This document proposes a novel broadcast authentication scheme for wireless sensor networks that uses elliptic curve digital signature algorithm (ECDSA) with signature amortization. It splits broadcast messages into blocks and extends each block with an authenticator, generating extended blocks. A single ECDSA signature authenticates an entire group of messages by authenticating the authenticator in the first extended block, which then authenticates subsequent blocks and messages. However, ECDSA signature verification is slower than generation. To address this, the scheme uses cooperation among sensor nodes, allowing nodes with high energy to share intermediate verification results to accelerate the process. Simulation results show this reduces overhead and verification delay significantly compared to traditional approaches.
This document summarizes a research paper that proposes using the Rivest Cipher version 6 (RC6) algorithm to provide message authentication and source privacy in wireless sensor networks. It discusses challenges with existing symmetric and public key approaches to message authentication in wireless sensor networks due to their high computational overhead and lack of scalability. The proposed approach aims to achieve efficient hop-by-hop message authentication, identity privacy, and location privacy using RC6 encryption. It evaluates RC6 in terms of computational overhead, energy consumption, message delay, and memory consumption compared to other techniques.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
Wireless reprogramming during a wireless detector net- work (WSN) is that the method of propagating a
replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in
hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all
existing insecure/secure reprogramming protocols square measure supported the centralized approach,
it\'s necessary to support distributed reprogramming during which multiple licensed network users will at
the same time and directly reprogram detector nodes while not involving the bottom station. Terribly
recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been
planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish
associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate
that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any
licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward
modification to mend the known security drawback while not losing any options of SRDRP. Our
experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B
redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal
computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications.
Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP;
any higher established identity-based position formula will be directly utilized in SRDRP. Supported
implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
Abstract The aim of this paper is to protect the wireless network against the blackhole attack. Blackhole attack, as the name suggest, drops all the packets forwarded to it. In this paper, we have proposed an intrusion detection system (IDS) scheme to detect the malicious node (blackhole node) and to nullify its effect in the network. The proposed IDS scheme in the presence of blackhole attack gives approximately similar result as that of in the absence of attack. The network comprises for the three modules (i) Default AODV, (ii) AODV in the presence of blackhole attack and (iii) IDS scheme in the presence of attack by considering some parameters such as end to end delay, throughput, packet delivery ratio, normalized routing load etc. The proposed algorithm has been simulated on Network Simulator version-2 (NS-2). Key Words: AODV, Blackhole attack, DSN, IDS scheme, routing misbehavior, security
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...IJMTST Journal
In Wireless sensor network, sensor nodes are used to monitor physical or environmental condition. Sensor
networks are often deployed in an unattended and hostile environment to perform the monitoring and data
collection tasks. When it is deployed in such an environment, it lacks physical protection and subjected to
node compromise. After compromising one or multiple sensor nodes, an adversary may launch various
attacks to disrupt the in-network communication. Among these attacks, two common ones are dropping
packets and modifying packet. In this paper, we propose a simple yet effective scheme to identify
misbehaving forwarders that drop or modify packets. Node Categorization algorithm and Global Ranking
algorithm are
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
Wireless sensor network is a type of network which have no communications pattern for communication between nodes, any node can easily join the network and leave the network so attacks are more probable. Gray hole is one of such attacks and it is tough to detect since malicious node switches behavior between normal node and malicious node. For detection and prevention of gray hole attacks our proposed technique is based on Cluster head and RREQ based approach in WSN. In our proposed technique we select a node which has the highest energy as a cluster head and remaining node are marked as work as cluster member. For each node we decide a threshold for sending RREQ if any node generate RREQ more than threshold then we check its RREP threshold value if it’s less than one than cluster head will conclude this node as a malicious node and broadcast its node id so that all other nodes also mark it as malicious node and drop the request arrive from this malicious node and for gray hole detection.
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
This paper presents a novel scheme that provides high level of security and privacy in a Wireless Mesh
Network (WMN). We combine an approach of Network Coding with multiple layered encryption of onion routing for a WMN. An added superior feature provides higher level of security and privacy. Sensitive network information is confined to 1-hop neighborhood which is available anyways in a wireless medium with nodes using a bivariate polynomial. The only routing information divulged to a relay node is about next hop. No plain text is ever transmitted and all data can only be decrypted by its source and destination.Prior work finds it difficult to enforce encryption with network coding without divulging in complete
routing information,hence losing privacy and anonymity. We compare our scheme with other existing approach for several networks. The preliminary results show this work to provide superior security and anonymity at low overhead cost.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
In Wireless Sensor Networks (WSNs), most
of the existing key management schemes, establish shared
keys for all pairs of neighbor sensor nodes without
considering the communication between these nodes.
