Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
Replication of attacks in a wireless sensor network using ns2eSAT Journals
Abstract A Wireless Sensor Network (WSN) comprises of sovereign sensor devices that are used to supervise physical and environmental conditions like temperature and pressure. The WSN is built of hundreds and thousands of recognizing stations called nodes, where each node consists of one or more sensors having a radio transceiver, an internal/external antenna, a microcontroller and a battery. Wireless sensor networks are the systems that are used to communicate by sensing the behavioral changes and the sensing nodes will collect the data and it will get handled. After data handling, the data will be sent to the receiver. The wireless sensor networks have to be fortified from network attacks especially at unfavorable situations because data can easily be obtained by the attackers. There are also some security protocols being implemented in sensor networks. There are some limitations in a wireless sensor network like they have limited storage capacity, limited capability of processing and limited energy to transmit data. These drawbacks can make wireless sensor network different from other networks. The imitation of the attacks are done in the NS2 simulator. By imitating, the performance of the network can be monitored. Keywords: Network Security, Wireless, Sensor, Internet, System Security, Simulator, NS2, Simulation of attacks.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
Key management techniques in wireless sensor networksIJNSA Journal
The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expectedproblems in one of these schemes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
1. O documento descreve um projeto de uma turbina eólica de eixo vertical para aplicação em meio urbano. Inclui análise aerodinâmica, resultados de cálculo de coeficientes de potência e projeto estrutural da turbina.
2. A análise aerodinâmica usa modelos matemáticos para calcular coeficientes de potência variando a velocidade de rotação e fator de bloqueamento, e estuda perfis multi-elementos usando o Javafoil.
3. Inclui também projeto
Dokumen tersebut memberikan penjelasan tentang cara mengatur format tabel HTML dengan menambahkan border, mengatur lebar dan tinggi tabel, mengatur jarak antar kolom dan baris menggunakan cellpadding dan cellspacing, serta memberikan judul pada tabel.
This unclassified briefing document provides a hypothetical example of classification levels and discusses a fictitious problem where basic addition is not working as expected. It presents a made-up problem statement where 5 + 5 does not equal 10 and humorously suggests possible causes such as dark matter, chicken, and characters from science fiction, with a hypothesis that addition was broken by faster-than-light particles from Star Trek.
Taufan rizky, sistem informasi semester 1, makalah pendidikantaufanrizky
Makalah ini membahas tentang pentingnya memilih sekolah usia dini yang sesuai dengan kualitas pendidikan yang diharapkan, bukan hanya fokus pada faktor biaya. Penulis berbagi pengalamannya mendaftarkan anak di sekolah usia dini berlabel Islam ternyata kurikulum agamanya kurang. Penulis mengingatkan orang tua agar melihat kualitas pendidikan bukan hanya biaya sekolah. Tujuannya agar orang tua tidak salah
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
Replication of attacks in a wireless sensor network using ns2eSAT Journals
Abstract A Wireless Sensor Network (WSN) comprises of sovereign sensor devices that are used to supervise physical and environmental conditions like temperature and pressure. The WSN is built of hundreds and thousands of recognizing stations called nodes, where each node consists of one or more sensors having a radio transceiver, an internal/external antenna, a microcontroller and a battery. Wireless sensor networks are the systems that are used to communicate by sensing the behavioral changes and the sensing nodes will collect the data and it will get handled. After data handling, the data will be sent to the receiver. The wireless sensor networks have to be fortified from network attacks especially at unfavorable situations because data can easily be obtained by the attackers. There are also some security protocols being implemented in sensor networks. There are some limitations in a wireless sensor network like they have limited storage capacity, limited capability of processing and limited energy to transmit data. These drawbacks can make wireless sensor network different from other networks. The imitation of the attacks are done in the NS2 simulator. By imitating, the performance of the network can be monitored. Keywords: Network Security, Wireless, Sensor, Internet, System Security, Simulator, NS2, Simulation of attacks.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
Key management techniques in wireless sensor networksIJNSA Journal
The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expectedproblems in one of these schemes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
1. O documento descreve um projeto de uma turbina eólica de eixo vertical para aplicação em meio urbano. Inclui análise aerodinâmica, resultados de cálculo de coeficientes de potência e projeto estrutural da turbina.
