot cdhe laivlseor p ocwhaenrg teo a tlhoea d paht aospet i m ruemlat tioornqsuheip a n do fs p etehde
driven eccentric masses device in order to vary the transmission output under varying load condition.
Continuous variable transmission system plays a crucial role in order to guarantee the overall vehicle
performance in different working conditions.
passSepnegceirasl. pIut rcpoonsesi sotns lionfe tbwuos tarancdkroinidg saypsptelimca tisio dnesv. eFloirpset da ptop lpicroavtiiodne tehseta rbelaisl hteims ec oinmfomrumnaitciaotnio onf bbeutswese eton
central server and bus system which is capable of providing real-time data (GPS coordinates) regarding the
current location of buses. Second application is student side application which displays the current location of the
bus on Google map along with the estimated time of arrival to the specified bus stop hence it saves the time of
students. Both the side applications provide dynamically updated timetable. Another important feature of both the
applications is emergency service through which call or alert messages can be simultaneously sent to college,
police and ambulance in case of accidents. Thus this is a cost effective, efficient system and helps students to
catch their buses at the proper time.
Industries have been a key part in the growth of a nation’s economy. The growth in industries has also lead to
the growth of tragedies in the past decades, out of which majority caused by oversight or Human errors. This paper
discusses a risk management system to detect hazardous gas leaks and the increase in temperature from the set value
(or critical temperature) using a raspberry pi, MQ6 gas sensor and DS18B20 temperature sensor. Appropriate
measures are taken by the raspberry pi such as switching on the exhaust fans, signaling alarms and alert notifications
via an android application in a smart phone, with respect to the situation to minimize the risk of life and property.
This paper presents optimization of condenser water loop in Heating, Ventilation and
Air Conditioning (HVAC) systems using Artificial Co-operative Search (ACS) algorithm. Condenser
water loop has various components like cooling tower, chiller, fans and pumps. Set points for this
optimization are air and water flow rates, supply water temperature, wet and ambient bulb temperature.
Energy cost obtained by multi objective optimization developed in this paper. ACS based approach is
based methodology is equipped for taking care of the improvement issue In Comparison with the routine
strategies, this technique can possibility of considerable decrease in the operating cost.
Life is the most precious gift to man and safeguarding this gift is of utmost importance.With
increasing number of diseases and fast paced lives, people have less time to look after themselves and
their family members or to even visit the doctor for regular check-ups.Our E-Health patient
monitoring system can remotely monitor the health of the patients and intimate the doctor of critical
conditions without human intervention. Some of the existing E-Health systems include telemedicine
network for Francophone African countries (RAFT) and LOBIN. RAFT is implemented in java and
uses asymmetric public – private key encryption, however it is expensive, does not support mobility
and is not a context aware system. LOBIN is a hardware/software platform to locate and monitor a set
of physiological parameters and context parameters of several patients within hospital facilities.
Although it is a context aware system it cannot handle high and concurrent data traffic load.
To overcome the above flaws, our proposed system puts forward an idea of patient monitoring
using various knowledge based techniques like K-means clustering, Gaussian kernel function, ANN
and Fuzzy inference engine. In our project we intend to do remote patient health monitoring in which
we will be using three-four machines which will send various sensed health parameters to the
centralised server that will make clusters of the sensed health parameters based on criticality of the
health condition. Then depending upon clusters formed and on comparison with the threshold values
appropriate reports will be generated and send to the doctors and caretakers.
Now a days Twitter has provided a way to collect and understand user’s opinions about many
private or public organizations. All these organizations are reported for the sake to create and monitor
the targeted Twitter streams to understand user’s views about the organization. Usually a user-defined
selection criteria is used to filter and construct the Targeted Twitter stream. There must be an
application to detect early crisis and response with such target stream, that require a require a good
Named Entity Recognition (NER) system for Twitter, which is able to automatically discover emerging
named entities that is potentially linked to the crisis. However, many applications suffer severely from
short nature of tweets and noise. We present a framework called HybridSeg, which easily extracts and
well preserves the linguistic meaning or context information by first splitting the tweets into
meaningful segments. The optimal segmentation of a tweet is found after the sum of stickiness score of
its candidate segment is maximized.This computed stickiness score considers the probability of
segment whether belongs to global context(i.e., being a English phrase) or belongs to local context(i.e.,
being within a batch of tweets).The framework learns from both contexts.It also has the ability to learn
from pseudo feedback. Also from the result of semantic analysis the proposed system provides with
sentiment analysis.
In day-to-day life, we come across many processes where we see the usage of heat exchangers. Some
examples where heat exchangers are extensively utilized are air conditioning plants, thermal power plants, food
processing plants etc. The basic requirement in these industries is to utilize the heat energy used in the heat
exchangers efficiently. This can be done either by developing new designs that are energy efficient or by
modifying the present designs in such a manner that they give better performance under the same working
conditions. Hence, heat exchangers that would provide more heat transfer at the minimum size and cost are
requirement of the present industries. Hence they use the various heat transfer technique for enhance the heat
transfer rate. In this paper review of research work in last decade on heat transfer enhancement.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
This document discusses techniques for secure and fast transmission of data in mobile ad hoc networks (MANETs). It proposes using identity-based cryptography with visual cryptography. For identity-based cryptography, the RSA cryptosystem is used to generate public and private keys, with Vedic mathematics adopted for fast calculations. Vedic mathematics allows for faster prime number calculations compared to modern mathematics. Visual cryptography allows images to be encrypted and decrypted by the human visual system without computation. The techniques aim to securely and efficiently transmit encrypted images and data in MANETs.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
A large share of embedded applications are wireless, which makes the communication channel especially vulnerable. The research in the field of ECC is mostly focused on its implementation on application specific systems, which have restricted resources like storage, processing speed and domain specific CPU architecture. The focus of this research is on the implementation of ECC in an embedded iOS application to compare the performance measures obtained in the wireless environment or embedded systems by using elliptic curve cryptography (ECC), with a traditional cryptosystem like RSA.