When the number of sensor nodes in WSNs is increased
then each sensor node is to be loaded with bulky amount
of keys. In WSNs a sensor node may communicate with a
small set of neighbor sensor nodes. Based on this fact, in
this paper, an energy efficient Traffic-Aware Key
Management (TKM) scheme is developed for WSNs,
which only establishes shared keys for active sensors
which participate in direct communication. The proposed
scheme offers an efficient Re-keying mechanism to
broadcast keys without the need for retransmission or
acknowledgements. Numerical results show that proposed
key management scheme achieves high connectivity. In
the simulation experiments, the proposed key
management scheme is applied for different routing
protocols. The performance evaluation shows that
proposed scheme gives stronger resilence, low energy
consumption and lesser end to end delay.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
Wireless Sensor Networks consists of sensor nodes
that are capable of sensing the information and maintaining
security. In this paper, an Anonymity and Trust Management
Scheme applied to Clustered Wireless Sensor Networks
(ATMC) is proposed which enhances the security level. It also
provides a stable path for communication. It is observed that
the performance of the network is better than existing schemes
through simulation
The document discusses techniques for secure neighbor discovery and position verification in mobile ad hoc networks (MANETs). It proposes a distributed protocol called Neighbor Position Verification (NPV) that allows nodes to verify the positions of neighboring nodes without relying on trusted third parties. The NPV protocol uses a 4-step message exchange and distance calculations to classify neighbor nodes as verified, faulty, or unverifiable. It aims to minimize false positives and negatives while being robust against adversarial attacks. The document also discusses extending NPV to dynamic source routing to allow for verification of mobile nodes rather than static node positions. This improves security and network performance for MANETs.
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
This document proposes a probabilistic misbehavior detection scheme called iTrust to detect misbehavior in delay tolerant networks (DTNs). iTrust introduces a periodically available Trusted Authority (TA) that estimates nodes' behaviors based on collected routing evidence. It associates detection probability with nodes' reputations for effective inspection. The key contributions are a framework for generating forwarding evidence that can detect misbehaviors and be compatible with various routing protocols, and using the TA and evidence to detect malicious nodes and reduce packet dropping.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
This document proposes SIEVE, a decentralized technique to identify malicious nodes in mobile ad hoc networks (MANETs). SIEVE uses rateless coding and the LT decoding process to detect corrupted data packets. It constructs a factor graph based on "checks" that nodes generate when decoding data. These checks contain information about which nodes provided packet data and whether the data was corrupted. SIEVE runs belief propagation on the factor graph to compute the probability that each node is malicious based on the checks. Simulation results show that SIEVE can accurately identify malicious nodes and is robust against various attacks, while having low computational and communication costs suitable for MANETs.
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Spatial correlation based clustering algorithm for random and uniform topolog...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a project called "MAGICUS CLOCK" that tracks the location of a person within a building and displays it on an analog clock face. The system uses Zigbee wireless modules placed at three locations (A, B, C), a handset carried by the person, and a clock module connected to a stepper motor. When the handset detects a signal from one of the stationary modules, it relays the signal (A, B, or C) to the clock module. The microcontroller then turns the stepper motor the appropriate number of steps to move the clock hand to the corresponding location on the face. The goal is to allow anyone to easily track a person's location without searching the entire building
Low complexity digit serial fir filter by multiple constant multiplication al...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modeling the wettability alteration tendencies of bioproducts during microbia...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A tricky task scheduling technique to optimize time cost and reliability in m...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Power quality enhancement by improving voltage stability using dstatcomeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
In Wireless Sensor Networks (WSNs), most
of the existing key management schemes, establish shared
keys for all pairs of neighbor sensor nodes without
considering the communication between these nodes.
When the number of sensor nodes in WSNs is increased
then each sensor node is to be loaded with bulky amount
of keys. In WSNs a sensor node may communicate with a
small set of neighbor sensor nodes. Based on this fact, in
this paper, an energy efficient Traffic-Aware Key
Management (TKM) scheme is developed for WSNs,
which only establishes shared keys for active sensors
which participate in direct communication. The proposed
scheme offers an efficient Re-keying mechanism to
broadcast keys without the need for retransmission or
acknowledgements. Numerical results show that proposed
key management scheme achieves high connectivity. In
the simulation experiments, the proposed key
management scheme is applied for different routing
protocols. The performance evaluation shows that
proposed scheme gives stronger resilence, low energy
consumption and lesser end to end delay.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
Wireless Sensor Networks consists of sensor nodes
that are capable of sensing the information and maintaining
security. In this paper, an Anonymity and Trust Management
Scheme applied to Clustered Wireless Sensor Networks
(ATMC) is proposed which enhances the security level. It also
provides a stable path for communication. It is observed that
the performance of the network is better than existing schemes
through simulation
The document discusses techniques for secure neighbor discovery and position verification in mobile ad hoc networks (MANETs). It proposes a distributed protocol called Neighbor Position Verification (NPV) that allows nodes to verify the positions of neighboring nodes without relying on trusted third parties. The NPV protocol uses a 4-step message exchange and distance calculations to classify neighbor nodes as verified, faulty, or unverifiable. It aims to minimize false positives and negatives while being robust against adversarial attacks. The document also discusses extending NPV to dynamic source routing to allow for verification of mobile nodes rather than static node positions. This improves security and network performance for MANETs.
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
This document proposes a probabilistic misbehavior detection scheme called iTrust to detect misbehavior in delay tolerant networks (DTNs). iTrust introduces a periodically available Trusted Authority (TA) that estimates nodes' behaviors based on collected routing evidence. It associates detection probability with nodes' reputations for effective inspection. The key contributions are a framework for generating forwarding evidence that can detect misbehaviors and be compatible with various routing protocols, and using the TA and evidence to detect malicious nodes and reduce packet dropping.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
This document proposes SIEVE, a decentralized technique to identify malicious nodes in mobile ad hoc networks (MANETs). SIEVE uses rateless coding and the LT decoding process to detect corrupted data packets. It constructs a factor graph based on "checks" that nodes generate when decoding data. These checks contain information about which nodes provided packet data and whether the data was corrupted. SIEVE runs belief propagation on the factor graph to compute the probability that each node is malicious based on the checks. Simulation results show that SIEVE can accurately identify malicious nodes and is robust against various attacks, while having low computational and communication costs suitable for MANETs.