2. A análise aerodinâmica usa modelos matemáticos para calcular coeficientes de potência variando a velocidade de rotação e fator de bloqueamento, e estuda perfis multi-elementos usando o Javafoil.
3. Inclui também projeto
Dokumen tersebut memberikan penjelasan tentang cara mengatur format tabel HTML dengan menambahkan border, mengatur lebar dan tinggi tabel, mengatur jarak antar kolom dan baris menggunakan cellpadding dan cellspacing, serta memberikan judul pada tabel.
This unclassified briefing document provides a hypothetical example of classification levels and discusses a fictitious problem where basic addition is not working as expected. It presents a made-up problem statement where 5 + 5 does not equal 10 and humorously suggests possible causes such as dark matter, chicken, and characters from science fiction, with a hypothesis that addition was broken by faster-than-light particles from Star Trek.
Taufan rizky, sistem informasi semester 1, makalah pendidikantaufanrizky
Makalah ini membahas tentang pentingnya memilih sekolah usia dini yang sesuai dengan kualitas pendidikan yang diharapkan, bukan hanya fokus pada faktor biaya. Penulis berbagi pengalamannya mendaftarkan anak di sekolah usia dini berlabel Islam ternyata kurikulum agamanya kurang. Penulis mengingatkan orang tua agar melihat kualitas pendidikan bukan hanya biaya sekolah. Tujuannya agar orang tua tidak salah
This document provides information for Kohei, a Japanese national returning to Japan, and David, a non-national moving to Japan, about obtaining work visas and finding jobs in Japan. It lists the most common visa categories one could apply for, suggests attending job fairs and company presentations, and provides resources for job hunting websites and companies in Japan that hire foreigners.
Will.i.am is described as a synthetic artist because his music sounds heavily edited with a focus on computer editing rather than live instruments. He uses auto-tune to manipulate his voice to appeal to target markets and focuses more on his unusual fashion sense and image than the music itself. Will.i.am has been signed to different labels that have shaped and marketed his image to different audiences. In contrast, Adele is described as an organic artist who wrote and performed songs for a school project that gained attention on MySpace and led to her being signed. Throughout her career, she has not significantly changed her appearance and appeals to audiences through her vocals rather than her image.
All That You Need to Know about a StartupDeena Zaidi
With venture capitalists pouring money into start-ups, the industry has been thriving since 2009. Many have crossed $1Billion-mark but have shied away from going public, raising concerns that many such huge startups may indeed be over-valued.
This document discusses conventions used in music videos that increase repeatability from the audience's perspective. It discusses four key conventions:
1. Sexualizing women to appeal to male viewers while potentially offending female viewers. This represents the song lyrics visually.
2. Showing artists actually playing instruments to appear authentic and gain audience dedication to the music.
3. Matching visuals in the video to lyrics in the song to make the video and song easier to understand and more enjoyable to watch again.
4. Balancing focus between performance and narrative to maintain audience interest without losing the storyline or performers. This provides a good mix for audiences to enjoy and rewatch.
The document argues these conventions
Learning to understand our fellow members and leaders is one of the best things we can do in Toastmasters to maintain club membership. This presentation speaks to one of the most effective ways to accomplish that goal. While this deck was prepared for Toastmasters, it may be applied in many other business and personal environments.
This deck was presented at the Toastmaster's District 45 Fall Conference on Prince Edward Island, Canada on October 25, 2014.
Since the presentation, I noticed that TM has updated the survey with 2014 data. It can be found here: http://bit.ly/1FwRRoE
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSZac Darcy
The document proposes an approach to optimize energy consumption in sensor networks. It allocates tasks to sensor nodes using a particle swarm optimization algorithm that considers energy for data communication between nodes. Simulation results show the proposed approach reduces energy consumption and increases network lifetime compared to existing approaches that only allocate tasks to cluster gateways. The key aspects of the proposed approach are using a cost function that includes communication energy in the task allocation algorithm and having nodes send combined data from neighboring nodes to reduce the number of messages.
