SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 102 
SECURING INFORMATION IN WIRELESS SENSOR NETWORKS Prashant Sangulagi1, Mohan G2 1Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 2Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 Abstract Security in Wireless sensor Network has emerged a must required research topic for the researchers. Securing the important data without affecting its accuracy is a important task. In this paper some of the important and feasible security techniques are discussed. Some of the standard and popular encryption techniques are Digital Encryption Systems (DES) and Advanced Encryption systems (AES). Attacks considered in the WSN environment are more, some of the main type like active attacks and passive attacks. Here, attacks in WSN are discussed in details and avoidance of those attacks using encryption techniques are also discussed here. This paper also analyzes the performance of DES and AES algorithms against the attacks in WSN. Keywords: WSN, Network Security, Attacks, Cryptography, DES, AES. 
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The aim of this paper is to provide secure data communication using DES and AES security algorithm for wireless sensor network. Wireless sensor networks are quickly gaining popularity due to the fact that they are potentially low cost solutions to a variety real of world- challenges. Their low cost provide a means to deploy large sensor arrays in a variety conditions capable of performing both military and civilian tasks. But sensor network also introduce severe resource constants due their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. Unreliable communication channel and unattended operation make security defences even harder. Indeed, as pointed out in wireless sensors often have the processing characteristics of machines that are decades old, and the trend is to reduce the cost of wireless sensors while maintaining similar computing power. With that in mind, many researchers have begun to address the challenges of maximizing the processing capabilities and energy reserve of wireless sensor nodes while also securing them against attackers. All aspects of wireless sensor networks are examined including secure and efficient routing, data aggregation, group formation and so on. 1.1 Issues and Challenges in Designing a Sensor Network Sensor networks pose certain design challenges due to the following reasons: 1. Sensor nodes are randomly deployed and hence do not fit into any regular topology. 2. Sensor network are infrastructure-less. Therefore, all routing and maintenance algorithm need to be distributed. 3. Sensors usually rely only on their battery power, 4. Sensor nodes should be able to synchronize with each other. 
5. Sensor network should also be capable of adapting to changing the connectivity due to the failure of nodes, or new powering up. 
Organization of the paper is as follows, section two describes the overall methodology in network security, section 3 gives detailed information regarding attacks in WSN, section 4 provides information regarding cryptography and section 5 and 6 explains DES and AES algorithms and lastly section 7 concludes the paper. 2. NETWORK SECURITY Having discussed some of the attacks that have occurred in real life, let us now classify the principles related to security. This will help us understand the attacks better and also help us in thinking about the possible solution to take them. There are four chief principle of security. And two more, access control and availability. Which are not related to a particular message, but are linked to the overall system as a whole. We shall discuss all these security principles as follow. 2.1 Confidentiality: The principle of confidentiality specifies that only sender and receiver should be Understand the contents of the transmitted message. 2.2 Authentication: The principles of authentication mechanisms help establish proof of identities. The authentication process ensures that the origin of a electronic message or document correctly identify.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 103 
2.3 Integrity: When the contents of a message are changed after the sender sends it, but before it reaches the intended receiver, we say that the integrity of the message is lost. 2.4 Non-Repudiation: There are situation where a user sends a message and later on refuses that she had sent that message. 2.5 Access Control: The principle of access control determines who should be able to access what. For instance, we should be able to specify that user A can view the records in a data base, but cannot update them. However, user B might be allowed to make updates as well. An access control mechanism can be set up to ensure this. 3.TYPES OF ATTACKS 
Fig. 1 types of attacks 3.1 Passive Attacks: Passive attacks are those, wherein the attacker a indulges in monitoring data transmission. In other words, the attacker aims to obtain information that is in transit. The term passive indicates that the attacker does not attempt to perform any modifications to the data. In fact, this is also why passive attacks are harder to detect. Thus, the general approach to deal with passive attacks is to think about prevention, rather than detection or corrective actions. Passive attacks do not involve any modification to the contents of an original message. 3.2 Active Attacks: 
Unlike passive attacks, the active attacks are based on modification of the original message in some manner or the creation of a false message. These attacks cannot be prevented easily. However, they can detect with some effort and attempts can be made to recover from them. These attacks can in the form of interruption, modification and fabrication. 
In active attacks, the contents of the original message are modified in some way. 
 Trying to pose as another entity involves masquerade attacks. 
 Modification attacks can classified further into replay attacks and alteration of messages. 
 Fabrication causes denial of service attack. 
3.3 Types of Passive Attacks: 
Fig. 2types of passive attacks 
 Release of Message Contents: 
Release of message contents is quite simple to understand. When we send a confidential email message to our friend we desire that only she be the able to access it. Otherwise, the contents of the messages are released against wishes to someone else. Using certain security mechanisms, we can prevent release of message contents. 
 Traffic Analysis: 