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Spatial correlation based clustering algorithm for random and uniform topolog...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a project called "MAGICUS CLOCK" that tracks the location of a person within a building and displays it on an analog clock face. The system uses Zigbee wireless modules placed at three locations (A, B, C), a handset carried by the person, and a clock module connected to a stepper motor. When the handset detects a signal from one of the stationary modules, it relays the signal (A, B, or C) to the clock module. The microcontroller then turns the stepper motor the appropriate number of steps to move the clock hand to the corresponding location on the face. The goal is to allow anyone to easily track a person's location without searching the entire building
Low complexity digit serial fir filter by multiple constant multiplication al...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modeling the wettability alteration tendencies of bioproducts during microbia...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A tricky task scheduling technique to optimize time cost and reliability in m...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Power quality enhancement by improving voltage stability using dstatcomeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Information security risk assessment under uncertainty using dynamic bayesian...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Counting of wb cs and rbcs from blood images using gray thresholdingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...eSAT Publishing House
The document discusses a study analyzing the properties of cake layers formed during ultrafiltration of polydisperse silica colloid dispersions. Scanning electron microscopy (SEM) and atomic force microscopy (AFM) were used to analyze fouled membranes and directly compare the particle arrangement and average thickness of cake layers formed under different conditions. Results from SEM and AFM analysis corresponded in terms of particle arrangement and average cake thickness. A resistance model was used to estimate specific cake resistance from filtration rate and cake layer thickness analysis via SEM.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
This document summarizes a study comparing different tax compliance software programs. It begins by introducing the proposed "BOOKSOFACCOUNTS" software, which would be a cloud-based accounting and database management system. It then reviews the features of existing software programs like Tally, QuickBooks, Busy, and others. Many current programs lack cloud functionality, statutory compliance features, and additional reporting capabilities. The proposed system aims to overcome these drawbacks. It would provide accounting, inventory, payroll, taxation, and management modules all in one system stored on the cloud. This would increase storage and data access while reducing data duplication. In conclusion, the integrated, cloud-based system could help businesses more easily monitor finances and comply with regulations
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...Roberto Scarafia
PRIMO INCONTRO DI GENETICA ONCOLOGICA
Ruolo del dato genetico nel percorso diagnostico delle MDS
Anomalie cromosomiche nelle MDS
Dalla citogenetica convenzionale alla citogenetica molecolare
Mutazioni somatiche delle MDS e Patogenesi molecolare
Correlazione genotipo-fenotipo
Ruolo del dato genetico nel percorso diagnostico delle MDS: raccomandazioni ELN
Frequenza delle anomalie cromosomiche
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
This document presents a case study on authentication in wireless sensor networks using virtual certificate authorities. It discusses how sensor nodes can securely transmit data when moving across different wireless sensor networks. The proposed approach uses virtual certificates issued by a virtual certificate authority to authenticate moving sensor nodes. Simulation results show that the virtual certificate scheme reduces collisions compared to previous authentication algorithms. The scheme enhances security, scalability and interoperability while supporting node mobility across wireless sensor networks.
This document discusses message authentication and source privacy in wireless sensor networks using the RC6 algorithm. It begins by reviewing existing approaches to message authentication like symmetric-key and public-key cryptosystems, which have limitations related to overhead and scalability. The document then proposes using the RC6 algorithm to provide efficient hop-by-hop message authentication and source privacy in wireless sensor networks. It aims to authenticate messages at each forwarding node while also hiding the identity and location of the message sender. The document reviews related work on wireless sensor networks and the network simulator NS-2 before describing the proposed RC6-based approach and its goals of message authentication, source privacy, and efficiency.
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
The wireless sensor network is an networking field that combines sensing, computation, and communication into a single
tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much
work has focused on making sensor networks realistic and useful, but still security in sensor network data communication is big issue
for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor
network to save energy factor of the sensor nodes and to save time for data communication between the sensor nodes in the network
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes (MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%)
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a
fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes
(MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network
energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%) against false report attacks in WSNs.
Wireless channel-based ciphering key generation: effect of aging and treatmentIJECEIAES
Key generation for data cryptography is vital in wireless communications secu- rity. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the ran- domness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this pa- per, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is de- veloped which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys.
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
In this paper Identity based digital Signature and Identity based online offline algorithm for the cluster based wireless sensor networks is used. Identity based digital signature computes the digital signature signing process. Identity based online offline algorithm reduces the complexity of computational overhead in cluster head. This project reduces the overhead of the cluster head for efficient transmission. The method for efficient data transmission using Identity based digital signature is also implemented for minimizing end-to-end delay using network simulator. The graphics analysis toolbox and awk scripts is used to process the data from trace files.
This document summarizes a research paper that proposes a scalable authentication scheme for wireless sensor networks using elliptic curve cryptography. It discusses the need for secure and efficient data transmission in wireless sensor networks. It reviews existing symmetric key-based and public key-based message authentication schemes and identifies their limitations, such as lack of scalability, vulnerability to node compromise, and high computational overhead. The proposed scheme aims to provide message authentication, integrity, and hop-by-hop verification while being resilient to node compromise and efficient in terms of computation and communication.
