Securing cluster based adhoc network through balanced clustering with distribution authorities of key distribution and key management using deployment knowledge
Abstract In this paper, we address key management in cluster-based mobile ad hoc networks (MANETs). We present a fully-distributed ID-based multiple secrets key management scheme (IMKM). This scheme is implemented via a combination of ID-based multiple secrets and threshold cryptography. Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. Our proposed analysis includes the effect of packet generation model, random deployment of sensors, dynamic cluster head assignment, data compression, and energy consumption model at the sensors. a new protocol called Equalized Cluster Head Election Routing Protocol (ECHERP), which pursues energy conservation through balanced clustering, is proposed. Performance evaluation of ECHERP is carried out through simulation tests. We also present a novel key predistribution scheme that uses deployment knowledge to divide deployment regions into overlapping clusters, each of which has its own distinct key space. Through careful construction of these clusters, network resilience is improved, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on Exclusion Basis Systems (EBS); a combinatorial formulation of the group key management problem. Initially, clusters are formed in the network and the cluster heads are selected based on the energy cost, coverage and processing capacity. The sink assigns cluster key to every cluster and an EBS key set to every cluster head. The EBS key set contains the pairwise keys for intra-cluster and inter-cluster communication. During data transmission towards the sink, the data is made to pass through two phases of encryption thus ensuring security in the network. Our results include performance evaluation in terms of security metrics in clustered WSN and a detailed analysis of resource utilization. Keywords: cluster, deployment knowledge, energy efficiency key predistribution, event-driven, exclusion basis systems, hierarchical routing, ID-based cryptography, key agreement, key management, lifetime, location-aware protocols, mobile ad hoc network, Network coding, , random deployment, Security, secret sharing, secret key distribution, sensor networks, volatile environments, Wireless sensor networks secure group communications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the
remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
Hierarchical Sensor Network organization is
widely used to achieve energy efficiency in Wireless Sensor
Networks(WSN). To achieve security in hierarchical WSN,
it is important to be able to encrypt the messages sent
between sensor nodes and its cluster head. The key
management task is challenging due to resource constrained
nature of WSN. In this paper we are proposing two key
management schemes for hierarchical networks which
handles various events like node addition, node compromise
and key refresh at regular intervals. The Tree-Based
Scheme ensures in-network processing by maintaining some
additional intermediate keys. Whereas the CRT-Based
Scheme performs the key management with minimum
communication and storage at each node.
This document summarizes techniques for securing mobile ad hoc networks (MANETs) against security threats. It discusses cryptographic approaches using keys, a trusted certificate server approach, and node-capture attack detection methods. Cryptographic solutions use encryption but are resource-intensive, while other approaches use trust, observation or reputation but are still vulnerable to some attacks. The document surveys these security methods, outlining their capabilities and limitations to provide researchers an overview of the challenges and potential solutions in securing MANETs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the
remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
Hierarchical Sensor Network organization is
widely used to achieve energy efficiency in Wireless Sensor
Networks(WSN). To achieve security in hierarchical WSN,
it is important to be able to encrypt the messages sent
between sensor nodes and its cluster head. The key
management task is challenging due to resource constrained
nature of WSN. In this paper we are proposing two key
management schemes for hierarchical networks which
handles various events like node addition, node compromise
and key refresh at regular intervals. The Tree-Based
Scheme ensures in-network processing by maintaining some
additional intermediate keys. Whereas the CRT-Based
Scheme performs the key management with minimum
communication and storage at each node.
This document summarizes techniques for securing mobile ad hoc networks (MANETs) against security threats. It discusses cryptographic approaches using keys, a trusted certificate server approach, and node-capture attack detection methods. Cryptographic solutions use encryption but are resource-intensive, while other approaches use trust, observation or reputation but are still vulnerable to some attacks. The document surveys these security methods, outlining their capabilities and limitations to provide researchers an overview of the challenges and potential solutions in securing MANETs.
A Comparative Study of Group Key Management in MANETIJERA Editor
A Mobile Ad-Hoc Network (MANET) is a self organized network, with no fixed infrastructure, limited
resources and limited physical security. Security in such an environment is an essential requirement. Key
management is a salient element in MANET security. It is responsible for key generation, storage, distribution,
updating, revocation, deleting, and archiving. Key management protocols are classified into symmetric,
asymmetric, group, and hybrid. Group key management is a point of interest for researchers with the growing
usage of mobile devices and the rising of multicast communication. This paper surveys different approaches in
group key management schemes. A comparative study is demonstrated in terms of reliability, computational
complexity, storage cost, communication overheads, pre-requirements, security levels, robustness,
vulnerabilities, scalability, energy and mobility. Finally, the study concludes the pros and cons of each protocol.
This document summarizes a research paper about providing security for data during multicasting using encryption. It discusses how encryption can be used to encrypt data before it is sent to multiple users to protect against malicious attacks. It also discusses different encryption algorithms and keys that can be used, including symmetric keys where one key is used for encryption and decryption, and asymmetric keys where a public key is used for encryption and a private key for decryption. The paper also reviews related work on secure group communication and key management techniques.
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
The document proposes a secure data retrieval scheme for disruption tolerant military networks using ciphertext-policy attribute-based encryption (CP-ABE) combined with a two-party computation protocol. Key challenges in decentralized disruption tolerant networks include attribute revocation, key escrow issues due to a single trusted authority, and coordination of attributes from multiple authorities. The proposed scheme addresses these by having multiple independent key authorities handle attributes and issue user keys using a two-party computation protocol, preventing any single authority from accessing encrypted data or combining attribute keys. This allows for secure and efficient access control and retrieval of confidential data distributed across disruption tolerant networks.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
The document proposes a mechanism for establishing trust-based secure routes for data communication between mobile nodes in a mobile ad hoc network (MANET). It aims to dynamically increase the trust level between nodes from low to high using proxy nodes. When nodes need to securely communicate, they will generate dynamic secret session keys either directly or through proxy nodes using message digest and Diffie-Hellman protocols. The mechanism is implemented on reactive routing protocols and finds routes through trusted intermediate nodes that share secret keys. This may result in non-optimal routes but guarantees security. It also describes how a new node can join and how trusted nodes can act as proxies to help other nodes establish shared keys.
