International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Reference
“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
A Study on Mechanical Properties of Vinylester Based BioComposite Material wi...IJERA Editor
In composites a conglomeration produces material properties which are unavailable from individual constituent
materials. The use of petroleum based products as constituents in polymer matrix composite has raised concerns
regarding environmental issue and non-renewability of the resource. Therefore in this work an attempt has been
made to develop a biocomposite material using untreated dupion silk fiber as reinforcement material and vinyl
ester as matrix material with Potato Starch used as filler material by hand layup technique.
The biocomposites were prepared in varying percentage of filler addition (0%, 10%, 20%, and 30%) and
different mechanical tests (tensile, flexure and hardness) were conducted on the samples prepared to the ASTM
standards.
From the results of the experiments conducted on the specimen it can be concluded that the performance of 10%
Starch filler content Biocomposite is satisfactory in all aspects compared to 0%, 20%, and 30% Starch filler
content Biocomposites.
Rack And Pinion Mechanism for Continuous Variable Valve Timing of IC EnginesIJERA Editor
The valve timing is a very closely studied event and effects the performance of an IC Engine greatly with
respect to the Brake Power Produced, Volumetric Efficiency and Emissions etc. The valve event if varied and
experimented with, can result in higher efficiencies and overall improved performance of the Engine. Hence,
various researchers have attempted to temper with the valve timing and thus many Variable Valve Timing
systems have been proposed till date with many of them being implemented by various manufacturers.
However, on reviewing the presently employed systems, the lack of existence of a single system capable of
independently altering both the timing and the lift of the valves was recognized. Thus, a single system capable
of achieving the above was thought of and designed. A rack and pinion mechanism powered by a programmed
servo motor mounted vertically seemed most practical in achieving this within the size and space constraints. A
single cylinder diesel Engine was simulated with „Lotus Engine Simulation‟ software to derive the optimum
valve angles and lifts for a range of the Engine operating speed and the system was accordingly programmed
and designed to achieve them. The system was designed in „Creo‟ software and analysed correspondingly in
„Ansys‟ software and then finally assembled on a Diesel Engine in the lab.
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Reference
“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type
of attacks. Therefore, security of the data that transfer over the wireless network is a measure
concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an
important factor. Hence to provide security along with efficient energy utilization of sensor
nodes, Secure and Energy Efficient Hierarchical and Dynamic Elliptic Curve Cryptosystem
(HiDE) scheme is proposed. It includes a hierarchical cluster-based architecture consisting of a
several Area Clusters and a Backbone Network. To provide security Elliptic Curve Cryptography
(ECC) is used. For energy efficient data transmission, Low Energy Adaptive Clustering
Hierarchy (LEACH) is used to select the Cluster Head dynamically. Each Cluster Head collects
the data from their own cluster and transmit to the Destination through the Gateway (GW) in the
Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be
directly linked with the Destination Gateway in a single hop, so needs to hop through other
Gateways to reach the Destination. Data encryption using Elliptic Curve Cryptography provides
high security with small key size than the existing RSA. Key management includes key
computation, key exchanges, data encryption and decryption. Cluster-based cryptographic
mechanism provides efficient energy utilization of sensor nodes along with security and lower
message overhead. Thus, Hierarchical and Dynamic Elliptic Curve Cryptosystem can protect the
confidentiality of sensitive data with low computation complexity, and also keep the
performance of the network in Wireless Sensor Network.
A Study on Mechanical Properties of Vinylester Based BioComposite Material wi...IJERA Editor
In composites a conglomeration produces material properties which are unavailable from individual constituent
materials. The use of petroleum based products as constituents in polymer matrix composite has raised concerns
regarding environmental issue and non-renewability of the resource. Therefore in this work an attempt has been
made to develop a biocomposite material using untreated dupion silk fiber as reinforcement material and vinyl
ester as matrix material with Potato Starch used as filler material by hand layup technique.
The biocomposites were prepared in varying percentage of filler addition (0%, 10%, 20%, and 30%) and
different mechanical tests (tensile, flexure and hardness) were conducted on the samples prepared to the ASTM
standards.
From the results of the experiments conducted on the specimen it can be concluded that the performance of 10%
Starch filler content Biocomposite is satisfactory in all aspects compared to 0%, 20%, and 30% Starch filler
content Biocomposites.