However, if many such messages passing through, a passive attacker could try to figure out similarities between them to come up with some sort pattern that provide her some clues regarding the communication that is taking place. Such attempts of analyzing message to come up with likely patterns are the of the traffic analysis attacks. 3.4 Types of Active Attacks: 
Fig 3: Types of active attacks 
attacks 
active attacks 
passive attacks 
passive attacts(interception) 
release of message contents 
trafic analysis 
active attacks 
interruption 
modification 
fabrication
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 104 
 Interruption: 
Interruption caused when an unauthorized entity pretends to be another entity. 
 Modification: Modification attacks can be classified further into replay attacks and alteration of messages. 
 Fabrication: Fabrication attacks make an attempt to prevent legitimate users from accessing some services, which they are eligible for. For instance, an unauthorized user might send too many login requests to a server using random user ids one after the other in quick succession, so as to flood the network and deny other legitimate users from using the network facilities. 
4 WHAT IS CRYPTOGRAPHY? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy 4.1 Cryptography Algorithm 
Fig 4: cryptographic components 
Suppose now that “a” wants to send a message to “b”. Ad’s message in its original form (for example, “b”, hello. “a”) is known as plaintext, or clear text. “a” encrypts his plaintext message using an encryption algorithm so that the encrypted message, known as cipher text, looks unintelligible to any intruder. Interestingly, in many modern cryptographic system, including those used in the internet, the encryption technique itself is known-published, standardized, and available to everyone (for example,[RFC 1321;RFC 2437: RFC 2420; NIST 2001]), even a potential intruder! Clearly, if everyone knows the method for encoding data, then there must be some secret information that prevents an intruder from decrypting the transmitted data. This is where keys come in 5. DATA ENCRYPTION STANDARD: The algorithm described by DES is a private-key algorithm, meaning that, both sender and receiver must know and use same private key is used for both encrypting and decrypting the data. DES encrypts and decrypts data in 64-bit blocks, using a 64- bit key (although the effective key Strength is only 56 bits, as explained below). It takes a 64-bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a productcipher.DES has 64-bit rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially. Steps in DES: 1. In the first step, 64-bit plain text block is handed over to an initial permutation function. 2. The initial permutation is performed on plain text. 3. Next, the initial permutation produces two halves of permuted block; say left plain text and right plain text. 4. Now, each of left plain text and right plain text go through 16 rounds of encryption process. 5. In the end, left plain text and right plain text are rejoined and a final permutation is performed on the combined block. 6. The result of this process produces 64-bit cipher text. 5.1 Advanced Encryption Standard: The algorithm described by AES is a symmetric-key algorithm meaning that same key is used for both encrypting and decrypting the data. The AES standard is a variant where the block size is restricted to 128 bits and key size of 128, 192, 256 bits can be used. AES is a symmetric cipher that processes data in 128-bit blocks. It supports key sizes of 128, 192, and 256bits and consists of 10, 12, or 14 iteration rounds, respectively. Each round mixes the data with a round key, which is generated from the encryption key. The encryption round operations are presented in Fig 5.1. The cipher maintains an Internal, 4-by-4 matrix of bytes, called State, on which the operations are performed. Initially State is filled with the input data block and XOR-ed with the encryption key.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 105 
Permute 
48-bit k1 
48-bit K2 
. . 
. 
48-bit k16 
Permute 
Fig. 5: Basic operation of DES 
64-bit input 
56-bit key 
L1 
R1 
L2 
R2 
L3 
R3 
L17 
R17 
64-bit output 
f(L1,R1,K1) 
f(L2,R2,K2) 
64-bit input
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 106 
Fig 6 Round operation of AES encryption 6. ADVANTAGES AND APPLICATION 6.1 Advantages 
1. Network security facilitates protection of information that is shared between computers on the network. 
2. Hacking attempts or virus attacks from the internet will not be able to harm physical computers. External possible attacks are prevented. 
3. Network security provides different levels of access. If there are various computers attached to a network, there may be some computers that may have greater access to information than others. 
4. Private network can be provided protection from external attacks by closing them off from internet. Network security make them safe them virus attacks, etc 
6.2 Applications Sensor nodes are used in a variety of applications which require constant monitoring and detection of specific events. The most security-oriented applications of WSN are. 
1. Military applications 
2. Sensors are also used in environmental applications such as forest fire detection 
3. Sensor can be extremely useful in medical applications. 
4. Sensor also useful in commercial applications at home and industries 
7. CONCLUSIONS 
From this survey paper we can conclude that DES and AES are advanced security algorithm which provides secure or accurate information about sensed data in wireless sensor network. AES is a most dominant algorithm in wireless sensor network for coming decades like security oriented-applications such as military, medical, fire detection and home automations and variety of applications which require constant monitoring detection of specific event. 
REFERENCE 
[1]. Atulkahate, “Cryptography and network security” second edition, 
[2]. James F. Kurose, “Computer networking”, [3]. Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks”Communications of the ACM, Page53-57, year 2004 [4].Al-SakibKhan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless SensorNetworks: Issues and Challenges”, International conference on Advanced ComputingTechnologies, Page1043-1045, year 2006 [5]. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public keycryptographyfor wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications (PERCOM'05). IEEE Computer Society Press, 2005, pp. 324- 328

