Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
The vampire attack is the class of Denial-of-Service attack. Denial-of-Services in the network is caused by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume the power of sensor nodes and disable the network. It creates a protocol-compliant message and sends it into the network so that the energy used by the network is more than if the same message transmitted of identical size to the same destination.
International Journal of Computational Engineering Research (IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
International Journal of Engineering and Science Invention (IJESI) inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
This system proposes a centralized system for replica identification. The network is divided into segments and an inspection node is chosen for each segment. Inspection node identifies a clone node by checking the nodes ID and cryptographic key. In this process, Chord algorithm is used to detect the clone node, every node is assigned with random key, before it transmits the data it has to give its key which would be verified by the witness node. If same key is given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor list containing all neighbor IDs and its location. In this scheme, Energy Efficient Clustering Protocol EECP protocol is used to implement different energy saving methods. Dr. B. R. Tapas Bapu | Hemavathi S U | Poonkuzhali K | Sweety J "Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31257.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31257/network-security-enhancement-in-wsn-by-detecting-misbehavioural-activity-as-copy-cat-nodes/dr-b-r-tapas-bapu
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
Because of the widespread use of wireless sensor ne
tworks in many applications, and due to the nature
of
the specifications of these networks (WSN) in terms
of wireless communication, the network contract
specifications, and published it in difficult envir
onments. All this leads to the network exposure to
many
types of external attacks. Therefore, the protectio
n of these networks from external attacks is consid
ered the
one of the most important researches at this time.
In this paper we investigated the security in wirel
ess
sensor networks, Limitations of WSN, Characteristic
Values for some types of attacks, and have been
providing protection mechanism capable of detecting
and protecting wireless sensor networks from a wid
e
range of attacks
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
The vampire attack is the class of Denial-of-Service attack. Denial-of-Services in the network is caused by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume the power of sensor nodes and disable the network. It creates a protocol-compliant message and sends it into the network so that the energy used by the network is more than if the same message transmitted of identical size to the same destination.
International Journal of Computational Engineering Research (IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
International Journal of Engineering and Science Invention (IJESI) inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
This system proposes a centralized system for replica identification. The network is divided into segments and an inspection node is chosen for each segment. Inspection node identifies a clone node by checking the nodes ID and cryptographic key. In this process, Chord algorithm is used to detect the clone node, every node is assigned with random key, before it transmits the data it has to give its key which would be verified by the witness node. If same key is given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor list containing all neighbor IDs and its location. In this scheme, Energy Efficient Clustering Protocol EECP protocol is used to implement different energy saving methods. Dr. B. R. Tapas Bapu | Hemavathi S U | Poonkuzhali K | Sweety J "Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31257.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31257/network-security-enhancement-in-wsn-by-detecting-misbehavioural-activity-as-copy-cat-nodes/dr-b-r-tapas-bapu
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
Because of the widespread use of wireless sensor ne
tworks in many applications, and due to the nature
of
the specifications of these networks (WSN) in terms
of wireless communication, the network contract
specifications, and published it in difficult envir
onments. All this leads to the network exposure to
many
types of external attacks. Therefore, the protectio
n of these networks from external attacks is consid
ered the
one of the most important researches at this time.
In this paper we investigated the security in wirel
ess
sensor networks, Limitations of WSN, Characteristic
Values for some types of attacks, and have been
providing protection mechanism capable of detecting
and protecting wireless sensor networks from a wid
e
range of attacks
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
Detection and Prevention of Attacks in Wireless Sensor Networks: A Surveydbpublications
Wireless sensor networks will use a communication channel which is insecure and have a poor infrastructure. Wireless sensor networks consists of spatially distributed autonomous devices and using sensors they monitor the physical as well as the environmental conditions, such as pressure, temperature, sound at different locations. As the nodes in the sensor network are deployed in the hostile locations they are vulnerable to the attacks such as Hello flood attack, Jamming, Wormhole, Sybil, Sinkhole attack. These types of potential threats to network are continuously evolving and requires measures to detect and prevent. In this paper, we discuss about Sybil and Wormhole attacks with schemes to detect and prevent these attacks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
N0704075079
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 4 (May 2013), PP. 75-79
75
Source Location Privacy Preservation in Wireless Sensor
Network Using Computer Based Image Recognition
S.A. Sai Sowmeyaa1
, S. Senthil Kumar2
1
PG scholar, KSR College of Engineering
2
Assistant Professor, KSR College of Engineering
Abstract:- Abrupt due to the open nature of the sensor network, the adversary can eavesdrop and track
the information. In this paper, an algorithm called computer based image recognition is introduced to
overcome such problem. Here the traffic is analysed using this method. In proposed scheme, the
adversary model is considered where it is assumed that the adversary can monitor the small area or the
entire network. Then introducing the hotspot-Locating attack, considering that through the network
traffic the adversaries identify the object’s location. Finally for the effective source location privacy,
the irregular shapes of fake packets are sent in the form of clouds. Insertion of cloud provides more
privacy and it is made active only at the need of transmission.
