This document proposes a new message authentication scheme for wireless sensor networks using modified El-Gamal signature on elliptic curves. It aims to overcome the problems of existing symmetric-key and public-key based authentication schemes, such as key management overhead, threshold problems, and lack of scalability. The proposed scheme provides message authentication between sensor nodes in a hop-by-hop manner and is resilient to node compromise attacks. It uses efficient elliptic curve cryptography to generate digital signatures for authenticating messages sent between nodes with less computational overhead compared to existing public-key schemes. The document describes the detailed algorithms and advantages of the proposed source anonymous message authentication approach based on modified El-Gamal signature on elliptic curves.
Secured Source Anonymous Message Authentication Using Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the wellestablished
point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This nonconvex
max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
Secured Source Anonymous Message Authentication Using Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the wellestablished
point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This nonconvex
max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Similar to Message authentication between the nodes (20)
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. www.ijaret.org Vol. 2, Issue V, May, 2014
ISSN 2320-6802
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN
ENGINEERING AND TECHNOLOGY
WINGS TO YOUR THOUGHTS…..
Page 81
Message Authentication between the Nodes using modified
El-Gamal Signature on Elliptic Curve
Chinnaswamy C.N1
, Natesha B V2
1
Associate Professor Department of IS & Engineering,
National institute of engineering, Mysore-570 008
2
IInd
year M-Tech, Computer Network Engineering,
National institute of engineering, Mysore-570 008
Abstract : Message authentication is one of the most effective way to thwart an intruder who can compromise with the nodes
and can access to the data and corrupt the data in wireless sensor network, many conventional methods have been
developed to solve the problem that message being corrupted such as symmetric key cryptography and public key
cryptography ,but they have their own problems such as threshold overhead and key management and computation overhead
and scalability .In order to overcome these problem developed a new authentication scheme using the elliptic curve
cryptography while enabling the intermediate node Authentication .
Index terms: Authentication, Elliptic Curve, Symmetric Key Cryptography, Public Key Cryptography.
1. INTRODUCTION
Message authentication plays a key role in thwarting
unauthorized and corrupted messages from being forwarded
in networks to save the precious sensor energy. For this
reason, many authentication schemes have been proposed in
literature to provide message authenticity and integrity
verification for wireless sensor networks (WSNs) [1]. These
schemes can largely be divided into two categories: public-
key based approaches and symmetric-key based approaches.
The symmetric-key based approach [2]-[3] requires complex
key management, lacks of scalability, and is not resilient to
large numbers of node compromise attacks since the
message sender and the receiver have to share a secret key.
The shared key is used by the sender to generate a message
authentication code (MAC) for each transmitted message. In
symmetric key approach message authenticity and integrity
can only provided only between the nodes with shared key,
so an intruder can compromise with the nodes and access to
the key.
The second approach is polynomial based approach which is
developed to provide the scalability which is based on the
information, security is provided by sharing the threshold
where threshold means the degree of the polynomial, if the
number of the message transmitted is less than the threshold
authenticity can be provided if the number of messages
greater than the threshold the authentication will not be
provided. An alternative solution was proposed in to thwart
the intruder from recovering the polynomial by computing
the coefficients of the polynomial. The idea is to add a
random noise, also called a perturbation factor, to the
polynomial so that the coefficients of the polynomial cannot
be easily solved. However, a recent study shows that the
random noise can be completely removed from the
polynomial using error-correcting code techniques.
For the public-key based approach, each message is
transmitted along with the digital signature of the message
generated using the sender’s private key. Every intermediate
forwarder and the final receiver can authenticate the message
using the sender’s public key.
One of the limitations of the public key based scheme is the
high computational overhead. The recent progress on elliptic
curve cryptography (ECC) shows that the public-key
schemes can be more advantageous in terms of
computational complexity, memory usage, and security
resilience, since public-key based approaches have a simple
and better key computation.
Here we propose an unconditionally secure and efficient
source anonymous message authentication (SAMA) scheme
based on the optimal modified El-Gamal signature (MES)
[4]-[6] scheme on elliptic curves. This MES scheme is
secure against adaptive chosen-message attacks which
provide the source privacy and corrupted message can be
identified and minimize the node processing power. The
recent progress on elliptic curve cryptography (ECC) shows
that the public-key schemes can be more advantageous in
terms of computational complexity, memory usage, and
security resilience, since public-key based approaches have a
simple and clean key management Which also helps in
achieving compromise-resiliency, flexible-time
authentication and source identity protection, our scheme
does not have the threshold problem.
2. LITERATURE SURVEY
Wireless sensor networks (WSNs) consist of hundreds or
even thousands of small devices each with sensing,
processing, and communication capabilities to monitor the
real-world environment and are used in a variety of
applications such as military sensing and tracking,
environmental monitoring, disaster management, etc. But
2. www.ijaret.org Vol. 2, Issue V, May, 2014
ISSN 2320-6802
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN
ENGINEERING AND TECHNOLOGY
WINGS TO YOUR THOUGHTS…..