Transforming earth into a paradise – part 1Sabry Shaheen
This document discusses how all people are given gifts of intelligence and conscience by God to guide them towards good and away from evil. It provides examples from many religious and philosophical leaders throughout history expressing the "golden rule" of treating others as you wish to be treated. While prophets provide divine guidance, those who have not heard of prophets can still be guided by following their internal gifts. God equips all people with the ability to understand right from wrong and find wisdom if they use their minds and seek guidance from their creator.
Module 4 | CEST-richtlijnen voor beheerders van digitale collecties | Bewaren...PACKED vzw
Naarmate er meer gedigitaliseerd wordt en er meer digitale objecten in een erfgoedcollectie worden bewaard, stijgt ook het belang van een afdoende planning en infrastructuur voor het bewaren van al dat digitaal materiaal. In deze sessie worden basisbegrippen van het digitaal archiveren verklaard aan de hand van de CEST-richtlijn bewaren en het Scoremodel voor digitaal archiveren.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
This document discusses security in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of their applications. It then describes common security threats and attacks against wireless sensor networks, categorizing them as active/passive and internal/external. Key security requirements for wireless sensor networks are also outlined, including confidentiality, integrity, availability, and data freshness. Finally, the document reviews various security mechanisms that have been proposed to defend against different attacks in wireless sensor networks, such as cryptography, trust management, and data partitioning.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
This document summarizes security issues and challenges in wireless sensor networks (WSNs). WSNs are vulnerable to various security threats due to their wireless nature and constrained resources. The document outlines key requirements for WSN security like confidentiality, integrity, authentication, and availability. It discusses obstacles to security in WSNs like limited resources, unreliable communication, and unattended operation. Common attacks on WSNs are categorized as insider vs outsider, passive vs active, and mote-class vs laptop-class. The document provides a brief overview of security issues and threats at different layers of a WSN.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Study On Security In Wireless Sensor NetworksScott Faria
1) The document discusses security issues in wireless sensor networks. It notes that sensor networks have limited resources like power, memory, and processing capability.
2) It identifies several challenges for developing security protocols for sensor networks, including very limited resources, unreliable communication due to packet loss, conflicts, and latency, and the fact that sensor nodes often operate unattended in unpredictable environments.
3) The document outlines some key security requirements for sensor networks like data confidentiality, authentication of data sources, and ensuring data integrity.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
This document proposes an optimized algorithm for securely integrating wireless sensor networks (WSNs) into enterprise information systems. It discusses the security requirements for WSNs, including data confidentiality, authenticity, integrity, availability, freshness, and robustness. It also analyzes threats to WSN security like spoofing, selective forwarding, sinkhole, Sybil, wormhole, and hello flood attacks. The document suggests using Internet of Things principles to authenticate sensor data senders independently of network location, improving security and efficiency.
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
This document discusses providing security for data transmission in a hybrid wireless sensor network (HWSN). In an HWSN, static sensors monitor the environment and detect events, then mobile sensors are dispatched to the event locations to conduct further analysis. The document focuses on securing the data transmission between the base station and mobile sensors when an event occurs. It proposes using the Sensor Network Encryption Protocol (SNEP), one of the building blocks of the Security Protocols for Sensor Networks (SPINS), to encrypt the data and provide confidentiality, authentication, integrity and freshness during transmission. SNEP is an appropriate security mechanism for this application as it is efficient and meets the security requirements for sensor network communications.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
1. This document reviews privacy preserving techniques in wireless sensor networks. It discusses challenges to privacy in WSNs including data privacy, location privacy, and network privacy.
2. Wireless sensor networks face unique challenges to privacy preservation due to their constrained environment, limited sensor resources, and multi-hop network topology. This makes existing privacy techniques difficult to apply directly to WSNs.