Rack And Pinion Mechanism for Continuous Variable Valve Timing of IC EnginesIJERA Editor
The valve timing is a very closely studied event and effects the performance of an IC Engine greatly with
respect to the Brake Power Produced, Volumetric Efficiency and Emissions etc. The valve event if varied and
experimented with, can result in higher efficiencies and overall improved performance of the Engine. Hence,
various researchers have attempted to temper with the valve timing and thus many Variable Valve Timing
systems have been proposed till date with many of them being implemented by various manufacturers.
However, on reviewing the presently employed systems, the lack of existence of a single system capable of
independently altering both the timing and the lift of the valves was recognized. Thus, a single system capable
of achieving the above was thought of and designed. A rack and pinion mechanism powered by a programmed
servo motor mounted vertically seemed most practical in achieving this within the size and space constraints. A
single cylinder diesel Engine was simulated with „Lotus Engine Simulation‟ software to derive the optimum
valve angles and lifts for a range of the Engine operating speed and the system was accordingly programmed
and designed to achieve them. The system was designed in „Creo‟ software and analysed correspondingly in
„Ansys‟ software and then finally assembled on a Diesel Engine in the lab.
Comparative Ethanol Productivities of Two Different Recombinant Fermenting St...IJERA Editor
Production of biofuel such as ethanol from lignocellulosic biomass is a beneficial way to meet sustainability and energy security in the future. The main challenge in bioethanol conversion is the high cost of processing, in which enzymatic hydrolysis and fermentation are the major steps. Among the strategies to lower processing costs are utilizing both glucose and xylose sugars present in biomass for conversion. An approach featuring enzymatic hydrolysis and fermentation steps, identified as separate hydrolysis and fermentation (SHF) was used in this work. Proposed solution is to use “pre-processing” technologies, including the thermal screw press (TSP) and cellulose-organic-solvent based lignocellulose fractionation (COSLIF) pretreatments. Such treatments were conducted on a widely available feedstock such as source separated organic waste (SSO) to liberate all sugars to be used in the fermentation process. Enzymatic hydrolysis was featured with addition of commercial available enzyme, Accellerase 1500, to mediate enzymatic hydrolysis process. On average, the sugar yield from the TSP and COSLIF pretreatments followed by enzymatic hydrolysis was remarkable at 90%. In this work, evaluation of the SSO hydrolysate obtained from COSLIF and enzymatic hydrolysis pretreaments on ethanol yields was compared by fermentation results with two different recombinant strains: Zymomonas mobilis 8b and Saccharomyces cerevisiae DA2416. At 48 hours of fermentation, ethanol yield was equivalent to 0.48g of ethanol produced per gram of SSO biomass by Z.mobilis 8b and 0.50g of ethanol produced per gram of SSO biomass by S. cerevisiae DA2416. This study provides important insights for investigation of the source-separated organic (SSO) waste on ethanol production by different strains and becomes a useful tool to facilitate future process optimization for pilot scale facilities.
Characterization and DC Conductivity of Novel CuO doped Polyvinyl Alcohol (PV...IJERA Editor
DC conductivity of PVA-CuO nano-composite films have been studied in the present work. The composites were prepared by solution-casting technique. The prepared PVA-CuO composites have been characterized by X-ray diffraction (XRD) analysis, Fourier Transform Infrared Spectroscopy (FT-IR), Scanning Electron Microscopy (SEM) and Energy Dispersive X-ray Spectroscopy (EDXS); which confirmed the presence of CuO in polyvinyl alcohol and the formation of the composite. DC conductivity studies show thermally activated behavior of all the composites. The conductivity was found to increase with the increase in temperature indicating the semiconducting behavior of all the compositions. The activation energy increases as the content of CuO nanoparticles increases from 1 to 4 in wt% in the PVA- CuO nano-composites. Maximum conductivity was observed in 4 wt% of CuO in polyvinyl alcohol.
We are given the historical data of inflow of river observed on Karjan Dam near Vadodara with sampling time interval of a month. We are required to know the inflow of the river in future time using this available historical data. That is to generate inflow of river for future time using the model namely 'Single Site Seasonal Thomas Fiering Model'. Also, we want to find the Statistical Parameters like mean, standard deviation and Correlation coefficient of generated data and compare it with historical data. Once we have the predicted inflow data we may use these prediction of inflow into a storage reservoir for planning the operation of the reservoir to ensure maximum benefit from a limited quantity of stored water.