This document presents a mathematical approach for calculating reliability in wireless sensor networks (WSN) for security purposes. It discusses three key aspects: 1) calculating the reliability of the interconnected network backbone through factors like bandwidth and signal transmission, 2) calculating the reliability of the overall WSN by considering parameters like performance and total reliability, and 3) classifying data aggregation schemes which can help provide secure and accurate data aggregation. The approach aims to estimate system working quality and design a reliable security system through these reliability calculations.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
This document proposes a new encryption scheme called compact summation key encryption for secure data sharing in hybrid cloud storage. It aims to address limitations of existing approaches like predefined hierarchical schemes, attribute-based encryption, and identity-based encryption which cannot provide security to individual files or have non-constant size keys. The new scheme uses five algorithms: setup, key generation, encryption, extraction and decryption. It generates constant size public and master secret keys. Encryption uses file indexes and bilinear groups to create ciphertexts. Extraction combines decryption keys into a single compact summation key using bilinear pairing operations. This key can then decrypt ciphertexts for multiple file indexes, improving flexibility and efficiency of secure data sharing in cloud storage.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
1. The document proposes an efficient Group Based Multicast Hierarchy (GBMH) algorithm using a Secure Ad hoc On Demand Distance Vector (SAODV) routing protocol to provide secure multicast communication in ad hoc networks.
2. The GBMH algorithm forms a multicast hierarchy by electing local controllers who manage subgroups and are responsible for local key management. This reduces the effect of membership changes.
3. Periodic updates of node join and leave information across the multicast hierarchy helps overcome issues of end-to-end delay and fault tolerance in multicast transmissions resulting from node mobility.
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
The document proposes an efficient scheme for secure data sharing among dynamic cloud members. It aims to address key challenges in sharing private data in the cloud due to frequent changes in group membership. The proposed scheme uses techniques like elliptic curve cryptography to securely distribute private keys to users without relying on secure communication channels or certificate authorities. It also enables fine-grained access control and protects against collusion attacks where revoked users cannot access original data even by joining with third parties. The scheme achieves efficient dynamic operations to handle user additions and revocations without requiring key updates for other users.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document summarizes a research paper that analyzes and compares the energy consumption of different key management schemes in wireless sensor networks (WSNs). It finds that the NchooseK key management scheme consumes less energy than the pre-shared key (PSK) scheme for various key operations like generation, distribution, encryption, and verification. Through simulations of WSNs of varying sizes, the paper measures the energy used by each scheme during different steps and operations. The results show that NchooseK has more stable and consistent energy patterns compared to PSK, and consumes less energy overall for authentication and communication between sensor nodes. The paper concludes that NchooseK is a more scalable and energy-efficient scheme for key management in W
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly
versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social
insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military
applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
The document summarizes a research paper that proposes a system for securely performing operations like scaling and cropping on encrypted images stored in the cloud. The system uses a 2Dcrypt technique based on Paillier cryptosystem and tiling scheme. It aims to improve efficiency by avoiding data duplication using Shamir secret sharing algorithm. The system generates tokens using a timestamp for authorization and allows cloud servers to perform operations on encrypted images securely for a specific time period. It addresses limitations of existing systems like high storage usage and lack of collusion resistance.
Research on key predistribution scheme of wireless sensor networksIAEME Publication
This document summarizes a research paper on a novel key pre-distribution scheme for wireless sensor networks. It begins with an introduction to the challenges of key management in wireless sensor networks. It then describes the proposed scheme which has three phases: setup, direct key establishment, and path key establishment. The setup phase generates a large key pool and distributes keys to each sensor node. Direct key establishment allows sensor nodes to discover if they share keys directly. Path key establishment establishes keys through intermediate nodes if direct sharing fails. Performance analysis shows the scheme has higher local connectivity and stronger resilience against node capture attacks compared to previous schemes.
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
This document proposes a secure authentication approach for wireless sensor networks using dynamic key management and zero knowledge protocols. It begins with background on wireless sensor networks and security issues. It then describes related work on key predistribution and dynamic key management schemes. A proposed algorithm is described that uses a rekeying mechanism, zero knowledge authentication without directly transmitting secret keys, and dynamic keys that change for each authentication. Simulation results on networks of up to 25 nodes show the approach is efficient and can authenticate nodes while preventing attacks like cloning.
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
The document discusses key establishment techniques and cluster-based group key agreement protocols for wireless sensor networks. It reviews pairwise keying, clustering, and how integrating the two can provide security. Several cluster-based group key agreement protocols are described, including HKAP, GKA-CH, PB-GKA-HGM, and AP-1 and AP-2. These protocols establish cluster and group keys using different hierarchical structures and key agreement methods. The document concludes by comparing the protocols based on their topology and structure.
A Comparative Study of Group Key Management in MANETIJERA Editor
A Mobile Ad-Hoc Network (MANET) is a self organized network, with no fixed infrastructure, limited
resources and limited physical security. Security in such an environment is an essential requirement. Key
management is a salient element in MANET security. It is responsible for key generation, storage, distribution,
updating, revocation, deleting, and archiving. Key management protocols are classified into symmetric,
asymmetric, group, and hybrid. Group key management is a point of interest for researchers with the growing
usage of mobile devices and the rising of multicast communication. This paper surveys different approaches in
group key management schemes. A comparative study is demonstrated in terms of reliability, computational
complexity, storage cost, communication overheads, pre-requirements, security levels, robustness,
vulnerabilities, scalability, energy and mobility. Finally, the study concludes the pros and cons of each protocol.
This document summarizes a research paper about providing security for data during multicasting using encryption. It discusses how encryption can be used to encrypt data before it is sent to multiple users to protect against malicious attacks. It also discusses different encryption algorithms and keys that can be used, including symmetric keys where one key is used for encryption and decryption, and asymmetric keys where a public key is used for encryption and a private key for decryption. The paper also reviews related work on secure group communication and key management techniques.
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
The document proposes a secure data retrieval scheme for disruption tolerant military networks using ciphertext-policy attribute-based encryption (CP-ABE) combined with a two-party computation protocol. Key challenges in decentralized disruption tolerant networks include attribute revocation, key escrow issues due to a single trusted authority, and coordination of attributes from multiple authorities. The proposed scheme addresses these by having multiple independent key authorities handle attributes and issue user keys using a two-party computation protocol, preventing any single authority from accessing encrypted data or combining attribute keys. This allows for secure and efficient access control and retrieval of confidential data distributed across disruption tolerant networks.
Latest IEEE Projects on All Domains in Computer/ Electronics Engineering
____________________________________________
We develop projects for final year students in computer engineering. These are some topics which are feasible to implement.
For more topics please visit: www.ns2academy.in
Or call us on 9970186685/ 020 24394323
Or mail us: info@ns2academy.in
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
The document proposes a mechanism for establishing trust-based secure routes for data communication between mobile nodes in a mobile ad hoc network (MANET). It aims to dynamically increase the trust level between nodes from low to high using proxy nodes. When nodes need to securely communicate, they will generate dynamic secret session keys either directly or through proxy nodes using message digest and Diffie-Hellman protocols. The mechanism is implemented on reactive routing protocols and finds routes through trusted intermediate nodes that share secret keys. This may result in non-optimal routes but guarantees security. It also describes how a new node can join and how trusted nodes can act as proxies to help other nodes establish shared keys.