More Related Content

What's hot

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management SchemeA Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management Schemeijiert bestjournal
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksDefCamp
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 

What's hot (19)

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management SchemeA Self –Destructing Secure Messaging System Using Multi Key Management Scheme
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 

Viewers also liked

Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Seminartopics.docx
Seminartopics.docxSeminartopics.docx
Seminartopics.docxMit Thakkar
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdmRAVITEJA828
 
CPU vs. GPU presentation
CPU vs. GPU presentationCPU vs. GPU presentation
CPU vs. GPU presentationVishal Singh
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Stratellite 2015
Stratellite 2015Stratellite 2015
Stratellite 2015Navitha1412
 
GRAPHICS PROCESSING UNIT (GPU)
GRAPHICS PROCESSING UNIT (GPU)GRAPHICS PROCESSING UNIT (GPU)
GRAPHICS PROCESSING UNIT (GPU)self employed
 
Wireless power transmission through sps
Wireless power transmission through spsWireless power transmission through sps
Wireless power transmission through spsSanket Shitole
 
Graphic Processing Unit (GPU)
Graphic Processing Unit (GPU)Graphic Processing Unit (GPU)
Graphic Processing Unit (GPU)Jafar Khan
 
300 seminar topics
300 seminar topics300 seminar topics
300 seminar topicsBhanu Gupta
 
Graphics processing unit ppt
Graphics processing unit pptGraphics processing unit ppt
Graphics processing unit pptSandeep Singh
 
stratellite document
stratellite documentstratellite document
stratellite documentNakka Ramu
 
Wireless power transmission from solar power satellite
Wireless power transmission from solar power satelliteWireless power transmission from solar power satellite
Wireless power transmission from solar power satelliteReena Sunil Kumar
 
Stratellites - Satellites in Stratosphere
Stratellites - Satellites in StratosphereStratellites - Satellites in Stratosphere
Stratellites - Satellites in StratosphereRaviIIT
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-pptsecomps
 

