End-to-end Secure Data Aggregation in Wireless Sensor Networks

Size: px
Start display at page:

Download "End-to-end Secure Data Aggregation in Wireless Sensor Networks"

Transcription

1 End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor Department of Computer Engineering SVNIT, Surat, India December 18, 2014 Keyur Parmar [email protected] The Tenth ICISS /34

2 Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar [email protected] The Tenth ICISS /34

3 Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar [email protected] The Tenth ICISS /34

4 Introduction Wireless Sensor Nodes Equipped with Sensing and Actuation Capability Self-organizing Self-healing Highly Constrained Resources Processor Bandwidth Memory and Storage Space Communication and Computation Power Sensor Node = Sensing + Processing + Communication Akyildiz et al. Wireless Sensor Networks: A Survey. Computer Networks, Elsevier, 38(4), , (2002). Keyur Parmar [email protected] The Tenth ICISS /34

5 In-network Processing (Data Aggregation) Reduces Data Transmission Improves Energy Efficiency Fasolo et al. In-network Aggregation Techniques for Wireless Sensor Networks: A Survey. Wireless Communications, IEEE 14(2), 70-87, (2007). Keyur Parmar [email protected] The Tenth ICISS /34

6 Secure Data Aggregation Types of Secure Data Aggregation Hop-by-Hop Secure Data Aggregation End-to-End Secure Data Aggregation (CDA) Ozdemir et al. Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview. Computer Networks, 53(12), , (2009). Keyur Parmar [email protected] The Tenth ICISS /34

7 Concealed Data Aggregation Security Requirements Integrity/Message Authentication Confidentiality/Privacy Replay Protection Keyur Parmar The Tenth ICISS /34

8 Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar [email protected] The Tenth ICISS /34

9 Privacy Homomorphism Homomorphic Primitives Homomorphic Encryption Homomorphic Message Authentication Codes Rivest et al. On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation 4(11), , (1978) Agrawal, S. et al. Homomorphic MACs: MAC-based Integrity for Network Coding. In: Proceedings of the 7th ACNS, pp Springer, Berlin, Heidelberg, (2009). Keyur Parmar The Tenth ICISS /34

10 Privacy Homomorphism - Example Castelluccia et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1-20:36, Keyur Parmar [email protected] The Tenth ICISS /34

11 Privacy Homomorphism - Example Keyur Parmar [email protected] The Tenth ICISS /34

12 Privacy Homomorphism - Example Keyur Parmar [email protected] The Tenth ICISS /34

13 Privacy Homomorphism - Example Keyur Parmar [email protected] The Tenth ICISS /34

14 Privacy Homomorphism - Example Keyur Parmar [email protected] The Tenth ICISS /34

15 Privacy Homomorphism - Example Castelluccia et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1-20:36, Keyur Parmar [email protected] The Tenth ICISS /34

16 Privacy Homomorphism - Tradeoffs Malleability Non-Malleability Security Level Non-Malleability Adaptive Chosen Ciphertext Attack Malleability Chosen Ciphertext attack Keyur Parmar [email protected] The Tenth ICISS /34

17 Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar [email protected] The Tenth ICISS /34

18 MR-CDA - Example Node 1 computes, C 1 = E BS (M 1 ) T 1 = MAC(C 1 ) E 1,3 (T 1 ) E 1,5 (T 1 ) Node 1 transmits, 1 3 C 1 E 1,3 (T 1 ) E 1,5 (T 1 ) Keyur Parmar [email protected] The Tenth ICISS /34

19 MR-CDA - Example Node 2 computes, C 2 = E BS (M 2 ) T 2 = MAC(C 2 ) E 2,3 (T 2 ) E 2,5 (T 2 ) Node 2 transmits, 2 3 C 2 E 2,3 (T 2 ) E 2,5 (T 2 ) Keyur Parmar [email protected] The Tenth ICISS /34