Keywords:- Wireless Sensor Network Security, Source location Privacy, Content privacy, Data
oriented privacy, Adversary scheme.
I. INTRODUCTION
Wireless Sensor Network (WSN) found many applications in military and security applications,
environmental and habitat monitoring, medical application and in data collection. In this paper, we use WSN
application for data and habitat monitoring. For example, we are trying to save the particular animal
organization say pandas. The movement and the activities of the pandas are regularly monitored and send the
information to sink. Since WSN is open source network, the data transmission is not secure. The possibilities of
attack are higher which may results in lack of data.
In wireless sensor networks, privacy is the most important concern. The privacy threats can be
classified into two ways: data-oriented privacy and content privacy. In data-oriented privacy threat, the
adversary can observe the packet details and after finding the location of the source the pseudonym packet is
inserted. In the content privacy threat, the adversary can eavesdrops on the data transmission in the network and
tracks the traffic flow. However the adversary could not interpret the data.
Some of the existing methods are based on either routing based model or global model. In the routing
based scheme, to avoid the adversary problem the packets are sent from source to sink through different routes.
By doing so, the learning of the data by the adversary is made difficult. And also this includes the back-tracing
method i.e. the adversary tries to get the information from sink to the source. If the adversary locate the sink,
through back tracing the source route can be identified. However, this increases the need of more paths which
results in the increasing of energy and bandwidth.
On the contrary, global adversary scheme uses weak adversary model. Here the source nodes are
allowed to send the packets only at the particular time slot. If there are no packets to be sent by the source node,
it must send fake packets to the sink. Hence, the adversary could not find the real and the fake packets. However
due to the fake packets there may be unnecessary traffic in the network and also increase the packet losses in the
network.
In this paper, we first define the hotspot phenomenon which causes the inconsistency in the network
due to the higher density. Secondly the adversary model [1], assuming that it can monitor the larger area through
various devices is discussed. Then, for the location privacy against the attack the cloud scheme [9] is created.
The cloud with the irregular fake packets is inserted to provide effective source location privacy [2].
Finally, we proposed the scheme called computer based image recognition. This method, is mainly
used to analyse the traffic pattern while the send from source to the sink. The intruder tries to capture the data
while sending from the source to the sink. After getting the data the intruder modifies the data and sends to the
sink. After sink receiving the data, it verifies with the time to be received. If there happens any delay during the
packet delivery, the node confirms that there received a fake packet and try to find out the attacking node. If the
node that sending the fake packets is identified then the node is removed from network.
2. Source Location Privacy Preservation in Wireless Sensor Network Using Computer...
76
Our contribution can be summarized as follows: 1) to develop the realistic model; 2) we define hotspot
phenomenon 3) to define the novel scheme for source location privacy against Hotspot-Locating attack 4) to
propose a new scheme called computer based image recognition.
The remainder of this paper is organized as follows: reviews of related works are done in section II.
The network and the adversary models are discussed in section III. The details about the hotspot attack are given
in section IV. We presented our scheme in section V. conclusion and future work is given in section VI.
II. RELATED WORKS
Nowadays location privacy plays an important role in both wired and in the wireless networks.
Generally, the location privacy can be provided in pervasive computing by ensuring that the attacker cannot
associate two or more of the following pieces of information: who, where, and when. Onion routing [7] is a
technique which provides the anonymous communication over a computer network. In the proposed system the
nodes conceals in the network/MAC address for the mobile ad- hoc networks.
In Routing based scheme [7], the node sends the data through different routes to provide the source
location privacy. In this method, the adversary is assumed to be monitoring only the small area. However, this
scheme fails when the adversary is capable of monitoring the large area or the entire network.
This also includes the concept of the back-tracing attack. But it also fails, when the sink is identified by
the adversary then through hop by hop movement finally identifies the source. This method also increases the
bandwidth and power consumption.
In Global based scheme, the adversary is assumed to monitor the entire network. Each node can send
the packets only at the periodic time slots. In the remaining time the packet sends the fake packet. If the time
interval of the packet increases, then the packet delay will rapidly increase. If the fake packet allocation is
increased, then the energy consumption is also increased. Through this technique complexity increases.
