Efficient Data Transmission For Wireless Sensor Networks
|
|
|
- Thomasine Stanley
- 5 years ago
- Views:
Transcription
1 Volume: 2, Issue: 4, April e-issn: p-issn: Impact Factor: Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant professor, Department of Computer Efficient and trustworthy data transmission over wireless sensor networks Girijalaxmi, Vasudev S Abstract In the past few years trustworthy transmission of data along with efficiency is a critical issue for wireless sensor networks (WSNs). Clustering is an effectual and convenient way to enhance performance of the WSNs system. This thesis presents a secure transmission of data for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and sporadically. By making use of two Efficient and Trustworthy data Transmission (ETT) protocols for CWSNs, called ETT-IBS and ETT- IBOOS, by means of the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, correspondingly. In ETT-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing area. ETT-IBOOS additionally decreases the computational operating cost for protocol security, which is critical for WSNs, while its defence depends on the stability of the problem of discrete logarithm. Keywords: Cluster-based WSN, Cluster-Head, ID-based digital signature, ID-based online/offline digital signature, efficient data transmission protocol 1. Introduction A wireless sensor network is a network system it compromises the spatially distributed devices using wireless sensor nodes to examine the physical and environmental conditions such as movement, sound and temperature. In a wireless sensor network, the individual nodes are competent of sensing, processing and communicating data from one point to another point through a wireless link. In cluster based wireless sensor networks many sensor systems are deployed in harsh, and often adversarial physical environments, such as battle fields and military domains with trust less surroundings. Trustworthy data transmission is most crucial issues for wireless sensor networks. So that secure and trustworthy data transmission is needed and demanded in many practical wireless sensor networks. Correspondence: Girijalaxmi M.Tech scholar, Department of computer 2. Literature Survey Y. Wang, et al [1].Has explained wireless sensor networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. This article presents a survey of security issues in WSNs. Firstly outlined the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs then presented a holistic view of security issues. These issues are classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection. The Limitations of this paper was security services certainly add more computation, communication and storage cost in WSNs, and thus consume more energy. A. Manjeshwar et al [2].Has discussed wireless sensor networks are a new class of Ad Hoc networks that will find increasing deployment in coming years, as they enable reliable monitoring and analysis of unfamiliar and untested environments. The advances in technology have made it possible to have extremely small, low powered sensor devices equipped with programmable computing, multiple parameter sensing, and wireless communication capability. But, because of their inherent limitations, the protocols designed ~ 221 ~
2 for such sensor networks must efficiently use both limited bandwidth and battery energy. In this paper, developed an M/G/1 model to analytically determine the delay incurred in handling various types of queries using the enhanced APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient sensor Network protocol) protocol and this protocol uses an enhanced TDMA schedule to efficiently incorporate query handling, with a queuing mechanism for heavy loads. It also provides the additional flexibility of querying the network through any node in the network. To verify analytical results, with a Poisson arrival rate for queries on the network simulator ns-2. As the simulation and analytical results match perfectly well, this can be said to be the first step towards analytically determining the delay characteristics of a wireless sensor network. The Disadvantage of this paper was delay in answering the query is greatly depends on the frame length and Additional complexity is required to implement the threshold functions, the count time and the query handling at the nodes. R. Yasmin et al [3].Has pointed that in Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate against DoS attacks exploiting the limited resources of sensor nodes. Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs. To address the problem of authentication in WSNs, R.yasmin has proposed an efficient and secure framework for authenticated broadcast/multicast by sensor nodes as well as for outside user authentication, which utilizes identity based cryptography and online/offline signature (OOS) schemes. The primary goals of this framework are to enable all sensor nodes in the network, firstly, to broadcast and/or multicast an authenticated message quickly; secondly, to verify the broadcast/multicast message sender and the message contents; and finally, to verify the legitimacy of an outside user. The Disadvantage of this paper was Computation cost is more i.e generating and verifying the signature cost and the usage of memory is more. H. Lu et al [4].Has explained the secure routing for cluster based sensor networks where clusters are formed dynamically and periodically. And pointed out the deficiency in the secure routing protocols with symmetric key pairing. Along with the investigation of ID-based cryptography for security in WSNs, a new secure routing protocol with ID-based signature scheme has proposed for cluster-based WSNs, in which the security relies on the hardness of the Diffie-Hellman problem in the random oracle model. Because of the communication overhead for security, this paper provides analysis and simulation results in details to illustrate how various parameters act between security and energy efficiency. The Disadvantages of this paper was the proposed protocol requires the extra energy consumption for computation and still security overhead is more. 3. Problem Statement Network Design Let us consider a CWSN consisting of a preset base station (BS) and a large number of wireless sensor nodes, which are uniform in functionalities and capabilities. We presume that the BS is always reliable, i.e., the BS is a trusted entity. In the meantime, the sensor nodes may be compromised by external attackers, and the transmission of data may be interrupted from attacks on wireless channel. In a CWSN, sensor nodes are assembles into cluster, and every cluster has a cluster-head (CH) sensor node, which is chosen separately. Leaf sensor nodes which are non-ch nodes join a cluster depending on the receiving signal power and transmit the sensed data to the BS through CHs to save energy. The CHs perform data fusion and transmit data to the BS straight away with reasonably high energy. We presume that, all sensor nodes and the BS are time synchronized with symmetric radio channels, nodes are disseminated arbitrarily, and their energy is controlled. During data sensing, processing and communication in CWSN, energy of sensor nodes is consumed. The cost of data transmission is more than that of data processing. Thus, the technique that the intermediary node (i.e, a CH) aggregates data and sends it to the BS is preferred then the technique that every sensor node directly sends to the BS. A sensor node goes to sleep node for power savings. When it does not sense or transmit data and it depending on the TDMA (time division multiple access) control used for transmission of data. Security Vulnerabilities and Protocol Goals The cluster based protocol (like LEACH) which are data transmission protocol for WSNs, are vulnerable to a many security attacks. In general, the attacks to CHs in CWSNs could produce a serious damage to the network, since data aggregation and data transmission rely on the CHs fundamentally. If an attacker manages to act as if it s a CH or negotiate the CH, it can provoke attacks such as sinkhole and selective forwarding attacks, thus upsetting the network. Alternatively an attacker may intend to inject false sensing data into the WSN like pretending as a leaf node to transform the bogus information to the CHs. However, LEACH like protocols are tougher against insider attacks rather than other types of protocols in WSNs. Since CHs are rotating from nodes to nodes in the network by rounds making it harder for external attackers to recognize the routing fundamentals as the intermediary nodes and attacks them. The properties in LEACH like decrease the risk of being attacked on intermediary nodes, and make it difficult for an external attacker to recognize and compromise important nodes. The aim of the proposed efficient and trustworthy data transmission for WSNs is to guarantee an efficient and trustworthy transmission of data between leaf nodes and the CHs, as well as transmission between CHs and BS by using ID-based digital signature and ID-based offline/online digital signature protocols. Objective The objective is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS. Methodology SET Protocol In this methodology, Secure and Efficient data Transmission protocol for Cluster based wireless sensor networks. The SET-IBOOS protocol is designed with the purpose of providing higher efficiency for Cluster based wireless sensor networks. The proposed SET-IBOOS operates similarly to the previous SETI-BS, which has a protocol initialization prior to the network deployment and operates in rounds during communication. So first introduce ~ 222 ~
