How To Secure Data Aggregation In A Wireless Sensor Network
|
|
|
- Ashlyn Mathews
- 5 years ago
- Views:
Transcription
1 A Framework: Secure Data Aggregation in Wireless Sensor Networks Vimal Pambhar 1, Bhoomi Bangoria 2, Bhavik Kataria 3 Assistant professor, Dept. of CSE/IT, Dr. Shubhash Technical campus, Junagadh, Gujarat, India 1 PG Student [CE], Dept. of CE, Noble Engineering College, Junagadh, Gujarat, India 2 PG Student [SE], Dept. of CSE, RKDF Institute of Science and Technology, Bhopal, Madhya Pradesh, India 3 ABSTRACT: Wireless Sensor Networks (WSNs) are used in many applications in the area of tracking and monitoring. WSNs have many constraints like low computational power, small memory, and limited energy resources. Most of the energy consumption is due to data transmission. For that we apply Data aggregation approach on the sensed data by the deployed sensor nodes. This approach helps to reduce the number of transmissions and improves the life time of wireless sensor network with less energy usage of sensor nodes and also to protect Data Aggregation process from various kinds of attacks becomes extremely critical. So we give some general framework for Secure Data Aggregation. Keywords: wireless sensor network, sensor node, security, attacks, cluster, Data Aggregation. I.INTRODUCTION The Sensor Network can be described as a collection of sensor nodes which co-ordinate to perform some specific action. Unlike traditional networks, sensor networks depend on dense deployment and co-ordination to carry out their tasks. Sensor Networks consisted of small number of sensor nodes that were wired to a central processing station. However, nowadays, the focus is more on Wireless Sensor Networks. In Figure 1 shows Wireless Sensor Network Architecture. Wireless sensor networks are consisting of numerous light weight and tiny sensor nodes with limited power, storage, communication and computation capabilities. Wireless sensor networks are being employed in civilian applications like habitat monitoring to mission critical Applications. Fig. 1 Wireless sensor networks Architecture [1] A sensor node is made up of four basic components as shown in Figure 2 a sensing unit, a processing unit, a transceiver unit and a power unit. They may also have application dependent additional components such as a location finding system, a power generator and a mobilizerusers. Copyright to IJAREEIE
2 Fig. 2 Component of sensor Nodes [2]. II. GENERAL SURVEY OF WIRELESS SENSOR NETWORKS (WSNS). Several attempts were made by the researchers to study the major challenges in WSNs, security requirements of WSNs, Constraints of WSNs. That survey mentions in below Table 1. WSNs Major Challenges Mobility and topology changes Due to mobility of Sensor nodes network topology would be changed dynamically. Energy constraints Limited battery power of small tiny sensor nodes. Security Issues All the traditional networks security approaches are cannot directly apply on WSNs. WSNs Constraints Limited Resources like computational energy (Battery). Physical memory, power, Scalability- The protocols must be scalable enough to respond and operate with such large number of sensor nodes. Quality of Service the data should be delivered within a certain period of time from the moment it is sensed otherwise the data will be careless. WSNs Security Requirements Availability Networks services are available even in the presence of denial-ofservice attacks. Authentication a malicious node cannot masquerade as a trusted network node. Confidentiality a given message cannot be understood by anyone other than the desired recipients. Integrity a message sent from one node to another is not modified by malicious intermediate nodes. Authorization Only authorized sensors can be involved in providing information to network services. Table 1. A Survey for Wireless Sensor networks. III. DATA AGGREGATION The architecture of the sensor network plays important role in the performance of data aggregation protocols. Several data aggregation protocols have been proposed.these protocols can be classified based on network models. There are two categories: Tree based data aggregation [9] and cluster based data aggregation. Copyright to IJAREEIE
3 Cluster based Data aggregation [8] is the process of combining the data coming from various sources and en route them after removing redundancy such as to improve the overall network lifetime. The in-network processing is done on the aggregator node. The aggregator node aggregate the data received from its child node as per the required aggregation function (like min, max, average, sum etc.) and send the aggregated result to the other high level aggregated node. An Aggregation Scenario using Clustering shown in Figure 3 in that cluster heads collect the data from all the neighbours sensor nodes and forwarded that data to the Base Station (Sink Node).Base station sends that information to the external network via Internet. External Network External Network Base Station Cluster Head Cluster Head External Network Sensor Node Cluster Head Sensor Node Sensor Node Fig. 3. Aggregation Scenario using Clustering [10]. IV. CLASSIFICATION OF SECURE DATA AGGREGATION The work on secure data aggregation can be classified based on encryption of data at specific nodes into three categories, hop-by-hop encrypted data aggregation end-to-end encrypted data aggregation [12] and Privacy Homomorphism.. A. Hop-by-Hop encrypted data aggregation In the hop-by-hop encrypted data aggregation [13], intermediate nodes decrypt every message received by them. so, get the plaintext.then aggregate the plaintext according to the aggregate