20 MR-CDA - Example 1 Node 3 decrypts, T 1 = D 1,3 (T 1 ) 2 Node 3 generates, T 1 = MAC(C 1) 3 Node 3 compares, T 1 = T 1? 4 Node 3 decrypts, T 2 = D 2,3 (T 2 ) 5 Node 3 generates, T 2 = MAC(C 2) 6 Node 3 compares, T 2 = T 2? Keyur Parmar [email protected] The Tenth ICISS /34

21 MR-CDA - Example Node 3 computes, C 3 = C 1 C 2 T 3 = T 1 T 2 E 3,5 (T 3 ) E 3,7 (T 3 ) Node 3 transmits, 3 5 C 3 E 3,5 (T 3 ) E 3,7 (T 3 ) E 1,5 (T 1 ) E 2,5 (T 2 ) Keyur Parmar [email protected] The Tenth ICISS /34

22 MR-CDA - Example Node 5 receives, 3 5 C 3 E 3,5 (T 3 ) E 3,7 (T 3 ) E 1,5 (T 1 ) E 2,5 (T 2 ) Node 5 receives, 4 5 C 4 E 4,5 (T 4 ) E 4,7 (T 4 ) Keyur Parmar [email protected] The Tenth ICISS /34

23 MR-CDA - Example 1 Node 5 decrypts, T 1 = D 1,5 (T 1 ) T 2 = D 2,5 (T 2 ) T 3 = D 3,5 (T 3 ) T 4 = D 4,5 (T 4 ) 2 Node 5 generates, T T 3 = MAC(C 3) 4 = MAC(C 4) 3 Node 5 compares, T 3 = T 3? T 4 = T 4? 4 Node 5 compares, T 3 = T 1 T 2 Keyur Parmar [email protected] The Tenth ICISS /34

24 MR-CDA - Example Node 5 computes, C 5 = C 3 C 4 T 5 = T 3 T 4 E 5,7 (T 5 ) E 5,8 (T 5 ) Node 5 transmits, 5 7 C 5 E 5,7 (T 5 ) E 5,8 (T 5 ) E 3,7 (T 3 ) E 4,7 (T 4 ) Keyur Parmar [email protected] The Tenth ICISS /34

25 MR-CDA - Example Node 7 receives, 5 7 C 5 E 5,7 (T 5 ) E 5,8 (T 5 ) E 3,7 (T 3 ) E 4,7 (T 4 ) Node 7 receives, 6 7 C 6 E 6,7 (T 6 ) E 6,8 (T 6 ) Keyur Parmar [email protected] The Tenth ICISS /34

26 MR-CDA - Example 1 Node 7 decrypts, T 3 = D 3,7 (T 3 ) T 4 = D 4,7 (T 4 ) T 5 = D 5,7 (T 5 ) T 6 = D 6,7 (T 6 ) 2 Node 7 generates, T T 5 = MAC(C 5) 6 = MAC(C 6) 3 Node 5 compares, T 5 = T 5? T 6 = T 6? 4 Node 7 compares, T 5 = T 3 T 4 Keyur Parmar [email protected] The Tenth ICISS /34

27 MR-CDA - Example Node 7 computes, C 7 = C 5 C 6 T 7 = T 5 T 6 E 7,8 (T 7 ) Node 7 transmits, 7 8 C 7 E 5,8 (T 5 ) E 6,8 (T 6 ) E 7,8 (T 7 ) Keyur Parmar [email protected] The Tenth ICISS /34

28 MR-CDA - Example Node 8 receives, 7 8 C 7 E 5,8 (T 5 ) E 6,8 (T 6 ) E 7,8 (T 7 ) Keyur Parmar [email protected] The Tenth ICISS /34