3. The document surveys several techniques that have been proposed for preserving different types of privacy in WSNs, including location privacy, data privacy during aggregation, and preventing traffic analysis attacks on network privacy. More research is still needed to address open problems in privacy for WSNs.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Similar to Integration of security and authentication agent in ns 2 and leach protocol for wireless sensor network (20)
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
Integration of security and authentication agent in ns 2 and leach protocol for wireless sensor network
1. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
DOI : 10.5121/ijitmc.2014.2206 51
INTEGRATION OF SECURITY AND AUTHENTICATION
AGENT IN NS-2 AND LEACH PROTOCOL FOR WIRELESS
SENSOR NETWORK
Tin Win Maw
Department of Information and Communication Technology, University of Technology
(Yantanarpon Cyber City), Pyin-Oo-Lwin City, Myanmar
ABSTRACT
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
KEYWORDS
Wireless Sensor Network, NS-2, Authentication, Security, LEACH
1. INTRODUCTION
WSNs have become most interesting research area because of its useful inherent characteristics
such as power, small volume, scalability of nodes, easy to use etc. Day by day, many usages of
WSN applications in hostile environments are being needed for demand of today’s world because
of many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Currently,
WSNs have provided usefulness to several important field areas such as environmental
monitoring like flood and forest firing detection, industrial monitoring like status monitoring,
medical like Body Sensor Network (BSN), military like reconnaissance of opposing forces and
other monitoring systems like air, water and animals . Depending on applications used for WSNs,
security is the biggest challenges in WSNs and security aspect is essential for WSNs before
designing WSNs. The resource constraints and limitations make WSNs most challenging research
area such as energy and vulnerable to lack security.
2. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
52
There are many WSN routing protocols for data transmission to the used from the network. The
hierarchical routing protocols are used for optimizing energy consumption for sensor nodes by
arranging sensor nodes into clusters. Every sensor cluster is managed by a CH during the network
operation such as data transmission. LEACH (Low Energy Adaptive Clustering Hierarchy) is a
hierarchical routing protocol used in WSNs. But LEACH routing protocol is lack of security.
LEACH arranges the nodes in the network into small clusters and chooses one of them as CH.
Non CH nodes (CM) senses in a specific area and then sends the relevant information to its CH.
Then the CH aggregates the information received from all the nodes and sends it to the base
station. LEACH elects CH from all nodes randomly. There is necessary to have authentication
between CH and CM to ensure that the exact CMs send data to CH within a cluster. If only a CM
compromises, the whole network will be compromised. This paper presents integration of
authentication between CH and CM on LEACH routing protocol by using NS-2 simulation tool.
The Figure 1 shows LEACH protocol.
Figure 1. LEACH protocol data transmission
NS2 is one of the most network simulation tools and it is an open source tool that is developed
using C++ and Object Tool command Language (OTCL). Researcher can freely add new
components and routing agents to the system to serve their own purpose. In order to integrate
security and authentication agent for network, it is needed to add security functions into NS-2.
For the purpose of analysis, this paper uses the key is pre-shared key system and the
encryption/and decryption algorithm is RC4 stream Cipher and CESAR cipher. Because of
complexity of other hash algorithms, the hashing algorithm to provide authentication is very
simple polynomial algorithm [1].
2. CHARACTERISTICS AND CHALLENGES OF WSN
Currently, WSNs have provided usefulness to several important field areas such as because of
the useful characteristics such as
Power consumption constraints for nodes using batteries
Ability to cope node failures
Mobility of nodes
Dynamic network topology
Heterogeneity of nodes
Scalability to large scale of deployment
Ability to withstand harsh environmental condition
Ease of use etc.
3. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
53
Because of these useful characteristics, they have limitations and constrainsts. In WSN, sensor
nodes have
Tiny device, small in volume
Limited storage capacity
Limited resources
Limited processing power consumption and radio ranges
Communication bandwidth
Storage space
(Battery based)
This gives rise to new and unique challenges in data management and information processing
such as energy and security. Therefore, in order to develop useful resources efficient mechanisms
for WSN, it is necessary to know and understand these constraints first in [2] and [3]. The energy
and security are biggest challenges in WSN.
2.1. Security challenges in WSN
Designing security is a challenging task for a WSN because of following characteristics [4]
Wireless channels are open to everyone thus any can monitor in communication
in a wireless channel.
Most protocols for WSN did not consider necessary security mechanism.
Different to implement stronger security mechanism on sensor platform due to
their complexity.