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
The document discusses key establishment techniques and cluster-based group key agreement protocols for wireless sensor networks. It reviews pairwise keying, clustering, and how integrating the two can provide security. Several cluster-based group key agreement protocols are described, including HKAP, GKA-CH, PB-GKA-HGM, and AP-1 and AP-2. These protocols establish cluster and group keys using different hierarchical structures and key agreement methods. The document concludes by comparing the protocols based on their topology and structure.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Enhancing the Techniques to Secure Grid Computingijtsrd
Security is important issue in every aspect in todays world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user cant breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Simranjeet Kaur"Enhancing the Techniques to Secure Grid Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2531.pdf http://www.ijtsrd.com/computer-science/computer-network/2531/enhancing-the-techniques-to-secure-grid-computing/simranjeet-kaur
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of
messages, battery exhausting, and nodes compromising. While most of these attacks can be
dealt with through cryptographic security protocols provided by key management schemes,
there are always a few that manage to really cause problems. One such attack that is most
common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture
and compromise some nodes and inject them into several locations throughout the network in
order to conduct other types of attacks. Moreover, if this attack is not detected early, then these
replicated injected nodes will consume a large amount of the network resources. In this paper,
we analyze several key management schemes that can be used for checking integrity and
preventing cloning attacks. After analyzing the problems associated with these schemes, we
propose a model that allows us to distinguish between legitimate nodes and cloned nodes in
such sensor networks.
Similar to [IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. Jenifer (20)
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
This document reviews the behavior of reinforced concrete deep beams. Deep beams are defined as having a shear span to depth ratio of less than 5. The response of deep beams differs from regular beams due to the influence of shear deformations and stresses. Failure modes include flexure, flexural-shear, and diagonal cracking. Previous studies investigated factors affecting shear strength such as concrete strength, reinforcement, and loading conditions. Equations have been proposed to predict shear strength based on test results.
Subcutaneous administration of toluene to rabbits for 6 weeks resulted in significant increases in liver enzyme levels and histopathological changes in the liver tissue. Liver sections from toluene-treated rabbits showed congested central veins, flattening and vacuolation of hepatocytes, and disarrangement of hepatic architecture. In contrast, liver sections from control rabbits appeared normal. Toluene exposure is known to cause oxidative stress and damage cell membranes in the liver through its metabolism.
This document summarizes a research paper that proposes a system to analyze crop phenology (growth stages) using IoT to support parallel agriculture management. The system would use sensors to collect data on soil moisture, temperature, humidity and other parameters. This data would be input to a database. Then, a multiple linear regression model trained on past data would predict the optimal crop and expected yield based on the tested sensor data and parameters. This system aims to help farmers select crops and fertilization practices tailored to their specific fields' conditions.
This document summarizes a study that determined the liberation size of gold ore from the Iperindo-Ilesha deposit in Nigeria and assessed its amenability to froth flotation. Samples of the ore were collected and subjected to sieve analysis to determine particle size fractions. Chemical analysis found that the actual and economic liberation sizes were 45μm and 250μm, respectively. Froth flotation experiments at 45μm particle size and varying collector dosages achieved a maximum gold recovery of 78.93% at 0.3 mol/dm3 collector dosage, with concentrate grade of 115 ppm Au. These parameters will be used for further processing to extract gold from this deposit.
This document presents a proposal for an IOT-based intelligent baby care system with a web application for remote baby monitoring. The system uses sensors to automatically swing a cradle when a baby cries, sound alarms if the baby cries for too long or the mattress is wet, and sends alerts to a web page for parents to monitor the baby's status from anywhere via internet connection. The proposed system aims to help working parents manage childcare remotely using sensors, a Raspberry Pi, web camera, and cloud server to detect the baby's activities and notify parents through a web application on their phone.
This document discusses various sources of water pollution and new techniques being developed for water purification. It begins by outlining how water pollution occurs from industrial wastes like mining and manufacturing, agricultural runoff containing pesticides, and domestic waste. It then examines some specific pollutants in more depth from these sources. New techniques under research for water purification are also mentioned, with the goal of developing more affordable methods. The document aims to analyze the impact of pollutants on water and introduce promising new purification techniques.
This document summarizes a research paper on using big data methodologies with IoT and its applications. It discusses how big data analytics is being used across various fields like engineering, data management, and more. It also discusses how IoT enables the collection of massive amounts of data from sensors and devices. Machine learning techniques are used to analyze this big data from IoT and enable communication between devices. The document provides examples of domains where big data and IoT are being applied, such as healthcare, energy, transportation, and others. It analyzes the similarities and differences in how big data techniques are used across these IoT domains.