29 MR-CDA - Example 1 Node 8 decrypts, T 5 = D 5,8 (T 5 ) T 6 = D 6,8 (T 6 ) T 7 = D 7,8 (T 7 ) 2 Node 8 generates, T 7 = MAC(C 7) 3 Node 8 compares, T 7 = T 7? 4 Node 8 compares, T 7 = T 5 T 6 5 Node 8 decrypts, D BS (C 7 ) = M 1 M 2 M 4 M 6 Keyur Parmar [email protected] The Tenth ICISS /34

30 MR-CDA - Example D 7,8 (T 7 ) = MAC(C 7 )? 1 : 0 D 5,8 (T 5 ) D 6,8 (T 6 ) = D 7,8 (T 7 )? 1 : 0 8 D 5,7 (T 5 ) = MAC(C 5 )? 1 : 0 D 6,7 (T 4 ) = MAC(C 6 )? 1 : 0 D 3,7 (T 3 ) D 4,7 (T 4 ) = D 5,7 (T 5 )? 1 : 0 C 7 =C 5 C 6 & T 7 =T 5 T 6 C 7, E 7,8 (T 7 ), E 5,8 (T 5 ), E 6,8 (T 6 ) D 3,5 (T 3 ) = MAC(C 3 )? 1 : 0 D 4,5 (T 4 ) = MAC(C 4 )? 1 : 0 D 1,5 (T 1 ) D 2,5 (T 2 ) = D 3,5 (T 3 )? 1 : 0 C 5 =C 3 C 4 & T 5 =T 3 T 4 C 5, E 5,7 (T 5 ), E 5,8 (T 5 ), E 3,7 (T 3 ), E 4,7 (T 4 ) C 6, E 6,7 (T 6 ), E 6,8 (T 6 ) D 1,3 (T 1 ) = MAC(C 1 )? 1 : 0 D 2,3 (T 2 ) = MAC(C 2 )? 1 : 0 C 3 =C 1 C 2 & T 3 =T 1 T 2 C 3, E 3,5 (T 3 ), E 3,7 (T 3 ), E 1,5 (T 1 ), E 2,5 (T 2 ) 3 4 C 4, E 4,5 (T 4 ), E 4,7 (T 4 ) C 1, E 1,3 (T 1 ), E 1,5 (T 1 ) 1 2 C 2, E 2,3 (T 2 ), E 2,5 (T 2 ) Keyur Parmar [email protected] The Tenth ICISS /34

31 Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar [email protected] The Tenth ICISS /34

32 Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Keyur Parmar [email protected] The Tenth ICISS /34

33 Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Data Aggregation and Message Authentication Data aggregation modifies the original data Message authentication requires the original data Keyur Parmar [email protected] The Tenth ICISS /34

34 Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Data Aggregation and Message Authentication Data aggregation modifies the original data Message authentication requires the original data Privacy and Message Authentication Privacy - Encrypted data Authentication - Plaintext data Keyur Parmar [email protected] The Tenth ICISS /34

35 Publication/Acknowledgement Publication Keyur Parmar and Devesh C. Jinwala, Malleability Resilient Concealed Data Aggregation, in Proceedings of the 20th EUNICE/IFIP WG 6.2, 6.6 Workshop on Advances in Communication Networking, France, ser. EUNICE 14. Lecture Notes in Computer Science (LNCS), pp , Springer-Verlag, Berlin, Heidelberg, Keyur Parmar The Tenth ICISS /34

36 Publication/Acknowledgement Publication Keyur Parmar and Devesh C. Jinwala, Malleability Resilient Concealed Data Aggregation, in Proceedings of the 20th EUNICE/IFIP WG 6.2, 6.6 Workshop on Advances in Communication Networking, France, ser. EUNICE 14. Lecture Notes in Computer Science (LNCS), pp , Springer-Verlag, Berlin, Heidelberg, Acknowledgement This research is a part of the project A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks. It is supported by the Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India. Keyur Parmar [email protected] The Tenth ICISS /34

37 Get your facts first, then you can distort them as you please. Mark Twain Thank You... Keyur Parmar The Tenth ICISS /34

Security Solutions for Wireless Sensor Networks

Security Solutions for Wireless Sensor Networks Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium

More information

Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs

Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs Seminar Trustworthy and Energy-Efficient Smart Grids Overview on Approach Introduced in: [B.