Strong protocol costs more resources in sensor nodes which can lead to
performance degradation of applications.
Deployed in hostile environment without any fixed infrastructure. Therefore it
may face various attacks.
2.2. Security requirements of WSN
It is necessary to know and understand these security requirements first before implementing
security scheme for WSN.WSN should take the following major security requirements which are
basic requirements for any network into consideration of secure mechanism.
2.2.1. Data Integrity
Data integrity in sensor networks is needed to ensure the reliability of the data [5]. It ensures that
data packets received by destination (CH) is exactly the same with transferred by the sender (CM)
and any one in the middle cannot alter that packet. Data integrity is achieved by means of
authentication the data content [2].
2.2.2. Data Authentication
Data Authentication of a sensor node ensures the receiver that the data has not been modified
during the transmission [6]. Data authentication is achieved through symmetric or asymmetric
mechanisms where sending and receiving nodes share secret keys.
4. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
54
2.2.3. Data Confidentiality
Data confidentiality of the network means that data transfer between sender and receiver will be
totally secure and no third person can access it (neither read nor write) [3]. Confidentiality can be
achieved by using cryptography: symmetric or asymmetric key can be used to protect the data [2].
2.2.4. Data Availability
Data Availability determines whether a node has the ability to use the resources and whether the
network is available for the messages to communicate. It should be ensured that security
mechanisms imposed for data confidentiality and authentication are allowing the authorized
nodes to participate in the processing of data or communication when their services are needed
[6].
2.3. Security Attacks in WSN
Any actions that compromises the security of information owned by an organization or person is
called security attack. These attacks classified into two main categories [7].
1. Passive attacks
2. Active attacks.
2.3.1. Passive Attacks
Passive attacks are the attacks in which an attacker does not actively participate in bringing the
network down. A passive attacker attempts to learn or make use of information from the network.
The attacker can then forward this information to an accomplice who in turn can use it to launch
attacks to bring down the network.
2.3.2. Active Attacks
Active attacks are the attacks in which an attacker actively participates in disrupting the normal
operation of the network services. The attacker drops packets, modifies packets, fabricates
messages or pretends to be as some other nodes; nodes rush packets or tunnel them over high-
speed private networks to an accomplice in other part of the network, etc.
2.4. Denial of Service Attacks in WSN
Denials of Service attacks are specific attacks that attempt to prevent legitimate users from
accessing networks, servers, services or other resources. While DOS attacks continues to evolve,
the circumstances that enabling attacks have not significantly changed in recent year. There are
various kinds of DOS attacks which can cause in and decrease network life time in different
ways. The followings are some of DOS attacks.
Jamming attack
Sybil attack
Sinkhole/Black hole attack
Wormhole attack
Flooding attack
Selective forwarding attack
Spoofing attack
Replay attacks
5. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
55
This paper develops integration of the security into NS-2 and LEACH in WSNs to provide
authentication between CH and CM during data transmission.
3. LOW ENERGY ADAPTIVE CLUSTERING HIERARCHY (LEACH) PROTOCOL IN
WSN
LEACH is a cluster-based and energy conserving routing protocol. LEACH operations can be
divided into two phases. LEACH operation is broken into rounds, with each round having a set-
up phase and a steady state phase [10].
In the setup phase, the clusters are formed and a CH is chosen for each cluster from among all
nodes. During the steady phase, data is sensed and sent to the BS. LEACH elects CH from all
nodes randomly. LEACH organizes nodes into clusters with one node from each cluster serving
as a CH. It randomly selects some predetermined number of nodes as cluster heads. CHs then
advertise themselves and other nodes join one of those cluster heads [10]. In this way a cluster is
formed.
The CH then makes a Time Division Multiple Access (TDMA) schedule for the nodes under its
cluster. The communication between different clusters is done through CHs in a Code Division
Multiple Access (CDMA) manner. The CHs collect the data from their clusters and aggregate it
before sending it to the other CHs or base station (BS).
After a predetermined time lapse, the cluster formation step is repeated so that different nodes are
given a chance to become CHs.