Viewers also liked (20)

Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Seminartopics.docx
Seminartopics.docxSeminartopics.docx
Seminartopics.docx
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Satellite
SatelliteSatellite
Satellite
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 
CPU vs. GPU presentation
CPU vs. GPU presentationCPU vs. GPU presentation
CPU vs. GPU presentation
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Stratellite 2015
Stratellite 2015Stratellite 2015
Stratellite 2015
 
GRAPHICS PROCESSING UNIT (GPU)
GRAPHICS PROCESSING UNIT (GPU)GRAPHICS PROCESSING UNIT (GPU)
GRAPHICS PROCESSING UNIT (GPU)
 
Wireless power transmission through sps
Wireless power transmission through spsWireless power transmission through sps
Wireless power transmission through sps
 
Graphic Processing Unit (GPU)
Graphic Processing Unit (GPU)Graphic Processing Unit (GPU)
Graphic Processing Unit (GPU)
 
300 seminar topics
300 seminar topics300 seminar topics
300 seminar topics
 
Graphics processing unit ppt
Graphics processing unit pptGraphics processing unit ppt
Graphics processing unit ppt
 
stratellite document
stratellite documentstratellite document
stratellite document
 
Wireless power transmission from solar power satellite
Wireless power transmission from solar power satelliteWireless power transmission from solar power satellite
Wireless power transmission from solar power satellite
 
MIMO OFDM
MIMO OFDMMIMO OFDM
MIMO OFDM
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Stratellites - Satellites in Stratosphere
Stratellites - Satellites in StratosphereStratellites - Satellites in Stratosphere
Stratellites - Satellites in Stratosphere
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-ppt
 

Similar to Securing information in wireless sensor networks

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionIOSR Journals
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...IJNSA Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...IJNSA Journal
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfRhonda Cetnar
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data securityeSAT Journals
 

Similar to Securing information in wireless sensor networks (20)

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
A05510105
A05510105A05510105
A05510105
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
D03302030036
D03302030036D03302030036
D03302030036
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data security
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 