The document describes a proposed smart library automation and monitoring system using RFID technology. The system uses RFID tags attached to books and student ID cards. An RFID scanner reads the tags to automate processes like tracking student entry and exit, book check-in/check-out, and inventory management. This allows transactions to occur without manual intervention. The system also includes an Android app for students to search books and check availability. The goals are to streamline library operations, prevent unauthorized access, and help locate misplaced books. Raspberry Pi hardware and a MySQL database are part of the proposed implementation.
This document discusses congestion control techniques for vehicular ad hoc networks (VANETs). It first provides background on VANETs, noting their use of vehicle-to-vehicle communication to share information. Congestion can occur when there is a sudden increase in data from nodes in the network. The document then reviews different existing congestion control schemes, which vary in how they adjust source sending rates and handle transient congestion. It proposes a priority-based congestion control technique using dual queues, one for transit packets and one for locally generated packets. This approach aims to route packets along less congested paths when congestion is detected based on buffer occupancy.
This document summarizes a research paper that proposes applying principles of Vedic mathematics to optimize the design of multipliers, squarers, and cubers. It begins by providing background on multipliers and their importance in electronic systems. It then reviews related work applying Vedic mathematics to multiplier design. The document outlines the methodology for performing multiplication, squaring, and cubing according to Vedic mathematics principles. It presents simulation and synthesis results comparing the proposed Vedic designs to traditional array-based designs, finding improvements in speed, power, and area. The document concludes that Vedic mathematics provides an effective approach for optimizing the design of these fundamental arithmetic components.
Cloud computing is the one of the emerging techniques to process the big data. Large collection of set or large
volume of data is known as big data. Processing of big data (MRI images and DICOM images) normally takes
more time compare with other data. The main tasks such as handling big data can be solved by using the concepts
of hadoop. Enhancing the hadoop concept it will help the user to process the large set of images or data. The
Advanced Hadoop Distributed File System (AHDF) and MapReduce are the two default main functions which
are used to enhance hadoop. HDF method is a hadoop file storing system, which is used for storing and retrieving
the data. MapReduce is the combinations of two functions namely maps and reduce. Map is the process of
splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, in medical fields
the experienced problems like machine failure and fault tolerance while processing the result for the scanned
data. A unique optimized time scheduling algorithm, called Advanced Dynamic Handover Reduce Function
(ADHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud introduction of
ADHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in
error percentage of the output image
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Colorectal cancer (CRC) has potential to spread within the peritoneal cavity, and this transcoelomic
dissemination is termed “peritoneal metastases” (PM).The aim of this article was to summarise the current
evidence regarding CRC patients at high risk of PM. Colorectal cancer is the second most common cause of cancer
death in the UK. Prompt investigation of suspicious symptoms is important, but there is increasing evidence that
screening for the disease can produce significant reductions in mortality.High quality surgery is of paramount
importance in achieving good outcomes, particularly in rectal cancer, but adjuvant radiotherapy and chemotherapy
have important parts to play. The treatment of advanced disease is still essentially palliative, although surgery for
limited hepatic metastases may be curative in a small proportion of patients.
This document summarizes a research paper on the thermal performance of air conditioners using nanofluids compared to base fluids. Key points:
- Nanofluids, which are liquids containing nanoparticles, can improve heat transfer in heat pipes and cooling systems due to their higher thermal conductivity compared to base fluids.
- The document reviews how factors like nanofluid type, nanoparticle size and concentration affect thermal efficiency and heat transfer limits. It also examines using nanofluids to enhance heat exchange in transmission fluids.
- An experimental setup is described to study heat transfer and friction factors of water-based Al2O3 nanofluids in a horizontal tube under constant heat flux. Temperature, pressure and flow rate are measured
Now-a-day’s pedal powered grinding machine is used only for grinding purpose. Also, it requires lots of efforts
and limited for single application use. Another problem in existing model is that it consumed more time and also has
lower efficiency. Our aim is to design a human powered grinding machine which can also be used for many purposes
like pumping, grinding, washing, cutting, etc. it can carry water to a height 8 meter and produces 4 ampere of electricity
in most effective way. The system is also useful for the health conscious work out purpose. The purpose of this technical
study is to increase the performance and output capacity of pedal powered grinding machine.
This document summarizes a research paper that proposes using distributed control of multiple energy storage units (ESUs) to manage voltage and loading in electric distribution networks with renewable energy sources like solar and wind. The distributed control approach coordinates the ESUs to store excess power generated during peak periods and discharge it during peak load periods. Each ESU can provide both active and reactive power to support voltage and manage power flows. The distributed control strategy uses a consensus algorithm to divide the required active power reduction equally among ESUs based on their available capacity. Simulation results are presented to analyze the coordinated control of ESU active and reactive power outputs over time.
The steady increase in non-linear loads on the power supply network such as, AC variable speed drives,
DC variable Speed drives, UPS, Inverter and SMPS raises issues about power quality and reliability. In this
subject, attention has been focused on harmonics . Harmonics overload the power system network and cause
reliability problems on equipment and system and also waste energy. Passive and active harmonic filters are
used to mitigate harmonic problems. The use of both active and passive filter is justified to mitigate the
harmonics. The difficulty for practicing engineers is to select and deploy correct harmonic filters , This paper
explains which solutions are suitable when it comes to choosing active and passive harmonic filters and also
explains the mistakes need to be avoided.