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
Cellular communications has experienced explosive growth in the past two decades. Today millions of people around the world use cellular phones. Cellular phones allow a person to make or receive a call from almost anywhere. Likewise, a person is allowed to continue the phone conversation while on the move. Cellular communications is supported by an infrastructure called a cellular network, which integrates cellular phones into the public switched telephone network. The cellular network has gone through three generations.The first generation of cellular networks is analog in nature. To accommodate more cellular phone subscribers, digital TDMA (time division multiple access) and CDMA (code division multiple access) technologies are used in the second generation (2G) to increase the network capacity. With digital technologies, digitized voice can be coded and encrypted. Therefore, the 2G cellular network is also more secure. The third generation (3G) integrates cellular phones into the Internet world by providing highspeed packet-switching data transmission in addition to circuit-switching voice transmission. The 3G cellular networks have been deployed in some parts of Asia, Europe, and the United States since 2002 and will be widely deployed in the coming years. The high increase in traffic and data rate for future generations of mobile communication systems, with simultaneous requirement for reduced power consumption, makes Multihop Cellular Networks (MCNs) an attractive technology. To exploit the potentials of MCNs a new network paradigm is proposed in this paper. In addition, a novel sequential genetic algorithm (SGA) is proposed as a heuristic approximation to reconfigure the optimum relaying topology as the network traffic changes. Network coding is used to combine the uplink and downlink transmissions, and incorporate it into the optimum bidirectional relaying with ICI awareness. Numerical results have shown that the algorithms suggested in this thesis provide significant improvement with respect to the existing results, and are expected to have significant impact in the analysis and design of future cellular networks.
Tumor Detection Based On Symmetry InformationIJERA Editor
Various subjects that are paired usually are not identically the same, asymmetry is perfectly normal but sometimes asymmetry can benoticeable too much. Structural and functional asymmetry in the human brain and nervous system is reviewed in a historical perspective. Brainasymmetry is one of such examples, which is a difference in size or shape, or both. Asymmetry analysis of brain has great importance because itis not only indicator for brain cancer but also predict future potential risk for the same. In our work, we have concentrated to segment theanatomical regions of brain, isolate the two halves of brain and to investigate each half for the presence of asymmetry of anatomical regions inMRI.
Enhanced Skewed Load and Broadside Power Reduction in Transition Fault TestingIJERA Editor
This Paper Proposes the T-algorithm technique to optimize the testing Skewed Load and Broadside architecture. And the architecture used to the compare the test pattern results. In this architecture, T-algorithm used to optimize the testing architecture. This architecture compare the test pattern output for the required any type of combinational architecture. The optimization process mainly focused by gate optimization for secure architecture. The proposed system to use the T-algorithm, to optimize the testing clocking level for the required test patterns. This technique to replace the flip flop and the mux arrangement. To reduce the flip flops in Skewed Load architecture. And to develop the accuracy for testing architecture. The proposed system consists of the secure testing architecture and includes the XOR-gate architecture. So the modification process applied by the Broadside and over all Skewed Load architecture. The proposed technique to check the scanning results for the testing process. The testing architecture mainly used to the error attack for the scanning process and the scanning process work with any type of testing architecture. The scanning process to be secure using the T-algorithm for the Skewed Load architecture. And to develop the testing process for the fault identification process. The diagnosis technique to detect error for the scanning process in any type combinational architecture. The T-algorithm used to reduce the circuit complexity for the testing architecture and the testing architecture used to reduce the delay level. And the future process, this technique used to reduce the gate level for the sticky comparator architecture and to modify the clocking function for the testing process. This technique to develop the accuracy level for the testing process compare to the present methodology.