This document presents a mathematical approach for calculating reliability in wireless sensor networks (WSN) for security purposes. It discusses three key aspects: 1) calculating the reliability of the interconnected network backbone through factors like bandwidth and signal transmission, 2) calculating the reliability of the overall WSN by considering parameters like performance and total reliability, and 3) classifying data aggregation schemes which can help provide secure and accurate data aggregation. The approach aims to estimate system working quality and design a reliable security system through these reliability calculations.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
This document proposes a new encryption scheme called compact summation key encryption for secure data sharing in hybrid cloud storage. It aims to address limitations of existing approaches like predefined hierarchical schemes, attribute-based encryption, and identity-based encryption which cannot provide security to individual files or have non-constant size keys. The new scheme uses five algorithms: setup, key generation, encryption, extraction and decryption. It generates constant size public and master secret keys. Encryption uses file indexes and bilinear groups to create ciphertexts. Extraction combines decryption keys into a single compact summation key using bilinear pairing operations. This key can then decrypt ciphertexts for multiple file indexes, improving flexibility and efficiency of secure data sharing in cloud storage.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
1. The document proposes an efficient Group Based Multicast Hierarchy (GBMH) algorithm using a Secure Ad hoc On Demand Distance Vector (SAODV) routing protocol to provide secure multicast communication in ad hoc networks.
2. The GBMH algorithm forms a multicast hierarchy by electing local controllers who manage subgroups and are responsible for local key management. This reduces the effect of membership changes.
3. Periodic updates of node join and leave information across the multicast hierarchy helps overcome issues of end-to-end delay and fault tolerance in multicast transmissions resulting from node mobility.
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
The document proposes an efficient scheme for secure data sharing among dynamic cloud members. It aims to address key challenges in sharing private data in the cloud due to frequent changes in group membership. The proposed scheme uses techniques like elliptic curve cryptography to securely distribute private keys to users without relying on secure communication channels or certificate authorities. It also enables fine-grained access control and protects against collusion attacks where revoked users cannot access original data even by joining with third parties. The scheme achieves efficient dynamic operations to handle user additions and revocations without requiring key updates for other users.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document summarizes a research paper that analyzes and compares the energy consumption of different key management schemes in wireless sensor networks (WSNs). It finds that the NchooseK key management scheme consumes less energy than the pre-shared key (PSK) scheme for various key operations like generation, distribution, encryption, and verification. Through simulations of WSNs of varying sizes, the paper measures the energy used by each scheme during different steps and operations. The results show that NchooseK has more stable and consistent energy patterns compared to PSK, and consumes less energy overall for authentication and communication between sensor nodes. The paper concludes that NchooseK is a more scalable and energy-efficient scheme for key management in W
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly
versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social
insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military
applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
The document summarizes a research paper that proposes a system for securely performing operations like scaling and cropping on encrypted images stored in the cloud. The system uses a 2Dcrypt technique based on Paillier cryptosystem and tiling scheme. It aims to improve efficiency by avoiding data duplication using Shamir secret sharing algorithm. The system generates tokens using a timestamp for authorization and allows cloud servers to perform operations on encrypted images securely for a specific time period. It addresses limitations of existing systems like high storage usage and lack of collusion resistance.
IRJET- Securely Performing Operations on Images using PSNR
Similar to Securing cluster based adhoc network through balanced clustering with distribution authorities of key distribution and key management using deployment knowledge
Research on key predistribution scheme of wireless sensor networksIAEME Publication
This document summarizes a research paper on a novel key pre-distribution scheme for wireless sensor networks. It begins with an introduction to the challenges of key management in wireless sensor networks. It then describes the proposed scheme which has three phases: setup, direct key establishment, and path key establishment. The setup phase generates a large key pool and distributes keys to each sensor node. Direct key establishment allows sensor nodes to discover if they share keys directly. Path key establishment establishes keys through intermediate nodes if direct sharing fails. Performance analysis shows the scheme has higher local connectivity and stronger resilience against node capture attacks compared to previous schemes.
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
This document proposes a secure authentication approach for wireless sensor networks using dynamic key management and zero knowledge protocols. It begins with background on wireless sensor networks and security issues. It then describes related work on key predistribution and dynamic key management schemes. A proposed algorithm is described that uses a rekeying mechanism, zero knowledge authentication without directly transmitting secret keys, and dynamic keys that change for each authentication. Simulation results on networks of up to 25 nodes show the approach is efficient and can authenticate nodes while preventing attacks like cloning.
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
The document discusses key establishment techniques and cluster-based group key agreement protocols for wireless sensor networks. It reviews pairwise keying, clustering, and how integrating the two can provide security. Several cluster-based group key agreement protocols are described, including HKAP, GKA-CH, PB-GKA-HGM, and AP-1 and AP-2. These protocols establish cluster and group keys using different hierarchical structures and key agreement methods. The document concludes by comparing the protocols based on their topology and structure.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
Wireless Sensor Networks (WSNs) are critical component in many applications that used for data
collection. Since sensors have limited resource, Wireless Sensor Networks are more vulnerable to
attacks than other wireless networks. It is necessary to design a powerful key management scheme for WSNs
and take in consideration the limited characteristics of sensors. To achieve security of communicated
data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called
Symmetric Key Management Scheme (SKMS). SKMS used Symmetric Key Cryptography that depends
only on a Hash function and XOR operation for securing homogeneous and heterogeneous hierarchical
WSNs. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation
results show that the proposed scheme provides security, save the energy of sensors with low
computation overhead.
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
Wireless Sensor Networks (WSNs) are critical component in many applications that used for data collection. Since sensors have limited resource, Wireless Sensor Networks are more vulnerable to attacks than other wireless networks. It is necessary to design a powerful key management scheme for WSNs and take in consideration the limited characteristics of sensors. To achieve security of communicated data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called Symmetric Key Management Scheme (SKMS). SKMS used Symmetric Key Cryptography that depends only on a Hash function and XOR operation for securing homogeneous and heterogeneous hierarchical WSNs. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation results show that the proposed scheme provides security, save the energy of sensors with low computation overhead.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Refining data security in infrastructurenetworks support of multipath routingeSAT Journals
Abstract An infrastructure network is a self-organizing network with help of Access Point (AP) of wireless links connecting nodes to another. The nodes can communicate without an ad hoc. They form an uninformed topology(BSS/ESS), where the nodes play the role of routers and are free to move randomly. Infrastructure networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks at present.In recent times some clarification are proposed to provide authentication, confidentiality, availability, secure routing and intrusion avoidance in infrastructure networks. Implementing security in such dynamically changing networks is a hard task. Infrastructure network characteristics should be taken into consideration to be clever to design efficient solutions. Here we spotlight on civilizing the flow transmission privacy in infrastructure networks based on multipath routing. Certainly, we take benefit of the being of multiple paths between nodes in an infrastructure network to increase the confidentiality robustness of transmitted data with the help of Access Point. In our approach the original message to secure is split into shares through access point that are encrypted and combined then transmitted along different disjointed existing paths between sender and receiver. Even if an intruderachieve something to get one or more transmitted distribute the likelihood that the unique message will be reconstituted is very squat.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
Abstract Wireless Sensor Network (WSN) comprises of sensor nodes, which form a network by building connections wirelessly, to send detected information from source to destination. Routing Protocols are utilized to shape honest to goodness and littlest routes between a starting node (source) and ending node (destination). Numerous WSN applications use various hierarchical routing protocols. Low Energy Adaptive grouping (LEACH) is the first hierarchical routing protocols and it takes after the standard of forming cluster of nodes and picking a cluster head randomly among the nodes for inter cluster communication. This type of cluster head election leads to attack by adversary node, hence a Modified LEACH algorithm is proposed in this paper. The execution of LEACH and Modified LEACH is assessed utilizing distinctive performance measurements and Modified LEACH was discovered to be extremely compelling in enhancing overall performance of the WSN. MATLAB is made use of, to simulate the undertaking situation. Keywords: WSN, LEACH, Hierarchical protocols, Cluster Head.