This Paper is aimed at analyzing the few important Power System equipment failures generally
occurring in the Industrial Power Distribution system. Many such general problems if not resolved it may
lead to huge production stoppage and unforeseen equipment damages. We can improve the reliability of
Power system by simply applying the problem solving tool for every case study and finding out the root cause
of the problem, validation of root cause and elimination by corrective measures. This problem solving
approach to be practiced by every day to improve the power system reliability. This paper will throw the light
and will be a guide for the Practicing Electrical Engineers to find out the solution for every problem which
they come across in their day to day maintenance activity.
More from IJET - International Journal of Engineering and Techniques (20)
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Road construction is not as easy as it seems to be, it includes various steps and it starts with its designing and
structure including the traffic volume consideration. Then base layer is done by bulldozers and levelers and after
base surface coating has to be done. For giving road a smooth surface with flexibility, Asphalt concrete is used.
Asphalt requires an aggregate sub base material layer, and then a base layer to be put into first place. Asphalt road
construction is formulated to support the heavy traffic load and climatic conditions. It is 100% recyclable and
saving non renewable natural resources.
With the advancement of technology, Asphalt technology gives assurance about the good drainage system and with
skid resistance it can be used where safety is necessary such as outsidethe schools.
The largest use of Asphalt is for making asphalt concrete for road surfaces. It is widely used in airports around the
world due to the sturdiness and ability to be repaired quickly, it is widely used for runways dedicated to aircraft
landing and taking off. Asphalt is normally stored and transported at 150’C or 300’F temperature
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. Jenifer
1. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 133
An Optimal Approach for Secure and Energy Efficient Data
Transfer in WSN using Hierarchical and Dynamic Elliptic
Curve Cryptosystem
O. Sheela1, T. Samraj Lawrence2
, V. Perathu Selvi3
, P. Jenifer4
1PG Student, 2, 3, 4 Assistant Professor
1, 2, 3, 4 Department Of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli.
----------------------------------------************************----------------------------
Abstract:
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
Keywords - Elliptic Curve Cryptography, LEACH Protocol, Wireless Sensor Network,
Hierarchical Cluster, Data Protection, Public-Key Cryptosystem.
----------------------------------------************************----------------------------
I. INTRODUCTION
Wireless sensor networks (WSNs)
comprise a large number of spatially
distributed small autonomous devices
(called sensor nodes) cooperatively
monitoring environmental conditions and
sending the collected data to a command
center using wireless channels [1]. Because
of the size and cost of sensor nodes there is a
constraint on energy, memory, computation
speed and bandwidth. Most of the
applications of WSN needs secure
communication.
Because of the absence of the physical
protection and the unattended deployment
wireless communication and sensor nodes
are prone to different type of attacks such as:
impersonation, masquerading, spoofing and
interception etc. Hence, a security
RESEARCH ARTICLE OPEN ACCESS
2. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 134
mechanism in WSN is an important concern.
Different security mechanisms in WSN are
described in [2] and [3].
For implementing key management
in WSN, it is important to select appropriate
cryptographic methods. The constraints of
sensor nodes in WSNs should meet by the
Cryptographic methods. These
cryptographic methods could be evaluated
by size of the code, size of the data, time
taken for processing, and consumption of
the power by the sensor nodes. Security
mechanisms can be implemented by using
public key cryptography or symmetric key
cryptography. Most important public key
algorithms include RSA, and Elliptic Curve
Cryptography (ECC).
In RSA to implement security
operations thousands of multiplication
instructions are performed, which is time
consuming. It was found that encryption and
decryption operations in RSA usually take
on the order of tens of seconds. Recent
studies have shown that it is possible to
apply public key cryptography to sensor
networks by selecting proper algorithms and
associated parameters. Most of the literature
studies give emphasis on RSA and ECC
algorithms. Researchers are more attracted
towards ECC, because it provides same
level of security with much smaller key size.
For example, RSA with 1024 bit key
provides a valid level of security whereas
ECC with 160 bit key provides same level of
security. The operation of the RSA private
key limits its use in sensor nodes. ECC has
no such problem because both the private
key and public key operation use the same
point multiplication operations.
II. RELATED WORKS
Haythem Hayouni, Mohamed
Hamdi, Tai-Hoon Kim discussed about
Encryption Schemes in Wireless Sensor
Networks. As Wireless Sensor Networks
(WSN) continues to grow, the need for
effective security mechanisms is an
important factor that must be considered.
Improving the efficiency of these networks
requires more security to provide
confidentiality, integrity and authenticity of
the data transfer through the network. One
of the most common tools used to provide
security services for WSN is Encryption.
Many researches has been carried out in the
field of encryption algorithms in WSNs.
Protocols, algorithms and implementation
consist the main aspects the security
specialist should consider to assess the
efficiency of the protection approaches [4].
The Rivest-Shamir-Adleman (RSA)-
based public key solution is also used to
protect data privacy [5]. However, few
works can provide solutions for strong data
confidentiality and low message overhead
simultaneously.