Remaining Life Analysis of Boiler Tubes on Behalf of Hoop Stresses Produced D...IJERA Editor
Boiler tube material plays an important role in efficient power generation from a fossil fuel power plant. In order to meet out the gap between fluids to increase heat available per unit mass flow of steam. Waste heat utilization phenomenon is a big challenge on fossil fuel power plants as after use of high grade coal in thermal power plants the efficiency of power plants is not at the level of required value. Clean and efficient power generation with economical aspects is the basic need of growing power generation plants to justify the quality of power and clean power generation. Life analysis technique to calculate remaining life of boiler tubes at critical zones of high temperature requires much attention and is an important hypothesis in research field. Generation of repetitive and fluctuating stress during flow of high temperature and pressure fluid require proper attention on the methodology to be used to calculate the efficiency of system and absorption efficiency of tube material. In this paper complete mathematical analysis of boiler tubes is conducted for calculation of remaining life of boiler tubes, Hoop stress values are calculated and used with mathematical tool to calculate the efficiency. Hoop stress based calculation of efficiency is more reliable and may give more accurate and practical aspects based results.
Degradation and Microbiological Validation of Meropenem Antibiotic in Aqueous...IJERA Editor
Aqueous UV, UV/H2O2, UV/TiO2 and UV/TiO2/H2O2mediateddegradation/oxidation of the carbapenem antibiotic, meropenem (MERO) was experimentally studied. Degussa P-25 titanium dioxide was used as photocatalyst and UV-light source was used for activation of TiO2.The nanosized titanium dioxide was immobilized on the glass support for improving the efficiency and economics of the photocatalytic processes. The immobilized film of titanium dioxide has been characterized, using X-ray diffraction (XRD) andscanning electron microscopy (SEM).The study of antibiotic degradation was conducted in the specific Batch Photocatalytic Reactor. MERO standard solution was used at 500 μg/ml concentration, which degraded up to 99% of antibiotics. Microbiological assay showed that the loss of antibacterial activity is directly proportional to the time of UV-irradiation. The experiment also showed that the UV-irradiation itself causes the degradation of antibiotics, but in very slow manner in comparison to the photocatalysis process. The experimental study showed that UV/TiO2/H2O2 system is effective and efficient for the treatment of antibiotic waste.
Synthesis and Characterization of Nano Hydroxyapatite with Poly Vinyl Pyrroli...IJERA Editor
Hydroxyapatite (Ca10 (PO4)6(OH)2 ), the main mineral component of bone and teeth, is native to the human body. Hydroxyapatite (HAp) is a desirable implant material due to its biocompatibility and osteoconductivity properties. In this study, nano hydroxyapatite (nHAp) with poly vinyl pyrrolidone (PVP was synthesized at room temperature condition. The synthetic nano hydroxyapatite (nHAp) prepared by wet chemical precipitation method was investigated. Hydroxyapatite is biocompatible with the human organism and is capable of integrating biologically into bone tissue. The synthesized sample were characterized by Fourier transformed infrared spectroscopy (FTIR), X-ray diffraction (XRD), Transmission electron microscope (TEM), Energy dispersive analysis of x-rays techniques (EDAX) and Micro hardness test.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
S04404116120
1. Dr. D Bhattacharya et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.116-120
www.ijera.com 116 | P a g e
Secure Data Aggregation in Wireless Sensor Networks
Dr. Debmalya Bhattacharya
Associate Professor, Department of Electronics & Communication Engineering & Assistant Dean of
Technology, University of Technology & Management, Shillong, Meghalaya, India
Abstract
The Security in sensor networks has become most important aspect along with low power as the sensors are
unattended so there is more possibility of attack in WSN than usual networks, data aggregation security is an
important task as if some false node injects a highly odd value it will affect the whole aggregation process, The
paper reviews the need of security for data aggregation and propose an architecture which can eliminate the
false values injection as well as provides end to end reliability and data freshness, the architecture is also energy
optimized.
Keywords- data aggregation, sensor networks, energy efficiency, Hash
I. INTRODUCTION
Wireless sensor networks are normally
unattended and self-configurable networks, which are
composed of a few to thousands of lightweight and
portable tiny sensing nodes. These networks are
deployed in remote and hostile environments where
these nodes can sense temperature, pressure,
vibration, motion, sound and even the pollutant levels
in targeted regions [2]-[9]. When the sensor node
senses some behavior or phenomenon from the
environment, transducer generates the signal for the
sense data which is further processed and store by the
installed microprocessor and after processing the
signal, transceiver transmits this data to base station
or some upper level aggregator node, through which
the sensor node is wirelessly connected. Performing
all this complex functionality, the size of the sensor
node just vary from a shoebox to a dust of grain [3].
As the sensor nodes are normally targeted in an
uncontrolled environments, physical approaching to
deployed sensors is not possible, so the sensor nodes
have the built in self-configuration functionality.