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of
messages, battery exhausting, and nodes compromising. While most of these attacks can be
dealt with through cryptographic security protocols provided by key management schemes,
there are always a few that manage to really cause problems. One such attack that is most
common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture
and compromise some nodes and inject them into several locations throughout the network in
order to conduct other types of attacks. Moreover, if this attack is not detected early, then these
replicated injected nodes will consume a large amount of the network resources. In this paper,
we analyze several key management schemes that can be used for checking integrity and
preventing cloning attacks. After analyzing the problems associated with these schemes, we
propose a model that allows us to distinguish between legitimate nodes and cloned nodes in
such sensor networks.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
The document describes a proposed secure clustering protocol for wireless sensor networks that aims to reduce energy consumption while satisfying security needs. The protocol has four phases: 1) Preparation, where keys are distributed and dynamic clusters are formed based on signal strength. Nodes send identifiers to the base station. 2) Aggregator selection, where a node is selected in each cluster as the data aggregator. 3) Data aggregation, where non-aggregator nodes send data to the aggregator node. 4) Data gathering, where aggregator nodes send aggregated data to the base station. The goal is to distribute workload, reduce transmissions, and hide the identities of aggregator nodes to protect against attacks.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
Similar to Securing cluster based adhoc network through balanced clustering with distribution authorities of key distribution and key management using deployment knowledge (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Securing cluster based adhoc network through balanced clustering with distribution authorities of key distribution and key management using deployment knowledge
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 316
SECURING CLUSTER BASED ADHOC NETWORK THROUGH
BALANCED CLUSTERING WITH DISTRIBUTION AUTHORITIES OF
KEY DISTRIBUTION AND KEY MANAGEMENT USING DEPLOYMENT
KNOWLEDGE
Priyanka Manhas1
, Parminder Kaur2
1
Student, 2
Asst Prof, Department of Computer Science & Engineering, Chandigarh University (Gharuan, Mohali) India
priyankamanhas36@gmail.com, parminder.cu@gmail.com
Abstract
In this paper, we address key management in cluster-based mobile ad hoc networks (MANETs). We present a fully-distributed ID-
based multiple secrets key management scheme (IMKM). This scheme is implemented via a combination of ID-based multiple secrets
and threshold cryptography. Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic
nature of the network and the lack of centralized management. Our proposed analysis includes the effect of packet generation model,
random deployment of sensors, dynamic cluster head assignment, data compression, and energy consumption model at the sensors. a
new protocol called Equalized Cluster Head Election Routing Protocol (ECHERP), which pursues energy conservation through
balanced clustering, is proposed. Performance evaluation of ECHERP is carried out through simulation tests. We also present a novel
key predistribution scheme that uses deployment knowledge to divide deployment regions into overlapping clusters, each of which has
its own distinct key space. Through careful construction of these clusters, network resilience is improved, we focus on the management
of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on Exclusion Basis
Systems (EBS); a combinatorial formulation of the group key management problem. Initially, clusters are formed in the network and
the cluster heads are selected based on the energy cost, coverage and processing capacity. The sink assigns cluster key to every
cluster and an EBS key set to every cluster head. The EBS key set contains the pairwise keys for intra-cluster and inter-cluster
communication. During data transmission towards the sink, the data is made to pass through two phases of encryption thus ensuring
security in the network. Our results include performance evaluation in terms of security metrics in clustered WSN and a detailed
analysis of resource utilization.
Keywords: cluster, deployment knowledge, energy efficiency key predistribution, event-driven, exclusion basis systems,
hierarchical routing, ID-based cryptography, key agreement, key management, lifetime, location-aware protocols,
mobile ad hoc network, Network coding, , random deployment, Security, secret sharing, secret key distribution, sensor
networks, volatile environments, Wireless sensor networks secure group communications.
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Recent literatures have sought to address the key management
issues in MANETs. AD hoc networks are subject to various
types of attacks ranging from passive eavesdropping to active
impersonation, message replay, and message distortion.
Moreover, it is difficult to deploy security mechanisms in
MANETs because of the absence of fixed infrastructure,
shared wireless medium, node mobility, limited resources of
mobile devices, bandwidth restricted and error-prone
communication links. Group key agreement (GKA) [3]-[4] is
another important challenge of key management in MANETs.
GKA protocols allow two or more parties to agree on a
common group key and exchange information among them
over an insecure channel. we propose an ID-based multiple
secrets key management (IMKM) protocol to address all the
above concerns. Our scheme is a comprehensive solution for
inter and intra-cluster key Management, including key
revocation, key update, and group key agreements. The main
focus of this work is on the lifetime analysis of randomly
deployed clustered networks. Clustered WSNs are suggested
for extending the network scalability and ease of data
processing, [1], [2]. In clustered networks, usually a
representing node, called cluster head (CH), is assigned to
each cluster. the lifetime of a randomly deployed clustered
network is modeled using a probabilistic approach. The
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 317
probabilistic approach is motivated by the stochastic nature of
the network lifetime which is mainly due to the randomness of
the sensors deployment. Most of the protocols use clusters in
order to provide energy efficiency and to extend the network
lifetime. Each cluster first elects a node as the cluster head
(CH), and then, the nodes in every cluster send their data to
their own cluster head. The cluster head sends its data to the
base station. This data transfer can be performed in two
alternative ways. Either directly, in the case in which the
cluster head is located close to the base station, or via
intermediate cluster heads. In this paper, a novel energy
efficient protocol, named ECHERP, is proposed. ECHERP,
contrary to other existing cluster-based protocols that select a
random node or the node with the higher energy at a particular
time instance as the new cluster head, considers the current
and the estimated future residual energy of the nodes, along
with the number of rounds that can be cluster heads, in order
to maximize the network lifetime. The network is modeled as
a linear system. In this paper, we propose a novel key
predistribution scheme that makes use of region-based
deployment knowledge. Our scheme constructs a set of
clusters such that each cluster contains a small number of
deployment regions, all of which are neighbors of each other.