Security in Wireless Sensor Networks Using BroadcastingIJMER
This document summarizes an efficient broadcast authentication scheme for wireless sensor networks. It discusses how broadcast is an important communication method in WSNs due to the large number of sensor nodes. However, traditional MACs are not suitable for broadcast without modification because any receiver could impersonate the sender. The document proposes using a cryptographic hash function to construct a HORS (Hash to Obtain Random Subset) scheme involving key generation, signing and verification phases to authenticate broadcast messages while reducing storage requirements compared to previous schemes. This provides an efficient security mechanism for broadcast in WSNs.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
This document proposes a Tiered Authentication scheme called TAM for multicast traffic in ad-hoc networks. TAM exploits network clustering to reduce overhead and ensure scalability. Within a cluster, one-way hash chains authenticate message sources by appending an authentication code to messages. Between clusters, messages include multiple authentication codes based on different keys from the source to authenticate it. TAM aims to securely deliver multicast traffic while addressing challenges like resource constraints and packet loss in ad-hoc networks.
Client server computing in mobile environments part 2Praveen Joshi
Client server computing in mobile environments. Versatile, Message based, Modular Infrastructure intended to improve usability, flexibility, interoperability and scalability as compared to Centralized, Mainframe, time sharing computing.
Intended to reduce Network Traffic.
Communication is using RPC or SQL
This document proposes an efficient message authentication scheme for wireless sensor networks based on elliptic curve cryptography (ECC). It discusses the limitations of existing symmetric-key and polynomial-based authentication schemes, such as vulnerability to node compromise and threshold limitations. The proposed scheme generates a source anonymous message authentication code (SAMAC) using a modified ElGamal signature scheme on elliptic curves. This provides unconditional source anonymity, efficient hop-by-hop authentication without threshold limitations, and resilience against node compromise attacks. The scheme aims to authenticate messages with low computational and communication overhead suitable for resource-constrained wireless sensor networks.
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
This document proposes a key exchange mechanism for wireless sensor networks that reduces the number of keys each sensor node must store. It presents a protocol where each sensor node stores (n+1)/2 keys, rather than the n-1 keys required in the original protocol, where n is the number of sensor nodes. The protocol uses a "key sender" that distributes keys to sensor nodes. It proves this approach is optimal by showing any secure keying protocol must store at least (n-1)/2 keys per node. The protocol provides mutual authentication and secure data exchange between neighboring sensor nodes using these shared keys.
Survey on Hop-by-Hop Message Authentication and Source Privacy in WSN IRJET Journal
This document summarizes and reviews several existing approaches for message authentication and source privacy in wireless sensor networks (WSNs). It proposes a new flexible authentication scheme based on elliptic curve cryptography that allows nodes to transmit an unlimited number of messages without hitting the threshold limit of previous polynomial-based approaches. Through both theoretical analysis and simulation results, the proposed scheme is shown to be more efficient than polynomial-based methods in terms of computational and communication overhead under the same security levels, while also providing message source anonymity.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
Expansive soils (ES) have a long history of being difficult to work with in geotechnical engineering. Numerous studies have examined how bagasse ash (BA) and lime affect the unconfined compressive strength (UCS) of ES. Due to the complexities of this composite material, determining the UCS of stabilized ES using traditional methods such as empirical approaches and experimental methods is challenging. The use of artificial neural networks (ANN) for forecasting the UCS of stabilized soil has, however, been the subject of a few studies. This paper presents the results of using rigorous modelling techniques like ANN and multi-variable regression model (MVR) to examine the UCS of BA and a blend of BA-lime (BA + lime) stabilized ES. Laboratory tests were conducted for all dosages of BA and BA-lime admixed ES. 79 samples of data were gathered with various combinations of the experimental variables prepared and used in the construction of ANN and MVR models. The input variables for two models are seven parameters: BA percentage, lime percentage, liquid limit (LL), plastic limit (PL), shrinkage limit (SL), maximum dry density (MDD), and optimum moisture content (OMC), with the output variable being 28-day UCS. The ANN model prediction performance was compared to that of the MVR model. The models were evaluated and contrasted on the training dataset (70% data) and the testing dataset (30% residual data) using the coefficient of determination (R2), Mean Absolute Error (MAE), and Root Mean Square Error (RMSE) criteria. The findings indicate that the ANN model can predict the UCS of stabilized ES with high accuracy. The relevance of various input factors was estimated via sensitivity analysis utilizing various methodologies. For both the training and testing data sets, the proposed model has an elevated R2 of 0.9999. It has a minimal MAE and RMSE value of 0.0042 and 0.0217 for training data and 0.0038 and 0.0104 for testing data. As a result, the generated model excels the MVR model in terms of UCS prediction.
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...ManiMaran230751
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The
Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The
Presentation Phase.
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCHSridhar191373
Statement of unit commitment problem-constraints: spinning reserve, thermal unit constraints, hydro constraints, fuel constraints and other constraints. Solution methods: priority list methods, forward dynamic programming approach. Numerical problems only in priority list method using full load average production cost. Statement of economic dispatch problem-cost of generation-incremental cost curve –co-ordination equations without loss and with loss- solution by direct method and lamda iteration method (No derivation of loss coefficients)
Optimize Indoor Air Quality with Our Latest HVAC Air Filter Equipment Catalogue
Discover our complete range of high-performance HVAC air filtration solutions in this comprehensive catalogue. Designed for industrial, commercial, and residential applications, our equipment ensures superior air quality, energy efficiency, and compliance with international standards.
📘 What You'll Find Inside:
Detailed product specifications
High-efficiency particulate and gas phase filters
Custom filtration solutions
Application-specific recommendations
Maintenance and installation guidelines
Whether you're an HVAC engineer, facilities manager, or procurement specialist, this catalogue provides everything you need to select the right air filtration system for your needs.