Sensor nodes make use of multi hop routing
algorithms, through which multiple sensing nodes
simultaneously send the data to some other nodes or
base station. Wireless sensor networks can use
infrared or laser light, but these technologies require
clear line of sight. So wireless sensor networks use
radio communication technology for communication
purpose, which does not require any clear line of
sight [3]. The sense data from the
leaf nodes is routed through multiple routing
paths and intermediate nodes and at the end it reaches
to a base station. The base station may be a simply a
computer or some specialized hardware which can
perform some computation on it, store and forward
data and can also respond to the data sending nodes.
The emergence of senor node architecture with its
advance capabilities to control the different hardware
units and its enhancements in low power and
affordable computational devices has made sensor
networks from dream to reality. Sensor networks are
deployed in widespread targeted areas where they can
work for many years and can sense the environment
behavior and itsdifferent variables without any need
to externally charge their installed batteries. Early
sensor networks were used only for military purposes
such as in battlefield surveillance and keeping track
the motion and other different activities of the enemy
in remote and unreachable areas. Due to the recent
developments and enhancements in sensor networks
technology, wireless sensor networks are not now
merely limited to military applications.
Its typical applications are habitat
monitoring, object tracking, remote controlling,
traffic monitoring [4] and its most complex and
mission critical application is to monitor and control
the nuclear reactors and making preemptive actions
in case of any problem occurs during its normal
working functionality [5].
Sensor nodes are deployed normally in
remote and unattended environments where their
maintenance and battery changing or charging is not
possible, so saving the battery power of the sensor
node increases its lifetime. From energy perspective,
communication is the most costly and expensive
process in wireless sensor networks. Because of
limitation of its design structure, sometimes it may
possible that more than one sensor nodes have
overlapping targeted regions which causes generation
of redundant data packets. Data is correlated in terms
of time and apace whenever it is sensed from the
sensor nodes, so sending duplicate data values again
and again may lead to expire sensor nodes early [8].
RESEARCH ARTICLE OPEN ACCESS
2. Dr. D Bhattacharya et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.116-120
www.ijera.com 117 | P a g e
In wireless sensor networks, wireless medium is used
for data transfer from source to destination, so the
security is the prime factor that should be considered
during the transmission of data, because anybody
tuned to that particular frequency gain access to the
sensed data [6]. Wireless sensor networks are
normally deployed in unattended, untrusted and
hostile environments where the sensor nodes and
wireless communication links can be eavesdropped
easily. Adversary by compromising only one sensor
node or a wireless link can easily forge or alter the
data [7]. Sensor nodes have limited computational
power, small memory size and low storage capacity
as compared to other networks so during the design
of any security and routing protocol for wireless
sensor networks, the resource limitation factor is
always considered. Specially the energy is the
scarcest resource of the wireless sensor networks
which is directly concerned with the life time of the
senor node, so normal public/private key algorithms,
which require complex mathematical computation are
not feasible for these networks [9]. The security of
wireless sensor networks is broadly categorized into
two main types, internal security and external
security. Internal security is called data privacy as
well, and it is maintaining the privacy of sensed data
from the trusted sensor nodes inside the network. The
second type of security is called external security or
data security, in which sensed data is protected from
outsiders such as adversaries or eavesdroppers [7].
In wireless sensor networks data from
source to destination is transferred through some
intermediate aggregator nodes and these nodes act
like a dominating nodes. From security point of view
these intermediate aggregation nodes hold the most
critical position in wireless sensor networks. For
example wireless sensor network is deployed in some
temperature critical environment, which is divided
into different zones and in each zone some sensor
nodes are deployed and one of them acts like a
aggregate cluster node.
In each zone of deployed environment, it is
required to maintain the average temperature value to
25o
C, and if the average temperature value in any
zone is greater or lesser than 25o
C, a temperature
control system which is associated with base station
begins to start working for maintaining the average
temperature value. Leaf sensing nodes which are well
equipped with some powerful security mechanism,
after sensing the temperature value, perform some
cryptographic function on it and send this cipher text
to aggregate cluster node. Aggregate cluster node
decrypts this cipher text into plain text, performs
average aggregation function on the decrypted data
and sends this aggregation value to the base station.