Kristin Lauter [6] discussed about
the Elliptic curve cryptography’s advantages
for Wireless security. It gives an overview
of elliptic curves and their use in
cryptography. The focus is on the
performance advantages by using elliptic
curve cryptography to be obtained in the
wireless environment instead of a traditional
cryptosystem like RSA. Specific
applications to secure messaging and
identity-based encryption are also discussed.
Besides, to keep the privacy of data,
other research focuses on encryption
algorithms, including attribute-based
encryption [10], fuzzy attribute-based
signcryption [11].
3. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 135
In [7], Kamlesh Gupta, Sanjay
Silakari discusses about Elliptic Curve
Cryptography over RSA for Asymmetric
Encryption. To transmit the data securely
cryptography is used in open network.
Elliptic Curve Cryptography is compared to
RSA and discrete logarithm systems, and is
a better option for the future. For this reason
Elliptic Curve Cryptography is such a good
choice for doing public key cryptography in
portable devices right now. The smaller
Elliptic Curve Cryptography keys it turn
makes the cryptographic operations that
must be performing by the communicating
devices to be embedded into significantly
smaller hardware, so that the software
applications may complete the cryptographic
operations with fewer processor cycles. And
also operations can be performed much
faster, while still retaining equivalent
security. This means, Elliptic Curve
Cryptography, reduced the power
consumptions, consumed less space on the
printed circuit board, and the software
applications that run more frequently make
lower memory demands. In brief, for
communication using smaller devices and
asymmetric cryptosystem, Elliptic Curve
Cryptography is needed.
Ramesh K and Somasundaram K
discussed about cluster head Selection
algorithms in Wireless Sensor Network
sensor nodes. In Wireless Sensor Network,
life time of the sensor node is the most
critical parameter. Many researches on these
lifetime extension are motivated by Low
Energy Adaptive Clustering Hierarchy
scheme, which by allowing rotation of
cluster head role among the sensor nodes
tries to distribute the energy consumption
over all nodes in the network. Selection of
cluster head for such rotation greatly
improves the energy efficiency of the
network [8].
Most important public key
algorithms include RSA, and Elliptic Curve
Cryptography (ECC). In RSA to implement
security operations thousands of
multiplication instructions are performed,
which is time consuming. It was found that
encryption and decryption operations in
RSA usually take on the order of tens of
seconds [9].
The Rivest-Shamir-Adleman (RSA)-
based Public key solution is also used to
protect data privacy [12]. However, few
works can provide solutions for strong data
confidentiality and low message overhead
simultaneously. Cluster hierarchy is highly
flexible and easily managed because of its
great extensibility for large scale sensor
networks [13].
In the existing system, the security of
the data communication is provided through
RSA. RSA is a public key cryptography.
The data is encrypted using the public key
and it is decrypted using the private key. It
uses 1024 bit key. Data are directly sent and
received through the Gateway. Each data
element is encrypted and only the users with
the appropriate decryption keys can decrypt
the data. It is a centralized architecture. The
main disadvantage of the existing system is
message overhead occurred due to
centralized architecture. Since RSA uses
1024 bit key, it needs high energy for
computation.
III. HIERARCHICAL AND
DYNAMIC ELLIPTIC CURVE
CRYPTOSYSTEM FOR DATA
TRANSFER
In the proposed system, Hierarchical
Public-Key Cryptosystem is used. To
overcome message overhead, Hierarchical
structure is proposed. Hierarchical and
Dynamic Elliptic Curve Cryptosystem
4. International Journal of Computer Techniques
ISSN: 2394-2231
(HiDE) provides a hierarchical cluster
architecture consisting of a Backbone
Network and several Area Clus
Backbone Network is formed by connect
together many Gateways. Sensor Nodes in
the WSN are group together based on area to
form an Area Cluster (AC). Area Cluster
consists of Cluster Head (CH), Sensor
Nodes and the Gateway.
structure consists of Source Node, Cluster
Head, and Gateway.
Figure 1 System Architecture
Each Area Cluster is Hierarchical.
energy efficient data transmission, Low
Energy Adaptive Clustering Hierarchy
(LEACH) is used to select the Cluster Head
dynamically.
The Cluster Head collects the data
from the Source Node and transmit it to the
Destination through the Gateway (GW) in
the Backbone Network. Key management
includes key computation, key exchanges,
data encryption and decryption.
The system architecture is s
Figure 1. The encrypted data from the
source is gathering by the Cluster Head, one
of the nodes in the Area Cluster. And the
Cluster Head transmit the data to the
Gateway. In the Gateway the data is again
encrypted. The double encrypted data is
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
2231 http://www.ijctjournal.org
archical cluster-based
consisting of a Backbone
Network and several Area Clusters.
formed by connect
. Sensor Nodes in
the WSN are group together based on area to
form an Area Cluster (AC). Area Cluster
consists of Cluster Head (CH), Sensor
Hierarchical
ists of Source Node, Cluster
gure 1 System Architecture
Each Area Cluster is Hierarchical. For
energy efficient data transmission, Low
Energy Adaptive Clustering Hierarchy
(LEACH) is used to select the Cluster Head
Cluster Head collects the data
from the Source Node and transmit it to the
Destination through the Gateway (GW) in
Key management
computation, key exchanges,
The system architecture is shown in
The encrypted data from the
source is gathering by the Cluster Head, one
of the nodes in the Area Cluster. And the
Cluster Head transmit the data to the
Gateway. In the Gateway the data is again
encrypted. The double encrypted data is
passed through the Backbone Network to the
destination.