🛠️ Cleaner Air Starts Here — Explore Our Finalized Catalogue Now!
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
UNIT-5-PPT Computer Control Power of Power SystemSridhar191373
Introduction
Conceptual Model of the EMS
EMS Functions and SCADA Applications.
Time decomposition of the power system operation.
Open Distributed system in EMS
OOPS
Department of Environment (DOE) Mix Design with Fly Ash.MdManikurRahman
Concrete Mix Design with Fly Ash by DOE Method. The Department of Environmental (DOE) approach to fly ash-based concrete mix design is covered in this study.
The Department of Environment (DOE) method of mix design is a British method originally developed in the UK in the 1970s. It is widely used for concrete mix design, including mixes that incorporate supplementary cementitious materials (SCMs) such as fly ash.
When using fly ash in concrete, the DOE method can be adapted to account for its properties and effects on workability, strength, and durability. Here's a step-by-step overview of how the DOE method is applied with fly ash.
This presentation provides a detailed overview of air filter testing equipment, including its types, working principles, and industrial applications. Learn about key performance indicators such as filtration efficiency, pressure drop, and particulate holding capacity. The slides highlight standard testing methods (e.g., ISO 16890, EN 1822, ASHRAE 52.2), equipment configurations (such as aerosol generators, particle counters, and test ducts), and the role of automation and data logging in modern systems. Ideal for engineers, quality assurance professionals, and researchers involved in HVAC, automotive, cleanroom, or industrial filtration systems.
Bituminous binders are sticky, black substances derived from the refining of crude oil. They are used to bind and coat aggregate materials in asphalt mixes, providing cohesion and strength to the pavement.
Accelerated broadcast authentication with signature amortization for wsns
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 72
ACCELERATED BROADCAST AUTHENTICATION WITH
SIGNATURE AMORTIZATION FOR WSNS
Minnu Meria Mathew1
, Anjitha Mary2
1
Student, Computer Science & Engineering, ASIET, Kerala, India
2
Assistant Professor, Computer Science & Engineering, ASIET, Kerala, India
Abstract
Asymmetric Key Cryptography is widely used in broadcasting areas for authentication. But it is considered to be expensive to
wireless sensor networks. This proposed system is a novel broadcast authentication scheme based on PKC with signature
amortization. This scheme uses single Signature for authenticating a group of broadcast messages. As a result, the overhead is
spread over that group of broadcast messages. Moreover, this scheme gives high security and low overhead also. But signature
verification in ECDSA slower than signature generation. So, broadcast authentication with ECDSA has also suffered large energy
consumption and lengthy verification delay. To reduce, this system uses cooperation among sensor nodes, which helps to
accelerate the signature verification. During Signature verification, sensor nodes which have high energy allowed to leave the
intermediary results of the signature verification process to their neighbors for accelerating the same. Simulation results show
that the overhead of message authentication and the delay of verification of authenticated messages is reduced
significantly.
Keywords: Wireless sensor networks; Broadcast authentication; Cooperative Communication; signature
amortization.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor Network composed of one or more base
station and number of sensor nodes that are scattered to
monitor environmental and physical conditions like
pressure, temperature, humidity. Base stations are the nodes
that connects users and sensor nodes. A sensor node has
limited power, storage, communication and computation.
WSN is often deployed in hostile situations which is lack of
protection of the environment, and extremely vulnerable to
attack like any other conventional network. For example, an
adversary eavesdropping radio channel, can inject, intercept,
modify, and destruct data packets. But the limited resource
characteristics and unique application features of it needs
some extra security requirements with the typical network
requirements.
In WSN, Broadcast authentication is an important security
concern, as it supports authenticated broadcasting of
messages. Generally, Point-to-point authentication is by
symmetric key cryptographic techniques. In this, the secret
key with sender and receiver is same by which the
cryptographic message authentication code over each
message is computed. In sensor networks, broadcast
authentication is difficult. The symmetric approaches for
point-to-point authentication are not secured enough for
broadcast authentication, where sensor nodes are not
mutually trusted. In symmetric scenario, compromised
receiver node can forge messages from the sender node. So
broadcast authentication for WSNs encounters many
challenges. Due to the constraints of sensor nodes, the
broadcast authentication schemes by conventional Public
Key Cryptography (PKC) are too expensive for WSNs due
to this reason.
Perrig [9] propose µTESLA as a broadcast authentication
scheme for WSNs. µTESLA exploits symmetric scenario to
authenticate broadcasted messages. It satisfies limitations of
WSNs. S it is efficient. But there is chances for node
compromise attacks because of delayed disclosure of secret
keys. To boost the performance of µTESLA, number of
variants[10] [11] [12] are proposed. But this group of
µTESLA have some shortcomings such as maintenance of
time synchronization and distribution of the initial
parameter. These are achieved by unicast transmission. So it
shows heavy overhead. Another shortcoming is delayed
authentication.
For the public-key based authentication technique, each
message is transmitted along with the digital signature of the
message which produced using the sender’s private key.
Every intermediate forwarder and the last receiver can
authenticate by using public key of sender. One of the recent
developed technique under public-key cryptographic
schemes is elliptic curve cryptography (ECC). It is
considered to be more beneficial in terms of memory usage,
message complexity, and security resilience.. RSA [16] is a
public key cryptography based signature algorithm that
widely used for authentication purposes today. ECC [14]
also offers equivalent security as compared with RSA at
much smaller key sizes. The smaller keys shows savings in
memory, bandwidth and computational power usage since
constraints of WSNs. So now-a-days ECC become more
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 73
attractive for constrained wireless devices. Some other
broadcast authentication schemes based on PKC are also
existing which are proposed by Ren [16] and Liu[18]. Some
works are done for finding the techniques to reduce the
overhead of PKc based schemes. The main technique for
this is signature amortization proposed by Gennaro[17]
which is to sign efficiently digital streams.