Furthermore, every pair of neighboring deployment regions
belongs to at least one cluster. Each cluster has its own distinct
key space, and it is from these cluster key spaces that nodes
are assigned their keys. In this manner, we guarantee that
nodes in neighboring regions share a key with a given overlap
probability, while nodes in non neighboring regions do not
share any keys. We make use of the result developed in [18],
which states that under certain conditions, maximizing the key
pool size used by the scheme also maximizes its resilience.
Our clustering scheme is designed to maximize the overall key
pool size, which results in greatly improved network resilience
without compromising network connectivity or
communications overhead. Confidentiality, authenticity,
availability, and integrity are typical security goals for WSNs.
Indeed, securing the network for applications, such as border
control and tactical defense operations is among the main
design objectives. An EBS consists of several subsets of the
member set collection. In the EBS, every subset is analogous
to a particular key and the nodes which possess the key
become the element of the subset.
The remainder of the paper is organized as follows: section 2
provide an (fully-distributed ID-based multiple secrets key
management scheme) IMKM protocol. in section 3,we
introduce proposed protocol that models the network as a
linear system in order to select the cluster head that minimizes
the energy consumption in the cluster, while in section 4,we
present our basic predistribution scheme with EBS, In the
EBS, every subset is analogous to a particular key and the
nodes which possess the key become the element of the
subset. Finally, we provide a conclusion with future directions
in section 5.
2. IMKM (ID-BASED MULTIPLE SECRETS KEY
MANAGEMENT SCHEME)
PROTOCLOS: This section presents our IMKM protocol. It
consists of five phases: network initialization, key revocation,
multiple secrets key update, member joining and eviction, and
group key generation.
Fig 1 IMKM Protocol Phases
2.1 Network Initialization
Network initialization comprise in 3 steps. these are shown as
below:
Fig 2 network initialization steps
The description of network initialization steps that is
generation of pairing parameters and key initiation followed
by generation of pair-wise keys with verifiable secret sharing
is We consider basic operations in the scenario where there is
an offline PKG center. These basic operations consist of
system setup and private key extraction. system setup and key
extraction is done in generation of pairing parameters and key
initiation. A pair-wise key agreement protocol allows two
parties to establish their session keys and use the keys to
encrypt the communications between them. McCullagh and
Barreto [31] proposed a two-party authenticated identity-based
key agreement using bilinear pairings. In order to provide
perfect forward secrecy, we modified their scheme to generate
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 318
our pair-wise keys. pair-wise key agreement protocol satisfies
all the following security properties [31]: implicit key
authentication, known session key security, no key-
compromise impersonation, perfect forward secrecy, no
unknown key-share and no key control. Therefore, it can be
securely employed in MANETs. This is done in generation of
pair-wise keys. And in verifiable secret sharing, In order to
establish a (�, �) threshold sharing, we require that all cluster
heads (CHs) participate in the construction of the master secret
key, and that the role of distributed PKG (D-PKG) be assigned
to the CHs of the network
2.2 Key Revocation
The key revocation scheme [34]-[36] is comprised of three
sub-processes: misbehavior notification, revocation generation
and revocation verification.
Fig 3 key revocation steps
2.2.1 Misbehavior Notification
Upon detection of 𝐶𝐻𝑖’s misbehavior, 𝐶𝐻𝑗 generates an
accusation, {𝐼𝐷𝑖, 𝑇𝑗}𝐾𝑗,𝑣 , against 𝐶𝐻𝑖 and securely transmits
it to 𝐶𝐻𝑣 , where 𝑇𝑗 is a time stamp used to withstand
message replay attacks and 𝐾𝑗,𝑣 is the pair-wise key of 𝐶𝐻𝑗
and 𝐶𝐻𝑣(1 ≤ 𝑣 ≤ 𝑛, 𝑣 ∕= 𝑖, 𝑗). To prevent 𝐶𝐻𝑖 from
temporarily behaving normally (artificially), the accusation
should not be sent to that node.
2.2.2 Revocation Generation
Upon receipt of an accusation from 𝐶𝐻𝑗 , the message will
simply be dropped if the accuser itself has been revoked. The
accused 𝐶𝐻𝑖 is diagnosed as compromised when the number
of accusations against it reaches a predefined revocation
threshold, 𝛽. In IMKM, generation of a revocation requires the
joint effort of 𝑡 CHs. We assume the D-PKG with the largest
ID acts as the role of revocation leader. Each of the 𝑡
unrevoked 𝐶𝐻𝑗 , having the smallest IDs, generates a partial
revocation, 𝑅𝐸𝑉𝑗 = 𝐻1(𝐼𝐷𝑖)𝑑𝑗 , and sends it to the revocation
leader securely using the pair-wise key. The revocation leader
checks whether the equation 𝐻2(𝑃 𝑝𝑢𝑏)𝑅𝐸𝑉𝑗 = 𝑑𝑗 𝑝𝑢𝑏 𝐻1(𝐼𝐷𝑖)
holds. If the partial revocation is not valid, the revocation
leader considers 𝐶𝐻𝑗 to be misbehaving and issues a signed
accusation against it. The revocation leader can construct a
complete revocation from these partials using Lagrange
interpolation. A complete revocation is derived as follows: 𝐼𝐷
𝑖 = Σ𝑗∈𝜀 𝜆𝑗(0)𝑅𝐸𝑉𝑗 = 𝐻1(𝐼𝐷𝑖)𝐷. The revocation leader then
floods < 𝐼𝐷𝑖, 𝐼𝐷 𝑖 > throughout the network to inform others
that 𝐶𝐻𝑖 has been compromised.
2.2.3 Revocation Verification
Upon receipt of 𝐼𝐷 𝑖 , each cluster head verifies it by
checking whether the equation 𝐻2(𝑃𝑝𝑢𝑏)𝐼𝐷 𝑖 = 𝐻1(𝐼𝐷𝑖)𝐷𝑝𝑢𝑏
holds, where 𝐷𝑝𝑢𝑏 can be computed using the public keys of
the shares of any 𝑡 unrevoked CHs. If the equation holds, this
means that 𝐼𝐷 ′ 𝑖 has been correctly accumulated from all
other 𝑡−1 unrevoked CHs. The cluster head then records 𝐼𝐷𝑖 in
its key revocation list (KRL) and declines to interact with it
thereafter.
2.2.4 Multiple Secrets Key Update Scheme
In IMKM, all CHs’ private keys, 𝑆𝑗 , will last for the entire
lifetime of the network, while the share keys, 𝑑𝑗 , used to
enable key revocation and key update, are refreshed
periodically for 𝑈 predefined regular phases, using a multiple
secrets key update scheme. Alternatively, they may be
refreshed in key eviction process when the number of
revocation CHs has reached a prescribed update threshold, 𝛾.
