Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks

IJERA Editor
IJERA EditorInternational Journal of Engineering Research and Applications (IJERA) em www.ijera.com

A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.

M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 26 | P a g e
Data Security and Data Dissemination of Distributed Data in
Wireless Sensor Networks
M. Kowsigan1
, M.Rubasri2
, R.Sujithra2
, H.Sumaiya Banu2
1
Assistant professor, Department of Information Technology, Sri Krishna College of Technology, Coimbatore,
India
2
Department of Information Technology, Sri Krishna College of Technology, Coimbatore, India
ABSTRACT
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields
and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two
consequences. First, they are works on sink based model; only the sink can circulate data item to other motes.
Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with
any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It
allows the network mentors to authorize multiple network uses with various permissions to simultaneously and
directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted
resources mote to depict its large capability in practice.
Index Terms: data security, seDrip, capability.
I. INTRODUCTION
Wireless sensor network is necessary to
change small codes or fields stored in the wireless
mote. These could be gained by the data
dissemination protocol, which facilities a sender to
insert small codes, commands and configuration fields
to mote. It varies from the code dissemination
protocol which circulates large binals to the entire
network of sensor nodes. Example, effectively
disseminating a binal files of kilobytes requires a code
disseminating protocol. When disseminating various
two-byte configuration field needs data dissemination
protocol.
Considering mote would be circulated in an
environment, remotely transporting such small
amount of data to the mote through the wireless
communication is mostly accepted and visual
approach than manual implementation. functional
requirement of such protocol, and said there design
objective. Also we found the authenticationissues in
existing data dissemination protocol.
II. A BRIEF LITERATURE REVIEW
There has been a large body of research on
WSNs in the literature. In the following, we outline
the research issues that have been actively pursued by
the researchers.
Pairing-based secure timing synchronization
for heterogeneous sensor networks: These papers
consider HSNs as a model for our proposed novel
time synchronization protocol based on pairing and
IBC. This is the first approach for synchronization
protocol using pairing based cryptography in HSNs.
The proposed scheme reduces the key space of mote
as well as it prevents from all security attacks.
TinyECC: A configurable library for ECC in
wireless sensor networks. This paper presents the
design and implementation of TinyECC, a
configurable library for ECC operations in WSNs.
The objective of TinyECC is to provide a ready-to-
use, publicly available software packages for ECC
based operations that can be flexibly configured and
integrated into sensor network applications. The
evaluation results show the impact of individual
optimizations on the execution time and resource
consumption and give the most computationally
efficient and the most storage efficient configuration
of TinyECC.
Monitoring heritage buildings with WSNs:
The Torre Aquila deployment:It shows that our
system is an effective tool for assessing the tower's
stability, as it delivers data reliably (with loss ratios
less than 0.01%) and has an estimated lifetime.
DiCode: DoS resistant and distributed code
dissemination in WSNs.This paper develops a secure
and distributed code dissemination protocol named
DiCode. A salient feature of DiCode is its ability to
resist denial of service attack which have severe
consequence on network availability. Performance
analysis wireless OCDMA systems had been done in
[12]. Further, the security properties of our protocol
are demonstrated by theoretical analysis.
Secure data discovery based on hash tree for
wireless sensor networks:This paper identifies the
security problems in data discovery and dissemination
when used in wireless sensor networks. An efficient
job scheduling was implemented and it performs
useful task regarding to the wireless sensor networks
[10][11]. Such problems allow an adversary to update
a network with undesirable values and erase critical
RESEARCH ARTICLE OPEN ACCESS
M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 27 | P a g e
variables or launch denial of service (DoS) attacks. To
address these attacks this paper presents the design,
implementation and evaluation of secure, lightweight
and DoS resistant data dissemination protocol named
diDrip for WSNs.
III. PROPOSED SYSTEM
To protect wireless sensor networks from
security issue, we introduce an improved filtering
technique. Those techniques make them not only
collision robust but also more accurate and faster
converging. In our proposed work we increase data