This paper proposes a novel broadcast authentication
scheme based on PKC with signature amortization for
WSNs. This scheme uses only single signature by ECDSA
to authenticate a group of broadcast messages. So, the
overhead is amortized over that group of broadcast
messages. However, this system shows low overhead and
high security. Security of this system is strong as typical
broadcast authentication schemes by PKC. No time
synchronization is required for this scheme and also it can
achieve immediate authentication. Thus, shortcomings of
µTESLA can be overcome. But ECDSA shows signature
verification delay since its signature verification is much
slower than signature generation. To overcome this, we
propose a scheme with cooperative communication. For this,
the network forms clusters with cluster head, which have
high energy in that group. Each cluster head releases
intermediate results of computation to the neighbours of that
cluster.
2. PROPOSED BROADCAST
AUTHENTICATION SCHEME
The proposed scheme uses ECDSA for authentication,
which is based on Public Key Cryptographic technique. It
also uses a signature amortization technique for reducing the
overhead and allows the network to function efficiently.
This scheme exploit one signature to authenticate a group of
messages. The one and only signature is used to authenticate
the authenticator in first Extended Block (EBlock0 ). The
authenticator in EBlock0 is used to authenticate next
extended Block EBlock1 that has a group of b broadcast
messages and one authenticator. The authenticator in
EBlock1, is used to authenticate EBlock2 that has
authenticator and another group of b broadcast messages.
This process till EBlockk. From this brief, this is clear that
the all messages authenticated by single signature.
WSN applications require low power, less memory space
and bandwidth. ECC is best for this application because of
its speed and security. But ECDSA needs an addition point
and two multi scalar for verifying signature in WSNs, that
because decrease signature verification speed, in the result,
it has also incurred problems such as long verification delay
and high energy consumption. To reduce these problems,
here use cooperation among sensor nodes for accelerating
the verification of a single signature. In this, system allow
some sensor nodes that are selected by clustering to release
the intermediary multiplication results in signature
verification stage to their neighbours during the verification
process. The overall idea of proposed system shown in
Fig.1. The message authentication stage is performed by
three steps:
Step 1 generating extended blocks step
Step 2 broadcasting extended blocks step
Step 3 verifying extended blocks step.
Fig-.1. Overall System
2.1 Extended Block generation
All broadcast messages in M is divided into p blocks
Block1,...,Blockp. Every block Blockk, 1 ≤ k ≤ p, contains b
messages. These blocks together form a vector B =
[Blockp]Ti=1,...,p that shown in equation (1), here n = pb.
(1)
The p messages in each row of B are concatenated into a
long string. Here considering Blockk, so concatenation is
denoted by CON(Blockk).
CON(Blockk) = m(k-1)b+1||...||mkb, 1 ≤ k ≤ p (2)
Then, CON(Blockk) is padded with authenticators in each
block indicated as PAD(CON(Bk)) which shown in
equations (3) where dk+1 is authenticator. Block Blockk and
digest dk+1 comprise an extended block EBlockk.
PAD(CON(Blockk)) =CON(Blockk)||dk+1, 1≤k≤p (3)
Algorithm
1. Splitting-up broadcast messages into p blocks Block1…
Blockp
2. Initialize dk+1 and k=1…p
3. Perform the following steps
3.1 Concatenate messages in Blockk to generate
CON(Blockk)
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 74
3.2 Pad CON (Blockk) with digest dk+1 to generate Pad
(CON (Blockk) )
3.3 Compute the digest of result in step 3.2 using a collision
resistant hash function H
3.4 Let EBlockk = [ Blockk dk+1]
3.5 Decrement k
4. Repeat step 3 till i greater than or equal to 1
5. Sign the digest with senders private key PRs to generate
EBlock0=d1║ E(PRs,d1)
6. Let EBlock= [EBlocki] i=0..p
2.2 Extended Block Broadcasting
EBlockk’s authentication is based on EBlockk−1. Thus,
EBlockk−1 should reach before EBlockk and so on. So this is
by the sequential broadcast with reliability. A receiving
node that receives a message mj, then it first confirms that
mj is in current extended block EBlockk. Then secondly it
also confirms that the previous extended block EBlockk−1
has received and authenticated. If EBlockk-1 has not
authenticated yet, then wait for short period for completion
of its authentication. After completing authentication of
block EBlockk, the message mj will broadcast. The receiver
node accepts message mj and broadcasts an
acknowledgement that indicates all missed messages in that
block. Hence the overhead for acknowledgement of each
message is reduced. That is, here one acknowledgement is
used to specify the missed messages in one extended block.
But it may leads to large acknowledgement size.
2.3 Accelerated Verification of Extended Block
The signature verification process is accelerated by releasing
few intermediate computation results in the WSN by the
sensor nodes. This WSN authentication scheme performs
better compared to other authentication schemes. Nodes that
communicate through cooperative communication transmit
data packets with each other. In WSNs, sensor node are
distributed spatially and the nature of communication is
generally broadcast through wireless medium. Hence,
cooperative communications in WSNs can enhance the
performance, especially network reliability.