In the destination Area Cluster the
data gets decrypted in the Gateway and
transmit to the destination node through the
Cluster Head. In destination again the date
gets decrypted to get the original
Encryption and decryption process is done
using Elliptic Curve Cryptography.
Dynamic Cluster Head selection is done
using LEACH mechanism.
The system implementation is done
in three processes: Cluster Head Selection,
Node Verification, Encryption Pro
Decryption Process.
A. Cluster Head Selection
First, the Cluster Head for both
Source and Destination Area Cluster is
selected by using the Low Energy Adaptive
Clustering Hierarchy (LEACH) mechanism.
By using LEACH protocol, Cluster Head is
selected dynamically. Sometimes the Source
Node or the Destination Node itself acts as
the Cluster Head. By LEACH, threshold
value of the each node is calculated.
The threshold function is defined as
T (n) =
0
Where n is the given node, p
priori probability of a node being elected as
a Cluster Head, r is the current round
number and G is the set of nodes that have
not been elected as Cluster Heads in the last
1/p rounds. Each node during Cluster Head
selection will generate a random number
between 0 and 1. If the number is less than
the threshold (T (n)), the node will become a
Cluster Head.
Apr 2016
Page 136
sed through the Backbone Network to the
In the destination Area Cluster the
data gets decrypted in the Gateway and
transmit to the destination node through the
Cluster Head. In destination again the date
gets decrypted to get the original data.
Encryption and decryption process is done
using Elliptic Curve Cryptography.
Dynamic Cluster Head selection is done
The system implementation is done
Cluster Head Selection,
Encryption Process, and
Cluster Head Selection
Cluster Head for both
Source and Destination Area Cluster is
selected by using the Low Energy Adaptive
Clustering Hierarchy (LEACH) mechanism.
, Cluster Head is
d dynamically. Sometimes the Source
Node or the Destination Node itself acts as
By LEACH, threshold
value of the each node is calculated.
The threshold function is defined as
∈
Where n is the given node, p is the a
priori probability of a node being elected as
a Cluster Head, r is the current round
he set of nodes that have
as Cluster Heads in the last
rounds. Each node during Cluster Head
selection will generate a random number
between 0 and 1. If the number is less than
the threshold (T (n)), the node will become a
5. International Journal of Computer Techniques
ISSN: 2394-2231
B. Node Verification
Since it is the distributed environment,
during its deployment each node is provided
with the certification. All the nodes in the
Area Cluster have the certificate of their
Cluster Member. After Cluster Head
Selection, the Cluster Head compares the
certificate of each Cluster Member. If all the
certificates are matched then the nodes in
the Area Cluster is an authenticated.
Suppose if any of the node’s certificate is
wrongly matched then it is considered as the
malicious node.
C. Encryption Process
The data is first encrypted in the
source using the public key of the sender
using Elliptic Curve Cryptography. Cluster
Head (CH) collects the encrypted data from
the source and transmits to the Gateway. In
Gateway (GW) forwarded the encrypted
data to the destination Gateway.
Figure 2 Encryption/Decryption Process
D. Decryption Process
The Gateway of the d
Cluster forward the data to the Cluster Head
Then the Cluster Head gather the data from
the Gateway. Cluster Head tr
encrypted data to the destination. In
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
2231 http://www.ijctjournal.org
Since it is the distributed environment,
during its deployment each node is provided
with the certification. All the nodes in the
Area Cluster have the certificate of their
Cluster Member. After Cluster Head
compares the
certificate of each Cluster Member. If all the
certificates are matched then the nodes in
the Area Cluster is an authenticated.
Suppose if any of the node’s certificate is
wrongly matched then it is considered as the
The data is first encrypted in the
source using the public key of the sender
using Elliptic Curve Cryptography. Cluster
Head (CH) collects the encrypted data from
e Gateway. In
the encrypted
Figure 2 Encryption/Decryption Process
The Gateway of the destination
Cluster forward the data to the Cluster Head.
Cluster Head gather the data from
the Gateway. Cluster Head transmits the
encrypted data to the destination. In
destination, the encrypted data is decrypted
using the receiver private key. The Cluster
Head is automatically changed during the
data transmission. Figure 2 shows the
encryption and decryption process of t
data using Elliptic Curve Cryptography.
Encryption/Decryption Algorithm:
Elliptic curve cryptography
approach to asymmetric cryptography
on the algebraic structure of
curves over finite fields. Every user has a
public and a private key. Public key is used
for encryption/signature verification. Private
Key is used for decryption/signature
generation. The sender will be encrypting
the message with receiver’s public
the receiver will decrypt its private key.
Let A be a sender node that sent a
message ‘Msg’ to the receiver node B. Let
Gateway Ga is the Gateway in the sender
Area Cluster and Gb is the Gateway in the
receiver Area Cluster. Let Pu
Public Key of A and B. Let Pr
Private key of A and B. Every nodes can
have their own private key. Suppose
message is sent from A to B through G
Randomly select ‘k’ from 1 to (n
the number of nodes. ‘P’ is a point on the
Elliptic Curve
y2
=x3
+ ax + b
The public key is calculated by
Pua = k * P
Pub = k * P
The message Msg is first encrypted
by A using its the pubic key.