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin

More information

How To Secure Data Aggregation In A Wireless Sensor Network

How To Secure Data Aggregation In A Wireless Sensor Network A Framework: Secure Data Aggregation in Wireless Sensor Networks Vimal Pambhar 1, Bhoomi Bangoria 2, Bhavik Kataria 3 Assistant professor, Dept. of CSE/IT, Dr. Shubhash Technical campus, Junagadh, Gujarat,

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2

More information

A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES

A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES V K Singh 1 and Kalpana Sharma 2 1 Department of Computer Science & Engineering, Sikkim Manipal Institute

More information

Secure Large-Scale Bingo

Secure Large-Scale Bingo Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],

More information

A Fully Homomorphic Encryption Implementation on Cloud Computing

A Fully Homomorphic Encryption Implementation on Cloud Computing International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic

More information

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks Sensors 2014, 14, 6701-6721; doi:10.3390/s140406701 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks Qiang

More information

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Secure Aggregation in Hybrid Mesh/Sensor Networks

Secure Aggregation in Hybrid Mesh/Sensor Networks Secure Aggregation in Hybrid Mesh/Sensor Networks Roberto Riggio CREATE-NET Via Alla Cascata, 56/c 38123 Trento, Italy Email: [email protected] Sabrina Sicari University of Insubria Dipartimento

More information

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Security Sensor Network. Biswajit panja

Security Sensor Network. Biswajit panja Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

An Overview of Common Adversary Models

An Overview of Common Adversary Models An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks CLAUDE CASTELLUCCIA INRIA ALDAR C-F. CHAN National University of Singapore EINAR MYKLETUN QUEST Software and GENE

More information

Content of smart wireless sensor network security and its network security policy

Content of smart wireless sensor network security and its network security policy Abstract Content of smart wireless sensor network security and its network security policy Xiehua Yu Minnan Science and Technology Institute, Fujian Normal University, Fujian, 362332, China eceived 1 October

More information

Foundation University, Islamabad, Pakistan [email protected]

Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Secret Sharing based on XOR for Efficient Data Recovery in Cloud Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Depiction of Body Area Network in Cloud Environment

Depiction of Body Area Network in Cloud Environment I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

Paillier Threshold Encryption Toolbox

Paillier Threshold Encryption Toolbox Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created

More information

New System Security Model for a Mobile Operator s Meshed Access Network

New System Security Model for a Mobile Operator s Meshed Access Network New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

Security System in Cloud Computing for Medical Data Usage

Security System in Cloud Computing for Medical Data Usage , pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1

3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1 Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,

More information

Efficient Data Transmission For Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant

More information

A Practical Security Framework for Cloud Storage and Computation

A Practical Security Framework for Cloud Storage and Computation A Practical Security Framework for Cloud Storage and Computation Kavya Premkumar 1 *, Aditya Suresh Kumar 1, Saswati Mukherjee 2 1The Department of Computer Science Engineering, Guindy, Chennai, India.

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Wireless sensor network

Wireless sensor network SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3 WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.02, June-2015, Pages:0252-0258 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing December 2013, 20(6): 88 95 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.xsw.bupt.cn Secure and privacy-preserving DRM scheme

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

GSM and UMTS security

GSM and UMTS security 2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages

More information

Experimental Analysis of Privacy-Preserving Statistics Computation

Experimental Analysis of Privacy-Preserving Statistics Computation Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, [email protected]. 2

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,

More information

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Implementation of Data Sharing in Cloud Storage Using Data Deduplication Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

The Disadvantages of Free MIX Routes and How to Overcome Them

The Disadvantages of Free MIX Routes and How to Overcome Them The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California

More information