In this way, key update is quite simple and efficient because
there is no need to exchange and sign any messages between
the CHs.
2.3 Key Joining
In this section we show how to add a new cluster head, 𝐶𝐻𝑘,
to the ad hoc network backbone.
2.4 Key Eviction
A cluster head eviction can happen as a result of
unavailability, communication failure or for security reasons,
such as revoked node. If the eviction of a CH is not considered
a security vulnerability, such as a power failure, then no action
is required. By using distributed key management schemes,
each CH can easily add or update its share key in a secure and
efficient manner, thus greatly reducing communication and
computation costs.
2.5 Group Key Agreement Protocol
In this section, we present an efficient, one round
authenticated group key agreement protocol (AGKA) for
cluster-based MANETs. We may use the multiple secrets key
update scheme.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 319
2.6 Securing D-PKGs against DoS attacks
It has been suggested that wireless networks are highly
susceptible to malicious denial-of-service (DoS) attacks,
which prevent legitimate users from accessing the network.
One such target is the key management service. Proper
authentication can prevent injected messages from being
accepted by the network. The key eviction procedure in our
scheme is expected to be initiated very rarely. Therefore, if a
malicious node were to frequently initiate this procedure in a
short time window, then such an abnormality would be
detected very easily. The legitimate nodes would then record
the malicious node’s ID in their key revocation lists and
thereafter decline to interact with it.
3. PROPOSED PROTOCOL THAT MODELS THE
NETWORK AS A LINEAR SYSTEM
The main characteristic of ECHERP is the head selection
process. In this protocol, in order to elect a cluster head, the
routing information and the energy spent in the network are
formulated as a linear system, the solution of which is
computed using the Gaussian elimination algorithm.
Therefore, cluster heads are elected as the nodes that minimize
the total energy consumption in the cluster. In most of the
protocols proposed so far, the node with the highest residual
energy in a cluster is elected as the cluster head. This selection
may lead to inefficiencies, as can be seen by the following
example. Let us assume that node x in Figure has higher
residual energy than the other nodes belonging to the same
cluster. Then, this node is elected as the new cluster head.
However, this forces the rest of the nodes to send data in the
opposite direction to the base station, resulting in higher
energy consumption. In ECHERP, the BS is assumed to have
unlimited energy residues and communication power. It is also
assumed that the BS is located at a fixed position, either inside
or away from the sensor field. The longer the distance between
the BS and the center of the sensor field, the higher the energy
expenditure for every node transmitting to the BS. All the
network nodes, which are assumed to be located ithin the
sensor field, are dynamically grouped into clusters. One of the
nodes within every cluster is elected to be the cluster head of
this cluster. Therefore, the number of cluster heads is equal to
the number of clusters. The cluster heads, which are located
close enough to the network base station, are referred to as the
first level cluster heads. These cluster heads are capable of
direct transmission to the base station with reasonable energy
expenditure. The cluster heads that are located at more distant
positions from the base station are considered as second-,
third-, etc. level cluster heads. These cluster heads transmit
data to the upper level cluster heads. Moreover, in order to
achieve balanced energy consumption and extend the
network’s lifetime, the election of the cluster heads is
performed in turns.
Fig 4 WSN network model
Obviously, this is not an energy efficient process, and it can be
avoided by selecting cluster heads in a more energy efficient
manner. This is pursued by the proposed protocol.
In order to evaluate the performance of ECHERP simulations,
over 50 different 100 m × 100 m network topologies were
performed. The network architecture considered is the
following:
A fixed base station is located away from the sensor
field.
The sensor nodes are energy constrained with
uniform initial energy allocation.
Each node senses the environment at a fixed rate and
always has data to send to the base station (data are
sent if an event occurs).
The sensor nodes are assumed to be immobile.
However, the protocol can also support node
mobility.
The network is homogeneous, and all the nodes are
equivalent, i.e., they have the same computing and
communication capacity.
The network is location unaware, i.e., the physical
location of nodes is not known in advance.
The transmitter can adjust its amplifier power based
on the transmission distance.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 320
Fig 5 Network life time versus average energy dissipation
4. BASIC PREDISTRIBUTION SCHEME WITH
EBS
There are 8 basic key distribution schemes that is described in
tabular form with its different steps and complete description
in front of one another. The basic 8 key pre-distribution
scheme is RANDOM KEY PRE-DISTRIBUTION SCHEME,
Q-COMPOSITE RANDOM KEY DISTRIBUTION
SCHEMES, MULTIPATH KEY REINFORCEMENT
SCHEME, Random pair wise key scheme, Polynomial pool-
based key predistribution. Random subset key predistribution,
Polynomial pool-based key predistribution, Random subset
key predistribution, Grid based key predistribution, Hypercube
key distribution scheme.
1. Random key predistribution
scheme (proposed by Echenauer
and Gligor). This is basic
scheme[1].
Key predistribution stage
Shared key discovery stage
Path key establishment stage
Key revocation
Anayses of basic scheme
Large key pool of S keys and their
identifiers are generated. From this key
pool, k keys are randomly drawn and pre-
distributed in to each node’s keyring,
including the identifiers of all those keys
When the keys are initialized with keys,
they are deployed in the respective places
where they are needed. After deployment
each node tries to discover its neighbors
with which it share common keys.
A link exist between two nodes only if they
share a key, but the path key establishment
stage facilitates provision of the link
between two nodes when they do not share a
common key.
Key revocation is conducted by the
controller node, when a node is revoked
then all the keys in that particular node
keyring have to be deleted from the
network.
Assume probability of a common key
existing between two nodes in the network
is p, and size of the network is n. then
degree of the node is derivable using both p
and n.
2. Q composite random key
predistribution scheme[2]
(proposed by Chan,perrigand
song)
As in basic scheme 2 nodes
share a unique key for
establishing a secure
communication link and in Q
composite random key
predistribution scheme does this
by requiring that two nodes have
atleast q common keys to set up
a alink.
As amount of key overlap between two
nodes is increased, it become harder for an
adversary to break their communication
link. To maintain the probability that two
nodes establish a link with q common keys,
it is necessary to reduce the size of key pool.
3. Multipath key reinforcement It offers good security with To solve the problem, the communication
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 321
scheme[2-10] additional a communication
overhead for use where security
is more of a concern than
bandwidth or power drain.
The links formed between nodes
after the key discovery phase in
the basic scheme are not totally
secure due to the random
selection of keys from the key
pool allowing nodes in a
network to share some of the
same keys and thereby possibly
threaten multiple nodes when
only one is compromised.
key between the nodes must be updated
when one is compromised once a secure link
is formed.
This should not done for already established
link, but should be coordinate during
multiple independent paths for greater
security.