If this trusted aggregate cluster node is compromised,
the adversary can easily forge or alter the temperature
values and disturb the whole temperature of the
environment by sending fake and bogus aggregation
results to temperature control system.
Providing a secure data aggregation, while
preserving the security and privacy of the sense data
is still challenging task because traditional security
algorithms based on cryptography and public/private
keys are very expensive and are not feasible in
wireless sensor networks [9].
Depending on the encryption schemes,
secure data aggregation protocols in wireless sensor
networks are grouped into two main categorizes,
Hop-by-Hop and End-to-End encryption protocols
[7]. In hop-by-hop secure data aggregation, sensor
nodes sense the data, encrypt it and then send this
cipher text to the aggregator node, which then
decrypts it, perform some data aggregation function
on the received data from its child nodes and then
again encrypts this aggregated data and sends it to the
upper level node or base station. But in End-to-End
secure data aggregation, the aggregation nodes do not
have the decryption keys so data aggregation function
at intermediate nodes is performed on the encrypted
data [12]-[13].
II. LITERATURE REVIEW
Wireless sensor networks are emerging
technologies currently being deployed in seismic
monitoring, wild life studies, manufacturing and
performance monitoring. These networks are densely
deployed in some predetermined geographical area to
self-organize into ad-hoc wireless network together
and aggregate data [16]. These networks are
composed of tiny sensor nodes which are powered by
a small built in batteries and are deployed in hostile
and uncontrolled environments where these networks
has to work for many years[1]. Because of their
limitations in energy, storage capacity, computation
and communication, these networks pose unique
security challenges [2]. [1] Proposed a strong security
architecture using network coding and the use of hash
functions, the architecture is energy optimized, but
the architecture can work only for single hop
network, our proposed architecture is an extension of
[1] for multi hop networks.
Data aggregation can also reduce data
packet size, number of data transmissions and the
number of nodes involved to gather data [7]. So to
save energy in sensor networks, data aggregation is
put forward as an in-network processing, the data
from source to destination is transferred through
intermediate aggregator nodes, which perform
aggregate function on the data and then sends
aggregation results to a higher level aggregators [17].
As sensor networks use radio signals for
communication purposes, anybody tuned to that
particular frequency can forge or alter the data, so the
3. Dr. D Bhattacharya et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.116-120
www.ijera.com 118 | P a g e
confidentiality of the transmitted data can be
considered as the most critical [6]-[7]. Confidentiality
in wireless sensor networks is provided through
Homomarphic encryption and allows network data
aggregation. Homomarphic encryption provides the
way to calculate the aggregate over the encrypted
values. But Homomarphic encryption does not
provide data integrity, so by using public key elliptic
curve cryptography, digital signatures can be used to
provide data integrity as well [6]. The sensed data is
not only to be protected externally but from internal
nodes as well. So privacy of sensor data is another
security issue in sensor networks. For preserving the
privacy of sensed data and hiding its details from the
trusted nodes, the algorithm uses the additive
property of complex numbers. Sensor node is pre-
deployed with the two numbers, one is real private
seed and other is imaginary private seed. When the
sensor node sense the data, it first adds it with the
real private seed and gets „a‟ then again it adds the
obtained „a‟ with the imaginary private seed „bi‟ and
data is transformed into complex number form,
encrypts complex number form by using symmetric
key and then transmits this cipher text to its parent
[7]. Data involved in aggregation purposes should not
only belong to trusted nodes but also follow reliable
links. Reputation values are used to ensure that the
data sending nodes are trusted and are not
compromised. The nodes and the aggregators can
sense the behavior of the neighboring sensor nodes in
the environment. Depending on the sense behavior of
sensor nodes a reputation value is calculated, which
depends on the sensor ability of sensing, routing and
availability. This web of trust relationship provides
secure and reliable path for data transfer from sensor
to aggregate node [8]. Algorithms proposed for
security purposes, focus on secure data transfer from
source to destination, but at the same time it is also
needed that proposed algorithm sure to decrease the
communication overhead by transferring less number
of bits through network. Secure End-to-End data
aggregation protocol uses the additive homomarphic
encryption and performs its functionality by
calculating the aggregation value from cipher text
received from the leaf sensing nodes. This protocol is
basically proposed to decrease the transmission of
extra bits for the nodes that are not participating in
the aggregation. The nodes that are not responding or
have no data values for sending, use “0” as their
sense value and sends this cipher text to the aggregate
node. One variable is used for keeping track the
quantity of the non-responding nodes [10].