Securing information in wireless sensor networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 102 SECURING INFORMATION IN WIRELESS SENSOR NETWORKS Prashant Sangulagi1, Mohan G2 1Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 2Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 Abstract Security in Wireless sensor Network has emerged a must required research topic for the researchers. Securing the important data without affecting its accuracy is a important task. In this paper some of the important and feasible security techniques are discussed. Some of the standard and popular encryption techniques are Digital Encryption Systems (DES) and Advanced Encryption systems (AES). Attacks considered in the WSN environment are more, some of the main type like active attacks and passive attacks. Here, attacks in WSN are discussed in details and avoidance of those attacks using encryption techniques are also discussed here. This paper also analyzes the performance of DES and AES algorithms against the attacks in WSN. Keywords: WSN, Network Security, Attacks, Cryptography, DES, AES. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The aim of this paper is to provide secure data communication using DES and AES security algorithm for wireless sensor network. Wireless sensor networks are quickly gaining popularity due to the fact that they are potentially low cost solutions to a variety real of world- challenges. Their low cost provide a means to deploy large sensor arrays in a variety conditions capable of performing both military and civilian tasks. But sensor network also introduce severe resource constants due their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. Unreliable communication channel and unattended operation make security defences even harder. Indeed, as pointed out in wireless sensors often have the processing characteristics of machines that are decades old, and the trend is to reduce the cost of wireless sensors while maintaining similar computing power. With that in mind, many researchers have begun to address the challenges of maximizing the processing capabilities and energy reserve of wireless sensor nodes while also securing them against attackers. All aspects of wireless sensor networks are examined including secure and efficient routing, data aggregation, group formation and so on. 1.1 Issues and Challenges in Designing a Sensor Network Sensor networks pose certain design challenges due to the following reasons: 1. Sensor nodes are randomly deployed and hence do not fit into any regular topology. 2. Sensor network are infrastructure-less. Therefore, all routing and maintenance algorithm need to be distributed. 3. Sensors usually rely only on their battery power, 4. Sensor nodes should be able to synchronize with each other. 5. Sensor network should also be capable of adapting to changing the connectivity due to the failure of nodes, or new powering up. Organization of the paper is as follows, section two describes the overall methodology in network security, section 3 gives detailed information regarding attacks in WSN, section 4 provides information regarding cryptography and section 5 and 6 explains DES and AES algorithms and lastly section 7 concludes the paper. 2. NETWORK SECURITY Having discussed some of the attacks that have occurred in real life, let us now classify the principles related to security. This will help us understand the attacks better and also help us in thinking about the possible solution to take them. There are four chief principle of security. And two more, access control and availability. Which are not related to a particular message, but are linked to the overall system as a whole. We shall discuss all these security principles as follow. 2.1 Confidentiality: The principle of confidentiality specifies that only sender and receiver should be Understand the contents of the transmitted message. 2.2 Authentication: The principles of authentication mechanisms help establish proof of identities. The authentication process ensures that the origin of a electronic message or document correctly identify.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 103 2.3 Integrity: When the contents of a message are changed after the sender sends it, but before it reaches the intended receiver, we say that the integrity of the message is lost. 2.4 Non-Repudiation: There are situation where a user sends a message and later on refuses that she had sent that message. 2.5 Access Control: The principle of access control determines who should be able to access what. For instance, we should be able to specify that user A can view the records in a data base, but cannot update them. However, user B might be allowed to make updates as well. An access control mechanism can be set up to ensure this. 3.TYPES OF ATTACKS Fig. 1 types of attacks 3.1 Passive Attacks: Passive attacks are those, wherein the attacker a indulges in monitoring data transmission. In other words, the attacker aims to obtain information that is in transit. The term passive indicates that the attacker does not attempt to perform any modifications to the data. In fact, this is also why passive attacks are harder to detect. Thus, the general approach to deal with passive attacks is to think about prevention, rather than detection or corrective actions. Passive attacks do not involve any modification to the contents of an original message. 3.2 Active Attacks: Unlike passive attacks, the active attacks are based on modification of the original message in some manner or the creation of a false message. These attacks cannot be prevented easily. However, they can detect with some effort and attempts can be made to recover from them. These attacks can in the form of interruption, modification and fabrication. In active attacks, the contents of the original message are modified in some way.  Trying to pose as another entity involves masquerade attacks.  Modification attacks can classified further into replay attacks and alteration of messages.  Fabrication causes denial of service attack. 3.3 Types of Passive Attacks: Fig. 2types of passive attacks  Release of Message Contents: Release of message contents is quite simple to understand. When we send a confidential email message to our friend we desire that only she be the able to access it. Otherwise, the contents of the messages are released against wishes to someone else. Using certain security mechanisms, we can prevent release of message contents.  Traffic Analysis: However, if many such messages passing through, a passive attacker could try to figure out similarities between them to come up with some sort pattern that provide her some clues regarding the communication that is taking place. Such attempts of analyzing message to come up with likely patterns are the of the traffic analysis attacks. 3.4 Types of Active Attacks: Fig 3: Types of active attacks attacks active attacks passive attacks passive attacts(interception) release of message contents trafic analysis active attacks interruption modification fabrication