C1= k * P
C2= Msg + k * P
C1 and C2 are the Ciper Text of A. Again
the C1 and C2 are encrypted in G
Public key using ECC algorithm. Now the
C1 and C2 are sent to the receiver Gateway
in the Backbone Network.
In Gb decryption is done using ECC
algorithm by using its Private Key. Now the
Apr 2016
Page 137
destination, the encrypted data is decrypted
using the receiver private key. The Cluster
Head is automatically changed during the
data transmission. Figure 2 shows the
encryption and decryption process of the
tic Curve Cryptography.
Encryption/Decryption Algorithm:
cryptography is an
cryptography based
on the algebraic structure of elliptic
Every user has a
key. Public key is used
for encryption/signature verification. Private
Key is used for decryption/signature
The sender will be encrypting
receiver’s public key and
the receiver will decrypt its private key.
sender node that sent a
’ to the receiver node B. Let
is the Gateway in the sender
is the Gateway in the
receiver Area Cluster. Let Pua, Pub are the
Public Key of A and B. Let Pra, Prb be the
B. Every nodes can
have their own private key. Suppose
message is sent from A to B through Ga, Gb.
Randomly select ‘k’ from 1 to (n-1). ‘n’ be
the number of nodes. ‘P’ is a point on the
The public key is calculated by
is first encrypted
by A using its the pubic key.
are the Ciper Text of A. Again
are encrypted in Ga by its
Public key using ECC algorithm. Now the
the receiver Gateway
decryption is done using ECC
algorithm by using its Private Key. Now the
6. International Journal of Computer Techniques
ISSN: 2394-2231
Encrypted message is decrypted using the
Private Key Prb in the receiver node B by
the below formula
Msg=C2 – Prb * C1
Thus the original message M is get
by the node B. For key exchange, Diffie
Hellman Key exchange algorithm is used.
IV RESULTS
For network and computation
performance analysis, we evaluate
in the famous network simulator, ns2
nodes are group together to form 7
Each has a Gateway. Cluster Head for both
the source and destination Area Cluster is
selected by using the LEACH protocol
After the Cluster Head Selection process the
Node is verified by checking whether t
certificate of each node in the Source and
Destination Area Cluster is same. If the
Certificate are same then the node is
considered as the authenticated node
shown in the Figure 3.
Figure 3 Cluster Head Selection
Verification
The data send by the sender is first
encrypted using ECC. Then it can be
collected by the Cluster Head in the Area
Cluster. It can be send to the Gateway
(GW). The data is again encrypted in GW
using ECC for the second time as
Figure 4.
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
2231 http://www.ijctjournal.org
Encrypted message is decrypted using the
in the receiver node B by
original message M is get
For key exchange, Diffie
Hellman Key exchange algorithm is used.
For network and computation
performance analysis, we evaluate the HiDE
famous network simulator, ns2. 50
nodes are group together to form 7 clusters.
Cluster Head for both
the source and destination Area Cluster is
selected by using the LEACH protocol.
After the Cluster Head Selection process the
Node is verified by checking whether the
certificate of each node in the Source and
Destination Area Cluster is same. If the
Certificate are same then the node is
considered as the authenticated node as
Figure 3 Cluster Head Selection and Node
The data send by the sender is first
encrypted using ECC. Then it can be
collected by the Cluster Head in the Area
Cluster. It can be send to the Gateway
(GW). The data is again encrypted in GW
using ECC for the second time as shown in
Figure 4 Encryption Process
The Destination Area Cluster
receives data through the Gateway which is
connected to the Backbone
dynamically selected Cluster Head receives
the data from the Gateway and transmit it to
the receiver. The data get
ECC is received by the receiver as shown in
the Figure 5.
Figure 5 Decryption Process
The packet delivery ratio of the data
encryption using both the e
the proposed HiDE is shown in the Figure 6
It shows that the packet delivery rate of data
is more in ECC than the RSA.
In Figure 7, the comparison of the
throughput of both RSA and
Apr 2016
Page 138
Process using ECC
The Destination Area Cluster
receives data through the Gateway which is
connected to the Backbone Network. The
ected Cluster Head receives
the data from the Gateway and transmit it to
the receiver. The data get decrypted using
eceiver as shown in
Figure 5 Decryption Process using ECC
The packet delivery ratio of the data
encryption using both the existing RSA and
is shown in the Figure 6.
packet delivery rate of data
is more in ECC than the RSA.
, the comparison of the
ut of both RSA and HiDE
7. International Journal of Computer Techniques
ISSN: 2394-2231
Figure 6 Comparison of Packet Delivery
Figure 7 Comparison of Throughput
Graph
is shown as graph. It shows that the
throughput is high for ECC than the RSA
algorithm used for encryption and
decryption of data.
Figure 9 Energy Consumption
comparison Graph
Figure 9 shows the comparison of the
existing RSA and the proposed HiDE
consumption graph.