2.3.1 Clustering
For implementing co-operative communication, it is needed
to arrange the nodes into clusters. Each cluster has a cluster
head, which has high energy in that cluster. Clustering
means grouping the sensor nodes into clusters. The cluster
formation is done by two steps where the the first step is
group the nodes geographically and second step is Cluster-
Head selection form the cluster-Member nodes. The Cluster-
Head which is the higher level in clusters periodically
transmit here it is intermediate results to the members of the
cluster. Thus, the signature verification becomes easier and
faster for each node. All the time, the Cluster-Head nodes
send data to member nodes. Thus it always spend large
amount of energy than member nodes. In some cases, the
energy of Cluster Head is completely used. So it cannot be
act as Head for long. As a solution for this energy starvation
of some nodes, it is need to periodically re-elect a node
which has highest energy in that cluster as new Cluster-
Head. The fig 3 shows the flow diagram of CH selection.
Fig- 2 Cluster model
Fig -3 Flow diagram of CH selection
2.3.2 Accelerated Verification
In WSNs, the broadcast authentication schemes based on
PKC techniques provides strong security and immediate
message authentication than the same based on symmetric-
key approaches. But the schemes used public-key
Cryptographic techniques, verification of signature is much
slower than the schemes that based on symmetric-key
cryptographic techniques. Due to this, when large number of
message are there for authenticated broadcast, a number of
messages might wait for signature verifications.
By using the cooperation among sensor nodes, this issue of
slower signature verification of ECDSA can be reduced.
This is by randomly release the intermediary computation
results (iR) of signature verification to their neighbours.
Cluster-Head releases the results in this system. Then many
sensor nodes which are the cluster-Members use the
received intermediary results to verify signature.
Generally every sensor nodes independently perform the
same verification procedure during the broadcast
authentication. Every node needs to calculate two scalar
multiplications denoted iR1 and iR2. It leads to high energy
consumption. Thus, some sensor nodes that have high
energy which selected as Cluster-Heads allow to release
some intermediary results to their neighbous. So the member
nodes in a cluster does not need to calculate the two scalar
multiplications. Only one value is calculatedindependently
and other got from Cluster Head. Hence the overall
signature verification time can be reduced noticeably. And
also, the overall energy consumption of network will be
decreased drastically. This is shown in Figure 4.
When a Cluster-Head releases its intermediary
multiplication results (iR), all its neighbouring nodes which
are Cluster-Members accelerate the signature verification by
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 75
just computing one elliptic curve point addition and one
scalar multiplication. When the sensor nodes utilize two
scalar multiplications as intermediary computation values
for verification, there is a chance for receiving fake from an
attacker. To prevent this attack, the sensor nodes are
permitted to use at most only one intermediate value (iR1 or
iR2) from the neighbouring nodes.
Fig-4 Enhanced scheme for ECDSA signature Verification
3. PERFORMANCE ANALYSIS
Accelerated Authentication scheme for WSN is
implemented using JiST simulator (Java in Simulation
Time). This JiST simulator is high performance discrete
event simulation engine which runs on Java Virtual
Machine. Its capabilities are similar to NS2 and Glomosin,
but JiST is able to simulate much larger network. During
experiments, performance metrics such as Throughput,
Signature Verification delay, Routing Overhead,
Communication and Computation Overhead and Energy
Consumption are considered.
Total consumed energy: Overall energy consumed in the
network by all nodes.
Te=Σ Ce, where Te is total consumed energy, Ce is overall
energy by all nodes
End-to End delay: Time taken to transfer a packet from
source to destination node.
End-to-end delay = (Σ recv pkt – sent pkt / Σ recv pkt)*100,
where recv pkt is no. Of received packets, sent pkt is no. Of
sent packets
Overhead: Overall consumption for completing a process.
It calculated as a ratio of the correct packets to the total
received packet.
Overhead = Σ RTR pkt / Σ recv pkt
Table 1 shows the parameter used to simulate the proposed
system. The Results of the simulation are shown in the
Table 2 and Table 3, which shows the Energy Consumption,
Average Verification Delay, Communication Overhead and
Computation Overhead with the different no. Of nodes by
setting up the no of clusters as 4 and different number of
clusters or cluster heads for a sensor network 100 sensor
nodes respectively.
Table-1 Simulation Parameters
Sl.
No.
Parameter Value
1 Number of nodes 150 (varied)
2 Simulation Area 1000m ×1000m
3 Traffic Type CBR
4 MAC Type 802.11 MAC
Layer
5 Packet Size 512 bytes
6 Node Initial Energy 100J
7 Transmission Power 0.007
8 Reception Power 0.007
Table-2 Simulation Results (here, no of clusters=4)
No of
Node
s
Energy
Consumpt
ion (J)
Communi
cation
Overhead
Comput
ation
Overhea
d
Avg
Verificati
on Delay
20 11 230 338 15
30 11 250 354 18
40 13 300 374 20
60 14 348 413 27
80 16 412 445 34
100 17 468 489 42
130 21 490 538 42
Table-3 Simulation Results (here, no of nodes = 100)
No of
Cluste
rs
Energy
Consumpt
ion (J)
Communica
tion
Overhead
Computa
tion
Overhea
d
Avg
Verifica
tion
Delay
2 23 380 514 53
3 25 412 503 48
4 17 468 489 42
5 19 547 498 37
6 22 554 493 33
7 21 587 482 35
8 20 598 479 38
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 76
In this work, the performance analysis is carried out in a
sensor network that simulated using JiST by varying
parameters i.e. number of nodes, while keeping other
parameters constant and also with different number of
clusters. Four PKC based authentication schemes, i.e. RSA,
ECDSA, ECDSA with Signature Amortization and
Accelerated ECDSA Authentication with Signature
Amortization are considered in the comparison. Figure 5, 6,
7 and 8 shows the simulation graphs for different number of
nodes verses Energy Consumption, Communication
Overhead and Computation Overhead, Average Verification
Delay respectively.