The security issues such as authentication,
integrity and data freshness become very crucial
when sensors are deployed in hostile environments
where they are prone to node failures and
compromised [9]. Secure data aggregation (SDA)
scheme is resilient to intruder devices and single
node compromise. It is based on delayed aggregation
and delayed authentication. Senor nodes need to
buffer the data to authenticate it once the shared key
is revealed by the base station. It also provides
integrity and data freshness but data can be altered
once the parent and child hierarchy is compromised
[18]. Authentication can be provided both for end to
end and hop by hop. For this purpose a pair of
aggregated values is used, one is for authentication of
hop-by-hop and the other one is for authentication of
end-to-end. Besides such a pair, the ID list
representing sensor nodes involves in a pair of
aggregated values is produced and used to regenerate
MAC to check integrity along the way at the base
station. However, the concatenation of IDs will occur
the overhead of data aggregation, particularly in
scalability [19]. Node compromise in data
aggregation is threatening as compromised sensing
nodes will inject false data in aggregation. Injected
false data and adversary node is identified by
specified external nodes in parent child network
hierarchy. The role of the external node is just to
monitor the parent and children nodes and then report
to the base station. Keys are pre-deployed and shared
among nodes for authentication purpose and the
judgment of false data nodes is done through decision
of majority [20].
III. PROPOSED ARCHITECTURE
Here we will propose a security mechanism
in which first odd data values are identified and then
the fault or compromised nodes are permanently
removed from the network through hash base
authentication at aggregate node.
The proposed architecture is shown in
Figure 1. Initially the value P0 is predeployed in all
the sensor nodes and this value is shared with the
aggregator node as well. When the leaf sensing node
A senses some data A1 from the environment, it
concatenates A1 with predeployed P0 and calculates
hash on it, and this calculated hash and the sense data
A1 is sent to next sensing node B.
The format of the data from the node A to B is like
A1 // H (A1 // P0)
When the sensing node B receives the data
from the node A, it first calculates the difference of
B1 and A1 like (B1-A1), and then concatenates it with
the predeployed P0, calculates its hash like H (B1-A1
// P0), and appends the difference of B1 and A1 and
calculated hash with the old data packet received
from the sensor node A, and sends this data to the
next sensing node C.
5. Dr. D Bhattacharya et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.116-120
www.ijera.com 120 | P a g e
wireless sensor networks,”in The Second
Annual International Conference on Mobile
and Ubiquitous Systems: Networking and
Services, 2005, pp. 109–117.
[13] J. Girao, D. Westhoff, and M. Schneider,
“CDA: Concealed Data Aggregation in
Wireless Sensor Networks,” 40th IEEE
International Conference on
Communications, May 2005.
[14] J. M. Kahn, R. H. Katz, and K. S. J. Pister,
“Next century challenges: mobile
networking for smart dust,” MobiCom 99:
Proc. 5th ACM/IEEE Intl. Conf. on Mobile
computing and networking, pp. 271–2781,
1999.
[15] A. Ephremides and B. Hajek,“ Information
theory and communication networks: an
unconsummated union,”IEEE Trans. on
Inform. Theory, vol. 44, no. 6, pp. 2416–
2434, 1998.
[16] N. Hu, Randy R. K. Smith and P. G.
Bradford „Security for Fixed Sensor
Networks‟ Proceedings of the 42nd annual
Southeast regional Information Sciences,
Prince Sultan College for Tourism
conference, ACM Press, 2004, NY, USA .
[17] Ying Sang, Hong Shen „Secure Data
Aggregation in Wireless Sensor Networks‟
IEEE Proceedings ofthe Seventh
International Conference.
Dr. D. Bhattacharya,finished his Master
Degree in 2002 from Calcutta University in
Electronics. He obtained his PhD from UK in 2007.
Presently, he is working as Associate Professor in the
Department of ECE and Assistant Dean of
Technology at University of Technology &
Management, Shillong, and Meghalaya. He has more
than 7 years of experience in the field of Engineering
Education and 5 years of experiences in Research.
His area of research work in Antenna Design &
Application of Digital Signal Processing in Bio-
Medical Electronics research.