3 the protocol initialization, then describe the key management of the protocol by using the IBOOS scheme, and the protocol operations afterwards. Key management for security In this methodology, security is based on the DLP in the multiplicative group. The corresponding private pairing parameters are preloaded in the sensor nodes during the protocol initialization. The IBOOS scheme in the proposed SET-IBOOS consists of following four operations, extraction, offline signing, online signing and verifications. The key management for security has the fallowing characteristics. Key management The key cryptographies used in the protocol to achieve secure data transmission, which consist of symmetric and asymmetric key based security. Neighborhood authentication This methodology is used for secure access and data transmission to nearby sensor nodes, by authenticating with each other. Here, limited means the probability of neighborhood authentication, where only the nodes with the shared pairwise key can authenticate each other. Storage cost It represents the requirement of the security keys stored in sensor node smemory. Communication overhead Here the security overhead in the data packets during communication. Computational overhead The energy cost and computation efficiency on the generation and verifications of the certificates or signatures for security. Cluster based wireless sensor networks, called ETT-IBS and ETT-IBOOS are proposed, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. Protocols are proposed in order to reduce the computation and storage costs to authenticate the encrypted sensed data, by applying digital signatures to message packets, which are efficient in communication and applying the key management for security. In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS initially 6. System Design UML Stands for Unified Modelling Language. UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software system. In this section, the emphasis given on the explanation of architecture of design and use case diagram and data flow diagram. System Architecture Work flow of ETT-IBS Protocol and its Operation Efficient communication in ETT-IBS relies on ID based cryptography in which user public keys are their ID information. Thus, users can obtain their private keys without auxiliary data transmission, which is efficient in communication and saves energy. Fig 1 illustrates the process of encryption and decryption using the keys generated. As shown in fig private key is generated from nodes ID and the master key (msk) function of Base station (BS). Similarly, public key is generated from master key function of CH. Using these keys security can be provided to the data. Attack resilience The types of attacks that security protocol can protect against. 4. Existing System In a Wireless sensor networks(wsns) many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trust less surroundings. Wireless sensor network comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and movement. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. This is the type node compromising attack and other types of attacks like active and passive attacks occur while exchanging the packets between the nodes. 5. Proposed System In this Proposed System, Efficient and Trustworthy data transmission is thus especially necessary and is demanded in many such practical wireless sensor networks. So, two Efficient and Trustworthy data Transmission protocols for Fig 1: Work flow of ETT-IBS protocol Work flow of ETT-IBOOS and its Operation ETT-IBOOS is proposed in order to further decrease the computational overhead for security using the IBOOS scheme, in which security relies on the hardness of the discrete logarithmic problem. Private Key is generated in similar way as that of IBS, Along with private key online signature is generated for encrypting the data. This online signature is obtained using offline signature. While decrypting the data online signature, sensor node ID and message M parameters are used as shown in Fig 2. ~ 223 ~
4 Fig 2: Work flow of ETT-IBOOS protocol Use case Diagram A use case illustrates a unit of functionality provided by the system. Fig 3 shows the workflow of the use case diagram. Initially the sender will browse the encrypted file and initializes the MAC address to all the sensor nodes using the AES and SHA1 algorithms and upload file to router. Router will find the all possible shortest paths to route the data if attack is found then it will send attacker details to router and the sender and to overcome the attack IBS protocol is used to take the alternative route to transforms the file to destination. if there is no attack then router will forward the file to receiver. Receiver receives the file/data and checks the digital signature and decrypt the file. Fig 3: Use Case Diagram ~ 224 ~
5 Data Flow Diagram The Data Flow Diagram provides a graphical representation of the flow of data through a system. It shows logically what information is exchanged by our system processes and external interfaces or data stores, but it does not explicitly show wen or in what sequence the information is exchanged. Fig 4 shows the work flow of the data flow diagram. Sender browses the files and initializes the message authentication code to every sensor nodes and upload file to the router. Router finds the shortest paths to forward file to the receiver/destination if there is no attack. If there is a attack then it sends attacker details to router and to overcome the attacks applies the decision making techniques by using the IBS protocol to resend data from sender through alternative routing paths else file or data will discarded Fig 4: Data Flow Diagram 7 Algorithms o AES (Advanced Encryption Standard) algorithm is used for the file encryption and the decryption. o SHA-1(Secure hash algorithm) algorithm is used for online/offline digital signature (MAC Message Authentication Code),ID Based Digital Signature. 