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
2231 http://www.ijctjournal.org
Comparison of Packet Delivery
Comparison of Throughput
is shown as graph. It shows that the
throughput is high for ECC than the RSA
algorithm used for encryption and
Figure 9 Energy Consumption
Figure 9 shows the comparison of the
HiDE energy
V CONCLUSION
In the proposed system, security for
the data transmission is provided using
Elliptic Curve Cryptography (ECC) which
provides high security than the traditional
RSA with smaller key size.
transfers the data is also verified by usin
the certificates. Computation is also less
because the use of the ECC with smaller key
size. Energy need for computation is also
less, which lead to low energy consumption
in sensor nodes. Simulation results shows
that the proposed system provide high
security, low computational complexity than
the existing RSA. Thus, the Cluster based
Cryptographic mechanism;
Energy Efficient Hierarchical
Elliptic Curve Cryptosystem
high security for data transmission and it is
also highly energy efficient.
VI REFERENCES
[1] Junqi Zhang,Vijay Varadharajan
"Wireless sensor network key
management survey and taxonomy";
Journal of Network and Computer
Applications, vol. 33, pp.63
[2] X Chen, K Makki, K Yen and N
Pissinou; "Sensor Network Security: A
Survey";IEEE communication survey
and tutorials, vol. 11, pp. 52
[3] Yong Wang, Garhan Attebury, Byrav
Ramamurthy; "A Survey of Security
Issues In Wireless Sensor Networks",
IEEE Communications Surveys and
Tutorials, volume 8, pp.
quarter 2006.
[4] Haythem Hayouni, Moham
and Tai-Hoon Kim, ‘
Encryption Schemes inWireless Sensor
Networks’ 7th International
Conference on Advanced Software
Engineering & Its Applications
Apr 2016
Page 139
In the proposed system, security for
the data transmission is provided using
Elliptic Curve Cryptography (ECC) which
provides high security than the traditional
RSA with smaller key size. Each node that
the data is also verified by using
Computation is also less
because the use of the ECC with smaller key
size. Energy need for computation is also
less, which lead to low energy consumption
Simulation results shows
that the proposed system provide high
ecurity, low computational complexity than
Thus, the Cluster based
Cryptographic mechanism; Secure and
Hierarchical and Dynamic
Elliptic Curve Cryptosystem (HiDE) provide
high security for data transmission and it is
highly energy efficient.
i Zhang,Vijay Varadharajan,
"Wireless sensor network key
management survey and taxonomy";
Journal of Network and Computer
Applications, vol. 33, pp.63-75, 2010.
X Chen, K Makki, K Yen and N
Network Security: A
Survey";IEEE communication survey
and tutorials, vol. 11, pp. 52-73, 2009.
Yong Wang, Garhan Attebury, Byrav
Ramamurthy; "A Survey of Security
Issues In Wireless Sensor Networks",
IEEE Communications Surveys and
Tutorials, volume 8, pp. 2-23, 2nd
Haythem Hayouni, Mohamed Hamdi
, ‘A Survey on
Encryption Schemes inWireless Sensor
’ 7th International
Conference on Advanced Software
Engineering & Its Applications, 2014.
8. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar- Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 140
[5] Soufiene Ben Othman, Abdelbasset
Trad and Habib Youssef,
‘Performance Evaluation Of Encryption
Algorithm For Wireless Sensor
Networks’, International Conference on
Information Technology and e-Services,
2012.
[6] Lauter K, ‘The advantages of elliptic
curve cryptography for wireless
security’, IEEE Wireless Commun.,
Vol. 11, No. 1, pp. 62–67, 2004.
[7] Kamlesh Gupta and Sanjay Silakari,
‘ECC over RSA for Asymmetric
Encryption: A Review’, IJCSI
International Journal of Computer
Science Issues, Vol. 8, Issue 3, No. 2,
2011.
[8] Ramesh K. and Somasundaram K. , ‘A
comparative study of clusterhead
selection algorithms in wireless sensor
networks’, International Journal of
Computer Science & Engineering
Survey (IJCSES) Vol.2, No.4, 2011.
[9] D. W. Carman, P. S. Kruus, and B. J.
Matt, "Constraints and Approaches for
Distributed Sensor Network Security",
NAI Labs, Tech. Report 00-010, 2000.
[10]S. Yu, K. Ren, and W. Lou, “FDAC:
Toward fine-grained distributed data
access control in wireless sensor
networks,” IEEE Trans. Parallel Distrib.
Syst., Vol. 22, No. 4, pp. 673–686,
2011.
[11]C. Hu, N. Zhang, H. Li, X. Cheng, and
X. Liao, “Body Area network security:
A fuzzy attribute-based signcryption
scheme,” IEEE J. Select. Areas
Commun. (JSAC), Vol. 31, No. 9, pp.
37–46, 2013.
[12]I. Maglogiannis, L. Kazatzopoulos, K.
Delakouridis, and S. Hadjiefthymiades,
“Enabling location privacy and medical
data encryption in patient
telemonitoring systems,” IEEE Trans.
Inf. Technol. Biomed., Vol. 13, No. 6,
pp. 946–954, 2009.
[13]Y. Cheng and D. Agrawal, “An
improved key distribution mechanism
for large-scale hierarchical wireless
sensor networks,” Ad Hoc Netw., Vol.
5, No. 1, pp. 35–48, 2007.
[14]Chin yang Henry Tseng, Shiau-Huey
Wang, and Woei-Jiunn Tsaur,
‘Hierarchical and Dynamic Elliptic
Curve Cryptosystem Based Self-
Certified Public Key Scheme for
Medical Data Protection’, IEEE
Transactions on Reliability, Vol. 64,
No. 3, 2015.