Page 82
when WSN is deployed in open, unmonitored, hostile
environment, or operated on unattended mode sensor nodes
will be exposed to the risk of being captured by an active
attacker
Types of attacks that happens in wireless sensor networks
are:
Passive attacks: Through passive attacks, the adversaries
could eavesdrop on messages transmitted in the network
and perform traffic analysis.
Active attacks: Active attacks can only be launched from
the compromised sensor nodes. Once the sensor nodes are
compromised, the adversaries will obtain all the information
stored in the compromised nodes, including the security
parameters of the compromised nodes. The adversaries can
modify the contents of the messages, and inject their own
messages
3. PROPOSED METHOD
a. Proposed Method achieves the Following
Message authentication: The message receiver should
be able to verify whether a received message is sent by the
node that is claimed or by a node in a particular group. In
other words, the adversaries cannot pretend to be an innocent
node and inject fake messages into the network without
being detected
Hop-by-hop message authentication: Every forwarder
on the routing path should be able to verify the authenticity
and integrity of the messages upon reception.
Node compromise resilience: The scheme should be
resilient to node compromise attacks. No matter how many
nodes are compromised, the remaining nodes can still be
secure.
Efficiency: The scheme should be efficient in terms of
both computational and communication overhead.
b. Source Anonymous Message Authentication Scheme
on Elliptic Curve
The main idea is that for each message m to be released, the
message sender, or the sending node, generates a source
anonymous message authenticator for the message m. The
generation is based on the MES scheme on elliptic curves.
For a ring signature, each ring member is required to
compute a forgery signature for all other members in the AS.
In our scheme, the entire SAMA generation requires only
three steps, which link all non-senders and the message
sender to the SAMA alike. In addition, our design enables
the SAMA to be verified through a single equation without
individually verifying the signatures.
c. Why elliptic curve cryptography
The computational overhead of the RSA-based approach to
public-key cryptography increases with the size of the keys.
Elliptic curve cryptography (ECC) [7] can provide the same
level and type of security as RSA but with much shorter
keys. Table 1 shows comparison of the key size used in the
different kind of cryptographic, it shows that the elliptic
curve cryptographic algorithms which requires the shorter
key size and which increase the speed of the computation
and expand the application of the cryptographic algorithm
usage in many real time application such as e-commerce and
mobile mobility.
Table 1: Compares the key sizes for three different
approaches to encryption for comparable levels of security
against brute-force attacks.
Symmetric
encryption
Key size in bits
RSA and
Diffie – Hellman
key size
in bits
ECC key size
In bits
80 1024 160
112 2048 224
128 3072 256
192 7680 384
256 15360 512
d. Definition of the Algorithms
1. A SAMA (Source Anonymous Message Authentication)
consists of the following two algorithms:
Generate (m,Q1,Q2,.,.,.,Qn): Given a message m and
the public keys Q1,Q2,Q3. . . . . . . , Qn of the AS S
={A1,A2,.,.,.,An}, the actual message sender At, 1< t ≤ n,
produces an anonymous message S(m) using its own private
key d
Verify S(m): Given a message m and an anonymous
message S(m), which includes the public keys of all
members in the AS, a verifier can determine whether S(m) is
generated by a member in the AS.
2. Modified El-Gamal signature scheme consists of the
following three algorithms:
Key generation algorithm: Let p be a large prime and
g be a generator of Zp*. Both p and g are made public. For a
random private key x Zp*, the public key y is computed
from y = gx mod p.
Signature algorithm: The MES can also have many
variants. For the purpose of efficiency, we will describe the
variant, called optimal scheme. To sign a message m, one
chooses a random
k Zp*
−1, then computes the exponentiation r = gk mod p
and , Solves s from: s = rxh (m, r) + k mod (p − 1), where h
is a one-way hash function. The signature of message m is
defined as the pair (r, s).
Verification algorithm: The verifier checks whether
the signature equation gs = ryrh
(m,r) mod p.
If the equality holds true, then the verifier accepts the
signature, and rejects otherwise.
3. www.ijaret.org Vol. 2, Issue V, May, 2014
ISSN 2320-6802
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN
ENGINEERING AND TECHNOLOGY
WINGS TO YOUR THOUGHTS…..
Page 83
Key management is one of the major issues for secret-key
based authentication schemes. This is especially true for
large scale WSNs. While many of these schemes are
designed to provide node authentication, they can only
provide end-to-end node authentication using the secret key
shared between the two nodes, which implies that only the
receiver can verify the authenticity of the messages en-route.
This means that no intermediate node can authenticate the
message in general. The intermediate nodes may have to
forward a manipulated message for many hops before the
message can finally be authenticated and dropped by the
receiving node. This not only consumes extra sensor power,
but also increases the network collision and decreases the
message delivery ratio. In addition to performance
improvement, enabling intermediate node authentication will
thwart adversaries from performing denial-of service attacks
through message manipulation to deplete the energy and
communication resources of the wireless network.
Therefore, developing a protocol that can provide hop by
hop intermediate node authentication is an important
research task. Most of the authentication schemes are based
on symmetric key schemes, including the polynomial
evaluation based threshold authentication scheme. The secret
bi-variate polynomial is defined as
f(x, y)= i,j xi
yj
(i)
where each coefficient Ax,y is an element of a finite field
Fp, and dx and dy are the degrees of this polynomial. dx and
dy are also related to the message length and the
computational complexity of this scheme. From the
performance aspect, dx and dy should be as short as possible.