8 Applications o Using in wide area network computing to enhance the throughput of the entire network. o This is applicable in military and delay tolerant networks. o The system is applicable in Hierarchical Clustered Wireless Sensor Networks also. Using ID-based Digital Signature, in Proc. IEEE GLOBCOM, L. B. Oliveira, A. Ferreira, M. A. Vilac a et al., SecLEACH-On the security of clustered sensor networks, Signal Process., vol. 87, pp , Nikolaos A. Pantazis, Stefanos A.Nikolidakis, Dimitrios D.Vergados, Energy-Efficient Routing Protocols in Wireless Sensor Networks, A Survey IEEE Communications surveys & tutorials, vol. 15, no. 2, second quarter 2013 References 1. Y.Wang, G. Attebury, and B.Ramamurty, A Survey of Security Issues in Wireless Sensor Networks, IEEE Commun. Surveys Tuts.,vol. 8, no. 2, A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, An analytical model for infor-mation retrieval in wireless sensor networks using enhanced APTEEN protocol, IEEE Trans. Parallel Distrib. Syst., vol. 13, R. Yasmin, E. Ritter, and G. Wang, An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures, in Proc. IEEE CIT, H. Lu, J. Li, and H. Kameda, A Secure Routing Protocol for Cluster-based Wireless Sensor Networks ~ 225 ~
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
Towards Secure and Dependable Data Transmission for Cluster Based Wireless Sensor Networks
Towards Secure and Dependable Data Transmission for Cluster Based Wireless Sensor Networks Manju. D 1, Basavaraj G.Kudamble 2 1 M.Tech. Scholar, Department of E&C, BTL Institute of Technology, Bangalore,
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
JOURNAL PAPER, ACCEPTED 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE Abstract
AWIRELESS sensor network (WSN) is a network system
750 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 2014 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Huang Lu, Student Member, IEEE, JieLi,Senior
Secure and Efficient Data Transmission for Cluster-Based Wireless Networks
Secure and Efficient Data Transmission for Cluster-Based Wireless Networks M.Vigneshkumar, S.K.Manigandan Final Year MCA Student, VelTech HighTech Engineering College, Chennai, India Assistant Professor,
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3
WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.02, June-2015, Pages:0252-0258 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Secure and Efficient Data Transmission in Wireless Sensor Network Using SET Protocols
Secure and Efficient Data Transmission in Wireless Sensor Network Using SET Protocols 1 K.Shanmugam, 2 Dr.B.Vanathi, 3 Azhagu Raja R, 4 R.A.Priyanka, 5 Shiyanashiny 1 Assistant Professor, 2 Professor,
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks
A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks F.MEZRAG 1, M.BENMOHAMMED 2, B.BOUDERAH 3 1,3 Department of Computer Science, University of M Sila, Algeria
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
Webpage: www.ijaret.org Volume 3, Issue VII, July 2015 ISSN 2320-6802
RELIABLE AND SECURE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Manisha 1, Mamta Sachdeva 2 1 M.Tech(CSE) Computer Science and Engineering Department South Point Institute of Technology & Management
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Survey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela, elleithy}
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 [email protected],
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
ACCELERATED BROADCAST AUTHENTICATION WITH SIGNATURE AMORTIZATION FOR WSNS
ACCELERATED BROADCAST AUTHENTICATION WITH SIGNATURE AMORTIZATION FOR WSNS Minnu Meria Mathew 1, Anjitha Mary 2 1 Student, Computer Science & Engineering, ASIET, Kerala, India 2 Assistant Professor, Computer
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES V K Singh 1 and Kalpana Sharma 2 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK Paulraj*1, A.Syam Prasad*2 M.Tech (CSE) Student, Department of CSE, MRCET, Kompally, Hyderabad, A.P, India
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS
K Y B E R N E T I K A V O L U M E 4 4 ( 2 0 0 8 ), N U M B E R 4, P A G E S 5 2 2 5 3 3 A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS Qian Fang, Ying Liu and Xiaoqun Zhao Security
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi [email protected] Sabancı University Computer Science and
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Analysis of Typical Secure Routing Protocols in WSN
, pp.41-50 http://dx.doi.org/10.14257/ijsia.2014.8.6.04 Analysis of Typical Secure Routing Protocols in WSN Jingsha He 1,2,a, Bo Zhou 1,b and Ruohong Liu 2,c 1 School of Software Engineering, Beijing University
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission
Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission B.Navin, S.Benila Abstract Wireless sensor networks have found their applications in numerous industrial fields. This is
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks Ali Modirkhazeni Msc Student, Faculty of Computer Science and Information Systems,University Technology Malaysia [email protected]
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