function, and encrypt the aggregate result before transmitting it. In this all the intermediate sensor node has to decrypt the received data and apply aggregation function on it. Due to many decryptions perform by the intermediate node it s consuming more battery power and not provide end-to-end security. B. End-to-End encrypted data aggregation In order to overcome the drawbacks of the hop-by-hop encrypted data aggregation [14, 15, 17] a set of end-to-end encrypted data aggregation protocols are proposed. In those schemes, intermediate nodes can aggregate the cipher text directly without decrypting the messages. Compared to the hop-by-hop one, it can guarantee the end-to-end data confidentiality and result in less transmission latency and computation cost. Adversaries will not be able to recognize what reading it is during data transmission. In terms of privacy, they designed aims to eliminate redundant reading for data aggregating but this reading remains secret to the aggregator. C. Privacy Homomorphism A Privacy Homomorphism (PH) [18] is an encryption transformation that allows direct computation on encrypted data. In homomorphic encryption certain aggregation functions can be calculated on the encrypted data. The data is encrypted and sent toward the base station, while sensors along the path apply the aggregation function on the encrypted data. The base station receives the encrypted aggregate result and decrypts it. Specifically, a homomorphic encryption scheme allows the following property to hold enc (a + b) = enc (a) + enc (b) Copyright to IJAREEIE
4 This means that in order to calculate the SUM of two values, we can apply some function to their encrypted counterparts and then decrypt the result of the SUM operation at sink node. The data would be encrypted at the sensor node, the SUM or AVERAGE would be calculated as the aggregate result follows a path to the base station, and the final result would be decrypted at the base station. V. A GENERAL FRAMEWORK OF SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORK. In a general framework of Secure Data Aggregation, First, we discuss about the how to make clusters for the randomly placed nodes using Heartbeat node placement algorithm. We modify Appheartbeat protocol for the implementation of the clustering for the Data Aggregation. For the simulation we use Jist (java in simulation time)/swan (Scalable Wireless Ad-hoc Networks) Simulator. Some of the nodes will work as cluster heads. These cluster heads are responsible to receive message or data from their neighbours. Each cluster head send hello message to all other nodes, those nodes which are in the range of cluster head they send the message back to cluster head and join with that cluster for further processing. We measure energy usage by every cluster head by the energy model which is integrated in the SWAN simulator and also show the comparison graph of energy usage by clusters heads between static and dynamic clusters heads selection procedure. In below figure we mention the steps for the Data Aggregation using cluster based Data Aggregation for that we modify Apphertbeat protocol which is my default protocol given in SWAN simulator. Fig. 4 Data Aggregation (SUM) Architecture in JiST/SWAN. We apply privacy on sending data by the sensor nodes to the Cluster head. We apply end to end symmetric cryptography based on Privacy Homomorphism on the sending data. Figure 5 represents End to End privacy approach, in that S 1, S 2,..., Sn. nodes sense the data from the environment, before sending it to cluster head or aggregator node, It they apply encryption method on it and then send encrypted data to the cluster head. Perform SUM function on encrypted data using Privacy Homomorphism and sends this encrypted aggregated result to the base station. Base station applies decryption method on that data and gets original data. During this whole procedure we measure the energy usage by the cluster heads. Copyright to IJAREEIE
5 Fig. 5 End to End Secure Data Aggregation VI.CONCLUSION By reviewing the existing data aggregation in the WSN, an adversarial model that can be more useful to save the energy of Wireless sensor Nodes that lead to improve the life time of whole networks. An adversarial model for security on Data Aggregation its help us to give batter performance compare to existing scheme. VII. FUTURE WORK In future work, this method can be made more scalable and finetuned with the multi level clustering where the cluster can have two to three level tree so the cluster can cover more number of nodes with lower energy consumption. It is also planned to evaluate more secure schemes and extend the framework if necessary. We hope that our work will encourage other researchers to consider the vital problem of secure information aggregation in sensor networks. REFERENCES [1] Akyildiz, I.F. Weilian Su Sankarasubramaniam, Y. Cayirci, E. Georgia, A survey on sensor networks, IEEE communication magazine,vol.30,no.8,pp , [2] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor Network Security: A Survey, IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, Second Quarter, [3] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks, volume 38,pp ,2002. [4] Yong Wang, Garhan Attebury, and Byrav Ramamurthy, A Survey Of Security Issues In Wireless Sensor Networks, IEEE Communication, 2nd quarter, volume 8, NO. 2,2006. [5] Hemanta Kumar Kalita and Avijit Kar, Wireless Sensor Network Security Analysis, International Journal of Next-Generation Networks (IJNGN), Vol.1, No.1, December [6] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey,computer Networks,vol. 52,pp ,2008. [7] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor Network Security: A Survey,Ieee Communications Surveys & Tutorials, Vol. 11, No. 2, pp 55-77,second quarter 2009, [8] Mukesh Kumar Jha, T.P. Sharma, Secure Data aggregation in Wireless Sensor Network: A Survey, Computer Networks,2005. [9] Elena Fasolo and Michele Rossi, Network Aggregation Techniques For Wireless Sensor Networks: A Survey, Ieee Wireless Communications, April [10] Hani Alzaid Ernest Foo Juan Gonzalez Nieto, Secure Data Aggregation in Wireless Sensor Network: a survey, Conferences in Research and Practice in Information Technology (CRPIT), Vol. 81, January [11] Nandini. S. Patil, Prof. P. R. Patil, Data Aggregation in Wireless Sensor Network, IEEE International Conference on Computational Intelligence and Computing Research, [12] Yingpeng Sang, Hong Shen, Secure Data Aggregation inwireless Sensor Networks: A Survey, Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), [13] Xiaoyan Wang, Jie Li, Xiaoning Peng And Beiji Zou, Secure And Efficient Data Aggregation For Wireless Sensor Networks, IEEE Seventh vehicular Technology Conference Fall,pp. 1-5, [14] C.Castelluccia, E.Mykletun, G.Tsudik, Efficient Aggregation of Encrypted data in wireless sensor network, in: Proceeding of the conference on mobile and Ubiquitous System: Networking and Services, pp , [15] D. Westhoff, J. Girao, M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation, IEEE Transactions on Mobile Computing, Vol. 5, No. 10, pp , [16] Shih-I Huang, Shiuhpyng shieh, J.D.Tygar, Secure encrypted data aggregation for wireless sensor networks, Springer, [17] A.S.Poornima, B.Amberker, SEEDA: Secure End to End data Aggregation in Wireless sensor networks, IEEE Seventh International Conference on Wireless and Optical Communication Network,pp.1-5, [18] Josep Ferrer and Domingo, A new privacy homomorphism and applications, In: Inf. Process. Lett. 60(5), pp , Copyright to IJAREEIE
6 BIOGRAPHY Vimal J. Pambhar has completed the M.Tech in Computer Engineering from U.V. Patel College of Engineering, Ganpat University, and Gujarat, India. His Research area is Secure Data Aggregation in Wireless Sensor Network Subject. Right now he is work as Assistant Professor at CSE/IT Department in Dr.Subhash Technical Campus, Junagadh, Gujarat , and India. Bhoomi M. Bangoria is pursuing M.E scholar in Computer Engineering from Noble Engineering College, Junagadh, Gujarat , and India. Kataria Bhavikkumar M. is pursuing M.Tech. in Software Engineering from RKDF Institute of Science and Technology, Bhopal, Madhya Pradesh and He has completed his B.E. in Computer Engineering from C.U.Shah College of Engineering and Technology, Wadhwan City, Gujarat. Now days he is working as Assistant Professor in Dr. Subhash Technical Campus, Junagadh, Gujarat. Copyright to IJAREEIE
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Security Solutions for Wireless Sensor Networks
Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
End-to-end Secure Data Aggregation in Wireless Sensor Networks
End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
An Elliptic Curve based Hierarchical Cluster Key Management in Wireless Sensor Network
An Elliptic Curve based Hierarchical Cluster Key Management in Wireless Sensor Network Srikanta Kumar Sahoo and Manmanth Narayan Sahoo National Institute of Technology Rourkela, Odisha, India [email protected],[email protected]
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India [email protected]
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3
WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.02, June-2015, Pages:0252-0258 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA
ACCELERATED BROADCAST AUTHENTICATION WITH SIGNATURE AMORTIZATION FOR WSNS
ACCELERATED BROADCAST AUTHENTICATION WITH SIGNATURE AMORTIZATION FOR WSNS Minnu Meria Mathew 1, Anjitha Mary 2 1 Student, Computer Science & Engineering, ASIET, Kerala, India 2 Assistant Professor, Computer
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
New System Security Model for a Mobile Operator s Meshed Access Network
New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN 2278-7763 473
473 Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication Shital Y. Gaikwad M. Tech. (Second Year Student) (Computer Network and Information Security) SGGS Institute of Engineering and
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Depiction of Body Area Network in Cloud Environment
I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
SECURITY VULNERABILITY ISSUES IN WIRELESS
SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY C K Marigowda 1, Manjunath Shingadi 2 Associate Professor, Department of Information Science & Eng, Acharya Institute of Technology,
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK Paulraj*1, A.Syam Prasad*2 M.Tech (CSE) Student, Department of CSE, MRCET, Kompally, Hyderabad, A.P, India
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, [email protected]
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
Secure Data Aggregation in Wireless Sensor Networks
Secure Data Aggregation in Wireless Sensor Networks by Hani Alzaid Bachelor of Computer Engineering (King Saud University) 2000 Master of Computer Science and Engineering (University of New South Wales)
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 [email protected],
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System
Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
7 Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks Jaydip Sen Innovation Lab, Tata Consultancy Services Ltd. India 1. Introduction In recent years, wireless sensor
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