On the other hand, it is easy to see that when either more
than dy + 1 messages transmitted from the base station are
received and recorded by the intruders, or more than dx + 1
sensor nodes have been compromised, the intruders can
recover the polynomial f(x, y) via Lagrange interpolation. In
this case, the security of the system is totally broken and the
system cannot be used anymore. This property requires that
both dx and dy be very large for the scheme to be resilient to
node compromise attacks.
An alternative approach based on perturbation of the
polynomial was also explored. The main idea is to add a
small amount of random noise to the polynomial in the
original scheme so that the adversaries will no longer be able
to solve the coefficients using Lagrange interpolation.
However, this technique is proved to be vulnerable to
security attacks, since the random noise can be removed
from the polynomial using error-correcting techniques.
While hop-by-hop authentication can be achieved through a
public-key encryption system, the public-key based schemes
were generally considered as not preferred, mainly due to
their high computational overhead. However, our research
demonstrates that it is not always true, especially for elliptic
curve public-key cryptosystems. In our scheme, each SAMA
contains an AS of n randomly selected nodes that
dynamically changes for each message. For n = 1, our
scheme can provide at least the same security as the bi-
variate polynomial-based scheme. For n > 1, we can provide
extra source privacy benefits. Even if one message is
corrupted, other messages transmitted in the network can
still be secure. Therefore, n can be much smaller than the
parameters dx and dy. In fact, even a small n may provide
adequate source privacy, while ensuring high system
performance. In addition, in the bi-variate polynomial-based
scheme, there is only one base station that can send
messages. All the other nodes can only act as intermediate
nodes or receivers. This property makes the base station easy
to attack, and severely narrows the applicability of this
scheme. In fact, the major traffic in WSNs is packet delivery
from the sensor nodes to the sink node. In this case, our
scheme enables every node to transmit the message to the
sink node as a message initiator. The recent progress on
elliptic curve cryptography (ECC) has demonstrated that the
public-key based schemes have more advantages in terms of
memory usage, message complexity, and security resilience,
since public-key based approaches have a simple and clean
key management.
e. Applications of elliptic curve cryptography
Because of much smaller key sizes in ECC algorithms can
be implemented on smart cards without much mathematical
co processors, ECC can be used in the proliferation of the
mobile devices and E-commerce, such as online
transactions where user has to provide some private
credentials and digital signature generation for the
authentication purpose, secure browser sessions and it can be
used where security is needed but lacks the power storage
and computational power that is necessary for our present
day applications.
4. CONCLUSION
Proposed source anonymous message authentication scheme
using the modified El-Gamal signature on elliptic curve in
order to provide the message authentication between nodes
in a wireless sensor network. Elliptic curve cryptography
which is similar to the public key cryptography methods
such as RSA and other but it requires less computation and it
is very useful in the proliferation of the mobile devices due
to the use of shorter key.
REFERENCES
[1] W. Zhang, N. Subramanian, and G. Wang,
“Lightweight and compromise resilient message
authentication in sensor networks,” in IEEE
INFOCOM, Phoenix, AZ., April 15-17 2008.
[2] R. Rivest, A. Shamir, and L. Adleman, “A
method for obtaining digital signatures and
4. www.ijaret.org Vol. 2, Issue V, May, 2014
ISSN 2320-6802
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN
ENGINEERING AND TECHNOLOGY
WINGS TO YOUR THOUGHTS…..
Page 84
public-key cryptosystems,” Communications. of
the Assoc. of Comp. Mach., vol. 21, no. 2, pp.
120–126.
[3] H. Wang, S. Sheng, C. Tan, and Q. Li,
“Comparing symmetric-key and public-key
based security schemes in sensor networks: A
case study of user access control,” in IEEE
ICDCS, Beijing, China, 2008, pp. 11–18.
[4] L. Harn and Y. Xu, “Design of generalized El-
Gamal type digital signature schemes based on
discrete logarithm,” Electronics Letters, vol. 30
[5] M. Albrecht, C. Gentry, S. Halevi, and J. Katz,
“Attacking crypto10 graphic schemes based on
”perturbation polynomials”,” Cryptology ePrint
Archive, Report 2009/098, 2009.
[6] R. Rivest, A. Shamir, and L. Adleman, “A
method for obtaining digital signatures and
public-key cryptosystems,” Communications. of
the Assoc. of Comp. Mach., vol. 21.
[7] Elliptic Curve Cryptography and Digital Rights
Management Lecture Notes on “Computer and
Network Security” by Avi Kak February 26,
2013.
AUTHORS
1) CHINNASWAMY C N
Associate Professor, Department Of
Information Science & Engineering at National Institute Of
Engineering Mysore.
Email-id: chinnaswamynie@gmail.com
2) NATESHA B V
M-tech in Computer Network Engineering,
Department of Information Science & Engineering, at
National Institute Of Engineering, Mysore.
Email-id: nateshbv18@gmail.com