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 104  Interruption: Interruption caused when an unauthorized entity pretends to be another entity.  Modification: Modification attacks can be classified further into replay attacks and alteration of messages.  Fabrication: Fabrication attacks make an attempt to prevent legitimate users from accessing some services, which they are eligible for. For instance, an unauthorized user might send too many login requests to a server using random user ids one after the other in quick succession, so as to flood the network and deny other legitimate users from using the network facilities. 4 WHAT IS CRYPTOGRAPHY? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy 4.1 Cryptography Algorithm Fig 4: cryptographic components Suppose now that “a” wants to send a message to “b”. Ad’s message in its original form (for example, “b”, hello. “a”) is known as plaintext, or clear text. “a” encrypts his plaintext message using an encryption algorithm so that the encrypted message, known as cipher text, looks unintelligible to any intruder. Interestingly, in many modern cryptographic system, including those used in the internet, the encryption technique itself is known-published, standardized, and available to everyone (for example,[RFC 1321;RFC 2437: RFC 2420; NIST 2001]), even a potential intruder! Clearly, if everyone knows the method for encoding data, then there must be some secret information that prevents an intruder from decrypting the transmitted data. This is where keys come in 5. DATA ENCRYPTION STANDARD: The algorithm described by DES is a private-key algorithm, meaning that, both sender and receiver must know and use same private key is used for both encrypting and decrypting the data. DES encrypts and decrypts data in 64-bit blocks, using a 64- bit key (although the effective key Strength is only 56 bits, as explained below). It takes a 64-bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a productcipher.DES has 64-bit rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially. Steps in DES: 1. In the first step, 64-bit plain text block is handed over to an initial permutation function. 2. The initial permutation is performed on plain text. 3. Next, the initial permutation produces two halves of permuted block; say left plain text and right plain text. 4. Now, each of left plain text and right plain text go through 16 rounds of encryption process. 5. In the end, left plain text and right plain text are rejoined and a final permutation is performed on the combined block. 6. The result of this process produces 64-bit cipher text. 5.1 Advanced Encryption Standard: The algorithm described by AES is a symmetric-key algorithm meaning that same key is used for both encrypting and decrypting the data. The AES standard is a variant where the block size is restricted to 128 bits and key size of 128, 192, 256 bits can be used. AES is a symmetric cipher that processes data in 128-bit blocks. It supports key sizes of 128, 192, and 256bits and consists of 10, 12, or 14 iteration rounds, respectively. Each round mixes the data with a round key, which is generated from the encryption key. The encryption round operations are presented in Fig 5.1. The cipher maintains an Internal, 4-by-4 matrix of bytes, called State, on which the operations are performed. Initially State is filled with the input data block and XOR-ed with the encryption key.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 105 Permute 48-bit k1 48-bit K2 . . . 48-bit k16 Permute Fig. 5: Basic operation of DES 64-bit input 56-bit key L1 R1 L2 R2 L3 R3 L17 R17 64-bit output f(L1,R1,K1) f(L2,R2,K2) 64-bit input
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 106 Fig 6 Round operation of AES encryption 6. ADVANTAGES AND APPLICATION 6.1 Advantages 1. Network security facilitates protection of information that is shared between computers on the network. 2. Hacking attempts or virus attacks from the internet will not be able to harm physical computers. External possible attacks are prevented. 3. Network security provides different levels of access. If there are various computers attached to a network, there may be some computers that may have greater access to information than others. 4. Private network can be provided protection from external attacks by closing them off from internet. Network security make them safe them virus attacks, etc 6.2 Applications Sensor nodes are used in a variety of applications which require constant monitoring and detection of specific events. The most security-oriented applications of WSN are. 1. Military applications 2. Sensors are also used in environmental applications such as forest fire detection 3. Sensor can be extremely useful in medical applications. 4. Sensor also useful in commercial applications at home and industries 7. CONCLUSIONS From this survey paper we can conclude that DES and AES are advanced security algorithm which provides secure or accurate information about sensed data in wireless sensor network. AES is a most dominant algorithm in wireless sensor network for coming decades like security oriented-applications such as military, medical, fire detection and home automations and variety of applications which require constant monitoring detection of specific event. REFERENCE [1]. Atulkahate, “Cryptography and network security” second edition, [2]. James F. Kurose, “Computer networking”, [3]. Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks”Communications of the ACM, Page53-57, year 2004 [4].Al-SakibKhan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless SensorNetworks: Issues and Challenges”, International conference on Advanced ComputingTechnologies, Page1043-1045, year 2006 [5]. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public keycryptographyfor wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications (PERCOM'05). IEEE Computer Society Press, 2005, pp. 324- 328