Fig .1: Architecture of WSN
Ying Jian [7] uses a routing protocol called phantom routing which is designed to protect the location
privacy of the source nodes in the sensor network. In this routing method each packet takes the random walk
before reaching the destination.
Many of the schemes use the asymmetric key cryptosystem which uses the two keys for the security concern.
However this method requires more energy to work, so a less energy consuming cryptosystem is needed.
III. NETWORK AND ADVERSARY MODEL
A. NETWORK MODEL
As illustrated in fig.1, the architecture of the considered WSN consists of the sensor nodes deployed in
the open area. The sensor nodes are the device with the low computational power and use public key
cryptography, but perform the operations like sensing, data processing and communication operations. Here the
communications within the network by the sensor nodes are bidirectional.
B. ADVERSARY MODEL
The adversary is capable of monitoring the data transmission in the network and learns the data. The
adversary distributes the devices random to monitor the data say observation points.
Here the adversary is assumed to have the following characteristics:
1. Passive: In networks, attacks are two types, passive and active. In active attack, the adversary will not harm
the data. But the passive attack is more dangerous because in this type of attack the adversary will harm the
data by decrypting the original data.
2. Use well equipped devices: For the data monitoring, considering the adversary uses the well equipped
devices which can also monitor the larger area in the network.
3. Technology: If adversary finds the location, it needs to know considered technology. Assuming that the
adversary knows the privacy preserving scheme and the cryptosystem methods.
3. Source Location Privacy Preservation in Wireless Sensor Network Using Computer...
77
IV. HOTSPOT-LOCATING ATTACK
A hotspot is formed when the more number of packets arises from the small area. Due to more number
of packets there may be traffic in the network. Through this the adversary can try to learn the data. To avoid this
problem the packets are send in the form of the cloud with irregular shapes which makes inconsistency to the
adversary to track the data from network. The adversary randomly distributes the devices for monitoring the
data transmission. If adversary finds the area but there is no animal say panda, then it is known as the false
positive. However the adversaries are well equipped to track the data during the transmission.
The adversary attempts to make use of the fact that the sensor nodes at the hotspot send more packet than the
other region. Since hotspot means the group of animals stay together for several reason, example, shelter and
food.
Different phases are considered for the hotspot-Locating attack [9] using the adversary model. This
process involves the three phases: Identifying, Monitoring, Analysis phase. In the identifying phase, the
adversary searches the hotspot location area by its distributed device which is placed at random. In monitoring
phase, the monitoring device collects the traffic information. Finally in the analysis phase, the adversary uses the
network traffic to collect the data for searching the panda and to change the location.
Fig.2. No. of packets vs. time
The adversary may attack the data in two ways: Inside tracing and boundary tracing. For the event
packet transmission, the fake packet is inserted along with the real data to make the inconsistency to the
adversary. The packets are encrypted using a shared key and sent to the sink. Then sink after getting the
information it decrypts the data using the shared key. Then moves the fake packet to the next node periodically.
Finally, the clouds are merged to get the entire information. The merging of the two clouds reduces
energy consumption and the adversary has an inconsistence in finding the fake packet and the real data. The
main advantages of merging cloud are it provides the stronger privacy to the network and as said before it
reduces the energy costs. Also by the cloud merging we can increase the anonymity set without the extra set.
For the merging cloud splitting attack, the adversary tries for the reduction of the cloud size.
Considering the source and sink unlink ability, when the adversary eavesdrops on both, it cannot link the packet.
Fig.3. Network-Throughput graph
4. Source Location Privacy Preservation in Wireless Sensor Network Using Computer...
78
Table 1 Simulation Parameters
PARAMETER VALUE
Number of nodes 4000
Network size 3500m x 3500m
Number of hotspot 1
Number of sensor nodes
in hotspot
100
Sink location Origin
Nodes and hotspot Uniformly distributed
V. COMPUTER BASED IMAGE RECOGNITION ALGORITHM
The image recognition algorithm, is mainly used to analyse the traffic pattern while the send from
source to the sink. The intruder tries to capture the data while sending from the source to the sink. After getting
the data the intruder modifies the data and sends to the sink. After sink receiving the data, it verifies with the
time to be received. If there happens any delay during the packet delivery, the node confirms that there received
a fake packet and try to find out the attacking node. If the node that sending the fake node is identified then the
node is removed from network.