4. Random pairwise key
scheme[11]
Compared to the Q-composite
scheme and multipath scheme,
the random pair wise scheme
offers best security features in its
resilience to node capture .
The drawback of the random pair wise key
scheme is lack of scalability.
5. Polynomial pool-based key
predistribution[3] (proposed by
liu and Ning)
Any two sensors can definitely
establish a pair wise key when
there are no compromised
sensors.
Even with some nodes
compromised, the others in the
network can still establish pair
wise keys. A node van find the
common keys to determine
whether or not it can establish a
pair wise key and thereby help
reduce communication
overhead.
Polynomial pool based key pre-
distribution using random subsets offers
greater security and flexibility when
compared to other schemes until a
certain number of compromised nodes
assume 65% has been reached at which
point at any scheme would prove
ineffective.
Advantages: Sensors can be added
dynamically without consulting the
already deployed sensors while
dynamically deploying nodes in random
pair wise demands that the server has
pre designated un assigned space for
additional nodes which may never be
deployed.
6. Random subset key
predistribution[1-3]
This is an extension of the
polynomial pool based scheme
using a random subset key
assignment and the basic
scheme.
In this the pair wise keys
generated by each node are
unique and based upon each
node’s ID.
Random subset scheme works
similar to the polynomial pool
In key predistribution stage, the setup server
generates a set F of S-bivariate t-degree
polynomial and then initialize each node
with a subset of s polynomials from F.
In key discovery stage, each node attempt to
determine the nodes with which they share a
common key by employing the real time
discovery techniques information is not
preloaded in the nodes prior to the
deployment
.
In path key establishment phase, a source
node sends a message to its intermediate
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 322
base4d scheme in three stages of
key establishment. If no more
than t shares of the same
polynomial have been disclosed,
it is very difficult to attack the
communication between two
nodes
nodes seeking to establish a connection with
a destination node and if an intermediate
node can share a common key with both the
source and destination node, then the
communication path is formed between the
two.
7. Grid based key
predistribution[3]
A polynomial pool based
scheme using a grid based key
assignment offers all the
attractive properties of the
polynomial pool based key
predistribution and guarantees
that two sensor can establish a
pair wise key, when there are no
compromised nodes and the
nodes can communicate with
each other.
Even if some nodes are captured , there will
still be a great chance for key establishment
between uncompromised nodes using this
approach, which also reduce network
communication overhead.
8. Hypercube keydistribution
scheme[19]
Guarantees that any two nodes
in the network can establish a
pair wise key if there are no
compromised nodes are present
as long as the two nodes can
communicate.
If two nodes cannot share the common
polynomial, then they have to use the path
discovery method to compute an indirect
key. It include: dynamic path discovery,
performance and overhead for the
hypercube scheme, security evaluation for
hypercube scheme.
Fig 6 EBS matrix
THESE are all key predistribution schemes and in EBS it can
be stated as:
4.1 EBS Construction
An EBS consists of several subsets of the member set
collection. In the EBS, every subset isanalogous to a particular
key and the nodes which possess the key become the element
of the subset.The dimension of the EBS is represented by (N,
K, M) and it depicts a condition of a N membered secure
group with numbering from 1 to N and a separate key is
maintained for every subset by the key server. In EBS, if there
exists a subset Ai, then every member of this subset will have
knowledge about the key Ki. In EMS, there are M elements
for every t € [1, N] and its union is equal to [1, N] – {t}.
Hence, any member t can be ejected by the key server. Then
re-keying is performed to enable every member to know the
replacement keys for the K keys. To perform this, the M
messages are multicast after encrypting them with the keys
which correspond to the M elements, which has a union equal
to [1, N] – {t}. To restrict decipherability to selected
M1 M2 M3 M4 M5 M6 M7 M8 M9
K1 0 0 0 0 1 1 1 1 1
K2 0 1 1 1 0 0 0 1 1
K3 1 0 1 1 0 1 1 0 1
K4 1 1 0 1 1 0 1 0 0
K5 1 1 1 0 1 1 0 1 0
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 323
members, encryption of every key is performed by its
predecessor.A canonical enumeration technique is made use
of, for the construction of EBS subsets. In theformation of
subset of K objects out of K + M object set, every feasible
method is taken into consideration. Matrix A is formed in
order to develop a bit string sequence in its canonical (K, M),
in which the K and M are already known, C (K + M, K)
columns indicate the successive bit strings of which has a
length of K+M objects, where K ones are present in each. For
EBS (N, K, M), “A” is known as the canonical matrix. For
instance, the canonical matrix can be shown as:
1) No. of columns is equal to no. of nodes in the cluster.
2) No. of rows is equal to no. of keys used to manage
these nodes.
3) Total no. of keys K+M.
4) Out of Size of EBS depend upon no. of nodes and no.
of keys used to manage these nodes.
5) k+m keys,every sensor node know a distinct set of K
keys that is set of keys known to one of sensor nodes
can not be exactly identical to the set known to other
sensor nodes.
6) No. of nodes = (K+M)!/K!M!
7) Value of K and M adjusted according to network and
its security requirements
CONCLUSIONS WITH FUTURE DIRECTIONS
We have proposed a secure, efficient, and scalable distributed
ID-based multiple secrets key management scheme (IMKM)
for cluster-based mobile ad hoc networks. In order to address
the highly dynamic topologies and varying link qualities of ad
hoc networks, the master secret key is generated and
distributed by all clusterheads. As a result, not only are central
instances avoided, which constitute single points of attack and
failure, but this also leads to more autonomous and flexible
key update methods. According to our protocol analysis, we
believe that the proposed IMKM scheme improves on the
security and performance of previously proposed key
management protocols. After the key distribution, secure
channel is established between the nodes and the cluster head.
During the data transmission from the cluster members to the
sink, the data passes two phases. In the first phase the data is
encrypted and transmitted to the cluster head. In the second
phase, the data is encrypted by another key by the cluster head
and then transmitted to the sink. Thus this technique allows
inter cluster as well as intra cluster communication in a very
efficient manner with high security. The sink then provides the
cluster head with the cluster key and the EBS key set required
for the communication between the nodes. These keys are
distributed to the nodes by the cluster head prior
communication. ECHERP, an energy efficient protocol for
WSNs, was presented. ECHERP considers the current and the
estimated future residual energy of the nodes, along with the
number of rounds that can be cluster heads in order to
maximize the network lifetime. In future work, ECHERP can
be further enhanced by taking into consideration metrics
related to QoS and time constraints. We have presented a new
key predistribution scheme that uses region-based deployment
knowledge to assign keys to sensor nodes. Our simulation
results show a significant improvement in resilience over
existing schemes using region-based deployment knowledge.
Future work can be done to characterize the effects of
localized network attacks, as well as the effects of different
deployment distributions.