0
10
20
30
40
50
60
70
80
90
Energyconsuption(J)
Number of Nodes
Energy Consumption (J)
RSA
ECDS
A
ECDS
A with
SA
ECDS
A with
SA and
CC
Fig-5 Comparison on the basis of Energy Consumption
0
100
200
300
400
500
600
700
CommunicationOverhead
Number of Nodes
Communication Overhead
RSA
ECDSA
ECDSA
with SA
ECDSA
with SA
and CC
Fig-6 Comparison on the basis of Communication Overhead
0
100
200
300
400
500
600
700
ComputationOverhead
Number of Nodes
Computation Overhead
RSA
ECDSA
ECDSA
with SA
ECDSA
with SA
and CC
Fig-7 Comparison on the basis of ComputationOverhead
Fig-8 Comparison on the basis of Avg Verification Delay
4. CONCLUSION
PKC-based broadcast authentication schemes specially
signature-based schemes for WSNs have more attention in
recent years since it shows strong security and immediate
message authentication. As compared with others,
verification of public-key cryptographic signatures
consumes higher amount of energy and this process is also
slow. The proposed scheme is an efficient broadcast
authentication, which accelerating the verification process of
PKC based signatures in WSNs by exploiting the
cooperative communication between sensor nodes. It
reduces overall energy consumption. From the simulation
Results, the overhead of this system is less than the typical
signature-based schemes. Besides this, the proposed system
uses less energy than others. By accelerating the verification
of signature, this scheme reduces the signature verification
delay also.
REFERENCES
[1]. Akyildiz , W. Su, Y. Sankarasubramaniam, and E.
Cayirci, “A survey on sensor networks,” IEEE Commun.
Mag., vol. 40, no. 8, pp. 102–114, 2002.
[2]. S Patil, Dr Vijaya Kumar, S. Sinha snd R. jamil “A
Survey on Authentication Techniques for WSN” IJAER
Vol. 7,no.11,2012
[3]. Z Li and Guang Gong “A Survey on Security in
Wireless Sensor Networks”
[4]. T Kavitha and D Sridharam “Security Vulnerabilities in
Wireless Sensor Networks: A Survey” JIAS, 031-044, 2010
[5]. Y.Wang, G.Attebury and B. Ramamurthy “A Survey of
Security Issues in Wireless Sensor Networks” , IEEE ,Vol.8,
No.2, 2006
[6]. M Luk, A Perrig and B Whillock “Seven cardinal
properties of sensor network broadcast authentication”
ACM , pp. 147-156, 2006
[7]. G. Sharma,S. Bala and Anil K V “ Security Framework
for Wireless Sensor Networks-Review” ScienceDirect, 978-
987, 2012
[8]. A. Perrig, R. Canetti, J. Tygar, and D. Song, “Efficient
authentication and signing of multicast streams over lossy
channels,” in Proc. 2000 IEEE Symposium on Security and
Privacy, pp. 56–73.
[9]. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E.
Culler, “SPINS:security protocols for sensor networks,”
Wireless Networks, vol. 8, no.5,pp. 521–534, 2002.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 77
[10]. D. Liu and P. Ning, “Multilevel μTESLA: broadcast
authentication for distributed sensor networks,” ACM Trans.
Embeded Computing Syst.,vol. 3, no. 4, pp. 800–836, 2004.
[11]. P. Ning, A. Liu, and W. Du, “Mitigating DoS attacks
against broadcast authentication in wireless sensor
networks,” ACM Trans. Sensor Networking, vol. 4, no. 1,
pp. 1–35, 2008.
[12]. T. Kwon and J. Hong, “Secure and efficient broadcast
authentication in wireless sensor networks,” IEEE Trans.
Computers, vol. 59, no. 8, pp. 1120–1133, 2010.
[13]. F. Amin, A.H.Jahangir and H.Rasifard “ Analysis of
Public Key Crptography for Wireless Sensor Networks
Security” World Academy of Science, 2008
[14]. Asha Rani and M Sinha “Elliptic Curve
Cryptography(ECC) for security in Wireless Sensor
Networks” , IJERT
[15]. G S Quirino, ARL, Ribeiro and E D Moreno “
Asymmetric Encryption in Wireless Sensor Networks”
INTECH , 2012
[16]. K. Ren, W. Lou, K. Zeng, and P. Moran, “On
broadcast authentication in wireless sensor networks,” IEEE
Trans. Wireless Commun., vol. 6, no. 11, pp. 4136–4144,
2007.
[17]. J. M. Park, E. Chong, and H. Siegel, “Efficient
multicast packet authentication using signature
amortization,” in Proc. 2002 IEEE Symposium on Security
and Privacy, pp. 227–240.
[18]. An Liu and Peng Ning “TinyECC: A Configurable
Library for Elliptic Curve Cryptography in Wireless Sensor
Networks” IEEE, 2008
[19]. Y Liu , J Li and M Guizani “PKC Based Broadcast
Authentication using Signature Amortization for WSNs”
IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, VOL. 11, NO. 6, JUNE 2012