A. Simulation results
Table 1 illustrate four thousand nodes are uniformly distributed over size of 3500m x 3500m; the sink is
located at the origin. The network has one hotspot and is fixed. The number of source nodes in the hotspot is
100.
Fig.2. illustrate the energy consumption of the packet in the network. To reduce the energy cost, our scheme
uses efficient cryptosystem which includes symmetric key cryptosystem and hash function. Comparing with the
existing method, this method consumes less energy because the packets are sent only during the event and not
periodically. So it saves the energy.
Fig.3. illustrate the throughput performance of the packet. Since the packet is sent only at the event, the
network traffic can get reduced which results in the reduction of packet loss.
VI. CONCLUSION AND FUTURE WORK
The image recognition algorithm, is mainly used to analyse the traffic pattern while the send from
source to the sink. The intruder tries to capture the data while sending from the source to the sink. After getting
the data the intruder modifies the data and sends to the sink. After sink receiving the data, it verifies with the
time to be received. If there happens any delay during the packet delivery, the node confirms that there received
a fake packet and try to find out the attacking node. If the node that sending the fake node is identified then the
node is removed from network.
In future work, we can use different algorithms to locate hotspots in the traffic-pattern image by the
traffic analysis techniques.
REFERENCES
[1]. Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham, “Privacy preservation in wireless sensor
networks: A state-of-the-art survey in Ad Hoc Networks” (2009), p. 1501–1514, 2009.
[2]. C. Karlof and D. Wagner “Secure routing in wireless sensor networks: Attacks and countermeasures”.
Elsevier’s Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, (2–
3) 293–315, September 2003.
[3]. C. Ozturk, Y. Zhang, and W. Trappe, “Source-location privacy in energy constrained sensor network
routing" in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN),
October 2004, pp. 88-93.
[4]. M. Shao, Y. Yang, S. Zhu and G. Cao, “Towards statistically strong source anonymity for sensor
networks”, Proc. of IEEE INFOCOM’08, pp. 51–59, Phoenix, Az, USA, April 2008
5. Source Location Privacy Preservation in Wireless Sensor Network Using Computer...
79
[5]. T. Roosta, S. Shieh, S. Sastry: “Taxonomy of Security Attacks in Sensor Networks”, 1st IEEE Int.
Conference on System Integration and Reliability Improvements 2006, Hanoi (2006) pp. 13–15.
[6]. M. Mahmoud and X. Shen, “Lightweight privacy-preserving routing and incentive protocol for hybrid
ad hoc wireless networks", Proc. of IEEE INFOCOM, International Workshop on Security in
Computers, Networking and Communications (SCNC), Shanghai, China, April 10-15, 2011.
[7]. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, “A Novel Scheme for Protecting Receiver’s Location
Privacy in Wireless Sensor Networks” IEEE Trans. Wireless Comm., vol. 7, no. 10, pp. 3769-
3779, Oct. 2008.
[8]. Y. Li and J. Ren, “Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks”
Proc. IEEE INFOCOM ’10, Mar. 2010.
[9]. Mohamed M.E.A. Mahmoud and Xuemin (Sherman) Shen, “A Cloud-Based Scheme for Protecting
Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks”, IEEE
transactions on parallel and distributed systems, vol. 23, no. 10, pp. 1805-1818, Oct. 2012.
[10]. R. Lu, X. Lin, H. Zhu, and X. Shen, “Timed Efficient Source Privacy Preservation Scheme for Wireless
Sensor Networks,” Proc. IEEE Int’l Conf. Comm., May 2010.
[11]. Y. Fan, Y. Jiang, H. Zhu, and X. Shen, “An Efficient Privacy- Preserving Scheme against Traffic
Analysis Attacks in Network Coding,” Proc. IEEE INFOCOM ’09, Apr. 2009.
[12]. H. Wang, B. Sheng, and Q. Li, “Privacy-Aware Routing in Sensor Networks,” Computer Networks,
vol. 53, no. 9, pp. 1512-1529, 2009.
[13]. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing Location-Based Identity Inference
in Anonymous Spatial Queries,” IEEE Trans. Knowledge and Data Eng., vol. 19, no. 12, pp. 1719-
1733, Dec. 2007.
[14]. B. Gedik and L. Liu, “Protecting Location Privacy with Personalized K-Anonymity: Architecture and
Algorithms,” IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
[15]. K. Pongaliur and L. Xiao, “Maintaining Source Privacy under Eavesdropping and Node Compromise
Attacks,” Proc. IEEE INFOCOM, Apr. 2011.