4. SIMULATING OF INTEGRATION FOR SECURITY AGENT IN NS-2 AND
AUTHENTICATION IN LEACH
In order to integrate security and integrity features into NS-2 and LEACH for wireless sensor
network, we need to add security and authentication Agent into NS-2. The purpose of this paper
is only to illustrate a way to add security and authentication Agent into NS-2 and LEACH for
wireless sensor network.
Our approach is to build a new Agent at network layer. We also define new packet format to
represent new protocols. The new protocol is represented by a class derived from built-in class in
NS-2 (Agent/Authen_Agent). Within new derived class we will implement hash generation
function to ensure the authentication of data packet during transmission. We will also add
encryption and decryption for the modified data packet. For development of this integration of
security and authentication Agent in to NS-2 tool developer need following environment
development requirements:
Personal Computer Laptop with Open SUSE Linux 11.3
NS- 2.34 or NS-2.35 version
LEACH protocol integration
C/C++ editor
Programming skill: C++ and TCL
The implementation process to integrate new authentication Agent to NS-2 is shows in [8] [9].
The new packet class is created in a folder under NS-2 directory, for example (mkdir ns-
2.34/Authen). After that, the new packet name has to register to the packet.h under (ns-
6. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
56
2.34/common). Of course, the makefile (ns-2.34/Makefile) has to be modified by inserting new
Agent class so that the new class is complied.
At the TCL layer, the new packet must be declared by adding the name and default packet size
value to the ns-default.tcl (ns-2.34/tcl/lib/ns-default.tcl) file.
Finally, we have to make an entry for the new packet in the ns-packet.tcl (ns-2.34/tcl/lib/ns-
packet.tcl) file.
After recompile the ns-2 with command (make clean and make), we can use the new packet for
our simulation [8].
The Figure 2 shows the procedure how to integrate a new Agent into NS-2. This paper
implements a new agent carrying data. The methods of new class include RC4 and CESAR
encryption and decryption as well as generate hash function for authentication. This shows in
Figure 3. The hash generator is polynomial hash function in C++ for authentication.
In RC4, the message is encrypted bit by bit with a pre-shared symmetric key by sender and is
decrypted with the same key by the receiver.
In CESAR, The key is an integer from 1 to 25. This cipher rotates the letters of the alphabet (A to
Z). The encoding replaces each letter with the 1st to 25th next letter in the alphabet (wrapping Z
to A). The polynomial hash function is shown in Figure 4.
Figure 2. Procedure to integrate new authentication Agent to NS-2 and LEACH
Figure 3. New authentication Agent class
7. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
57
Figure 4. Polynomial Hash Function
5. SIMULATING OF INTEGRATION FOR AUTHENTICATION IN LEACH
In this simulation experiments, we use NS-2 (version 2.34), a discrete event simulator widely
used in the networking research community to investigate how various routing protocols perform
with different network configurations. Simulation setup parameters for testing of integration
authentication in LEACH are shown in Table 1. The numbers of nodes are from 20 up to 100 with
simulation time 100 seconds. The Figure 5 is Nam Animation output of NS-2 for sensor node
creation on LEACH protocol. For integration authentication in LEACH, the simulation uses new
security Agent (Authen_Agent) class and RC4 and CESAR algorithms as shown in Figure 6, 7
and 8.
In order to test for authentication between CH and CM sensor nodes over LEACH in WSN, the
Tcl simulation script is shown in figure 9. Before deploying in the network, the sensor nodes must
register with base station with pre-shared key system. Then CH election is performed and forming
cluster as LEACH protocol. When CM transmits data to its CH, the authentication Agent is added
to provide authentication between CH and CM. This paper simulated this with both RC4 and
CESAR encryption and decryption algorithm and polynomial hash fumction. The hash value will
be attached to packet header for authentication checking. At the end of communication, after
decryption, the decrypted text will be hash again to get new hash value to compare original hash.
If they are equal, the data is ensured authentication between nodes, otherwise, the data is discard.
8. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
58
Table 1. Simulation Parameters
Parameters Values
1 Simulation area 1000m x 1000m
2 Channel Type Phy/Wireless channel
3 Radio Propagation
Model
Two way ground
4 Max. numbers of nodes 20 up to 100
5 Simulation time 100sec
6 Mac Protocol Mac/Sensor
7 Energy Model Battery
8 Interface Queue Type Queye/DropTail/Priqueue
9 Link Layer Type LL
10 Communication model Bi-direction
11 Minimum packet 30
12 Antennae model Antenna/Omniantenna
13 Initial Energy 2 Joules
14 Agent Authen_Agent
Figure 5. Sensor Node Creation over LEACH for WSN
Figure 6. Integration of authentication using RC4
9. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
59
Figure 7. Integration of authentication using CESAR
Figure 8. Tcl simulation script to test authentication in LEACH in WSN
6. CONCLUSIONS
This paper simulates an integration of new security authentication Agent into NS-2 and LEACH
routing protocol for WSN by using existing one feasible instance encryption/decryption (RC4 and
CESAR) and hash algorithm. As further analysis, more security and authentication agent into NS-
2 using hashing algorithms such as SHA-256, SHA-384, SHA- 512, etc and DES, RC5, AES, etc
for encryption /decryption. With this approach researchers can also add his or her own combined
security and integrity Agent into NS-2 by introducing new encryption/decryption and hash
algorithm.
ACKNOWLEDGEMENTS
It is my immense pleasure to express my deep sense of gratitude and indebtedness to my highly
respected and esteemed and thanks to my supervisor Mr. Myo Hein Zaw, Associate Professor,
Principal of Computer University (Monywar), Myanmar for providing and supporting me many
suggestions to do my research work. His invaluable guidance, inspiration, constant
encouragement sincere criticism and sympathetic attitude could make this paper possible. I
express my thanks to my Institution namely University of Technology (Yantanarpon Cyber City)
for providing me with a good environment and facilities like internet books, computers and all
that as my source to complete this research.
10. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014
60
REFERENCES
[1] Hash function implemented in C++ with polynomial algorithm. Retrieved 4/14/05 from
http://wikisource.org/wiki/Polynomial_hash_function.
[2] Ace Dimitrievski, Biljana Stojkoska, Kire Trivodaliev, Danco Davcev (2006), "Securing
communication in WSN trough use of cryptography”, NATO-ARW, Suceava
[3] Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher (2011), "Challenges for Security in Wireless
sensor Networks (WSNs)", World Academy of Science, Engineering and Technology
[4] Shio Kumar Singh, M P Singh, D K Singh (2011), “A Survey on Network Security and Attack
Defense Mechanism for WSN”, Internal Journal of Computer and Technology
[5] G. Padmavathi, D. Shanmugapriya (2009), “A Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks", International Journal of Computer Science and Information
Security, Vol. 4, No. 1 & 2.
[6] Prajeet Sharma, Niresh Sharma, Rajdeep Singh (2012), "A Secure Intrusion detection system against
DDOS attack in Wireless Mobile Ad-hoc Network", International Journal of Computer Applications
Volume 41– No.21.
[7] Siddhartha Gupte and Mukesh Singhal (2003), “Secure routing in mobile wireless ad hoc networks”
[8] Vijayakumar, P. and C. Manikandan, 2010. “Security Function Integration into NS-2 for WSN”,
National Conference on Information and Software Engineering
[9] http://Marc Greis’ Tutorial for the UCB_LBNL_VINT Network Simulator ns .html.
[10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan (2000), “ Energy-Effcient Communication
Protocols for Wireless Microsensor Networks (LEACH),” in HICSS,vol. 8, Maui, Hawai, pp. 3005–
3014.
Author
Tin Win Maw is a PhD candidate from University of Technology (Yantanarpon
Cyber City) (UTYCC). She has received the Degree of Master of Technology from
the University of Computer Studies (UCSY, Yangon). The work of her master
thesis is “Performance Analysis of Symmetric Encryption Algorithms”. She also
studied network course at the Information and Communication Technology
Training Institute (ICTTI) which is established by UCSY in coordination with
Japan International Cooperation Agency (JICA) and programming for network at
India Myanmar Centre for Enhancement of Its Skills (IMCEITS). At present, she
is working as a tutor at the faculty of information and technology from the
(UTYCC).