REFERENCES
[1] J.M. Kahn, R.H. Katz, and K.S.J. Pister, “Next
Century Challenges: Mobile Networking for Smart
Dust,” Proc. Ann. ACM/IEEE MobiCom, pp. 483-
492, 1999.
[2] G.J. Pottie and W.J. Kaiser, “Wireless Integrated
Network Sensors,” Comm. ACM, vol. 43, no. 5, pp.
551-558, 2000.
[3] L. Eschenauer and V. Gligor, “A Key Management
Scheme for Distributed Sensor Networks,” Proc.
Ninth ACM Conf. Computer and Comm. Security,
pp. 41-47, Nov. 2002.
[4] H. Chan, A. Perrig, and D. Song, “Random Key
Predistribution Schemes for Sensor Networks,” Proc.
IEEE Symp Security and Privacy, pp. 197-213,
May 2003.
[5] A.K. Das, “An Identity-Based Random Key Pre-
Distribution Scheme for Direct Key Establishment to
Prevent Attacks in Wireless Sensor Networks,” Int’l
J. Network Security, vol. 6, no. 2, pp. 134-144, 2008
[6] J. Lee and D.R. Stinson, “Deterministic Key
Predistribution Schemes for Distributed Sensor
Networks,” Proc. Ann. Symp. Selected Areas in
Cryptography, pp. 294-307, 2004
[7] S.A. C¸ amtepe and B. Yener, “Combinatorial Design
of Key Distribution Mechanisms for Wireless Sensor
Networks,” Proc. Ninth European Symp. Research
Computer Security (ESORICS), pp. 293-308, 2004
[8] J. Lee and D.R. Stinson, “A Combinatorial Approach
to Key Predistribution for Distributed Sensor
Networks,” Proc. IEEE Wireless Comm. and
Networking Conf., 2005. CD-ROM, paper PHY53-
06.
[9] W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz,
and A. Khalili, “A Pairwise Key Pre-Distribution
Scheme for Wireless Sensor Networks,” ACM Trans.
Information and System Security (TISSEC), vol. 8,
no. 2, pp. 228-258, May 2005.
[10] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci, “Wireless Sensor Networks: A Survey,”
Computer Networks, vol. 38, no. 4, pp. 393-422,
Mar. 2002.
[11] S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman,
“A Taxonomy of Wireless Microsensor Network
Models,” ACM Mobile Computing and Comm. Rev.,
vol. 6, no. 2, pp. 1-8, 2002
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 324
[12] H. Yang et al., “Security in Mobile Ad-Hoc Wireless
Networks: Challenges and Solutions,” IEEE Wireless
Comm. Magazine, vol. 11, no. 1, pp. 38-47, Feb.
2004.
[13] L. Zhou and Z.J. Haas, “Securing Ad Hoc
Networks,” IEEE Networks, vol. 13, no. 6, pp. 24-30,
Nov./Dec. 1999.
[14] D. Carman, P. Kruus, and B. Matt, “Constraints and
Approaches for Distributed Sensor Networks
Security,” Technical Report 00- 010, NAI Labs, Sept.
2000.
[15] G. Jolly, M. Kuscu, P. Kokate, and M. Younis, “A
Low-Energy Key Management Protocol for Wireless
Sensor Networks,” Proc. Eighth IEEE Symp
Computers and Comm. (ISCC ’03), June 2003.
[16] TinySec, http://www.cs.berkeley.edu/nks/tinysec/,
2006.
[17] L. Eschenauer and V. Gligor, “A Key Management
Scheme for Distributed Sensor Networks,” Proc.
Ninth ACM Conf. Computing and Comm. Security
(CCS ’02), Nov. 2002.
[18] H. Chan, A. Perrig, and D. Song, “Random Key
Predistribution Schemes for Sensor Networks” Proc
IEEE Symp. Security and Privacy, May 2003.
[19] G. Gupta and M. Younis, “Load-Balanced Clustering
in Wireless Sensor Networks,” Proc. Int’l Conf.
Comm. (ICC ’03), May 2003.
[20] O. Younis and S. Fahmy, “HEED: A Hybrid, Energy-
Efficient, Distributed Clustering Approach for Ad
Hoc Sensor Networks,” IEEE Trans. Mobile
Computing, vol. 3, no. 4, pp. 366-379, Oct.-
Dec.2004.
[21] K. Langendoen and N. Reijers, “Distributed
Localization in Wireless Sensor Networks: A
Quantitative Comparison,” Computer Networks, vol.
43, no. 4, pp. 499-518, Nov. 2003.
[22] A. Youssef, A. Agrawala, and M. Younis, “Accurate
Anchor-Free Localization in Wireless Sensor
Networks,” Proc First IEEE Workshop Information
Assurance in Wireless Sensor Networks (WSNIA
’05), Apr. 2005
[23] Lina M. Pestana Leão de Brito and Laura M.
Rodríguez Peralta, “An Analysis of Localization
Problems and Solutions in Wireless Sensor
Networks”, Polytechnical Studies Review, 2008, Vol
VI, ISSN: 1645-9911.
[24] Huang Lee and Hamid Aghajan, “Collaborative Self-
Localization Techniques for Wireless Image Sensor
Networks”, In Proc. of Asilomar Conf. on Signals,
Systems and Computers, Oct. 2005.
[25] D.Saravanan , D.Rajalakshmi and D.Maheswari
“DYCRASEN: A Dynamic Cryptographic
AsymmetricKey Management for Sensor Network
using Hash Function”, International Journal of
Computer Applications (0975 – 8887) Volume 18–
No.8, March 2011
[26] Yoon-Su Jeong, and Sang-Ho Lee “Secure Key
Management Protocol in the Wireless Sensor
Network”, International Journal of Information
Processing Systems, Vol.2, No.1, March 2006.
[27] Mohammed A. Abuhelaleh and Khaled M. Elleithy
“SECURITY IN WIRELESS SENSOR
NETWORKS: KEY MANAGEMENT MODULE IN
SOOAWSN”, International Journal of Network
Security & Its Applications (IJNSA), Vol.2, No.4,
October 2010.
[28] P. F. Oliveira, R. A. Costa, and J. Barros, “Mobile
secret key distribution with network coding,”
presented at the Int. Conf. Security Cryptography,
Jul. 2007.
[29] P. F. Oliveira and J. Barros, “Network coding
protocols for secret key distribution,” in Proc. Int
Symp Information Security, Nov. 2007, pp. 1718–
1733
[30] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz,
and A. Khalili, “A pairwise key predistribution
scheme for wireless sensor networks,” ACM Trans.
Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.
[31] D. Malan, M. Welsh, and M. Smith, “A public-key
infrastructure for key distribution in tinyos based on
elliptic curve cryptography,” presented at the 1st
IEEE Int. Conf. Sensor and Ad Hoc Communications
and Networks, Santa Clara, CA, Oct. 2004. [Online].
Available: citeseer. ist.psu.edu/malan
04publickey.html.