level security by introducing asymmetric key
encryption. Using RSA algorithm we provide security
in data. The suggested protocol is efficient in a multi-
scale WSN.Distributed seDrip, which permits the
network mentors and authenticated users to distribute
data items into WSNs without depending on the sink.
Our dedicated analysis states that SeDrip will satisfy
the authentication needs of the protocols of this kind.
In particular, we applied some of the algorithms to
provide the authenticity and integrity of the
disseminated data items in SeDrip.
IV. WIRELESS SENSOR NETWORK
A wireless sensor network contains a
circulated independent mote to analyze physical
conditions such as environment, noise, pressure to co-
operatively send their informationpasses by the
network to a particular location. The present networks
are bi-directional and also controls the sensor activity.
The development of WSN were developed in
inspirationwith applications used in military increased
fields [7]. Now-a-days WSNs are employed in several
industries and commercial applications.
A.Routing In Wireless Sensor Network
In connect with many recent technological
advancements, the evolution of a very small and low
cost sensors became possible. The sensing electronics
measures the medium conditions in relation with the
environment surrounding the mote and converts them
into an electric signal. Processing such signals shows
few properties about information located and things
happening around of the mote. Genetic algorithm was
used as one of the tool for routing the jobs in cloud
[14].These motes have the capability to transmit
among each other or to an external sink. A great
number of sensor motes allows for sensing over a
large area with a greater exactness.
Few years back, an exhaustive research that
labels the potentiality in association with sensors in
data gathering, data handling activities were
conducted. Motes are confined in the energy
distribution and in the bandwidth. Thus, innovative
techniques removes energy incompetent that could
shorten the life of the network are largely required.
Such confined combining with an assessing of huge
number of mote pose various issues to the develop
and manage the wireless sensor networks at all layers
of the networking protocol stacks.
Routing in wireless sensor networks is
demanding the inherent characteristics that distinguish
the networks from external wireless networks such as
mobile ad hoc networks or cellular networks. Due to
the many of the motes, building a global level
addressing scheme is not possible for the evolvation
of nodes in sensor network as the overhead of ID
maintenance is high.
Fig 1: Wireless Sensor Network
B.Multi-Path Routing Protocols
We examine the routing protocols which
uses multiple paths rather than a unidirectional way in
account to enhance the network’s performance. The
fault tolerance of a protocol is evaluated by the
probability of a different path existing between a
sender and a receipt when a primary path fails. These
alternative paths are kept active by passing repeated
information. Hence, the network authenticity can be
enhanced at the cost of enlarging overhead of
retaining the alternative paths. Handling spread is a
good for powerful multi-path routing. Ground of the
handling spread function, a multi-path routing
protocol that finds a various slightly separated paths.
It found that the application of multi-path routing
protocol provides viable alternate for energy efficient
recovery from failures in a wireless sensor networks.
The motivation of using these to retain the expense of
supervising each and every other paths low.
V.INTRODUCTION TO NETWORK
NS2 is a simulation tool aiming at both the
local and the satellite networking research. Network
Simulator is a very promising tool which is being
used by scholars and universities. We provided
information in steps to setup NS2 on UNIX. Then we
have scrutinized how to implement NS2 to simulate
limited and wide area networks. We discussed both
the methods. Multimodal Personal Authentication
with Fingerprint, Speech and Teeth Traits using SVM
Classifier [13]. Finally, the methods to animate uses
NAM and to analyze it uses X graph / GNU picture
the simulation results are presented.
M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 28 | P a g e
NS, a separate event simulator at the network
research is used in companies by scholars and
universities. Network Simulator provides background
needs for simulation of transmission control protocol,
multi-cast protocols, and routing over limited and
wide area networks. It deploys network protocols such
as file transfer protocol and Telecommunication
network, routing algorithms such as DV and SPF.
A simple way NS2 could be applied to study
the characteristic of a well-known protocol. A script
language OTcl is employed to glue the network
components such as nodes, links, agents, applications,
etc which are provided by NS2, configure the
parameters such as band-width, delay, routing
protocol, etc and launch activities (data transfer,
topology change, etc). NS2 will read the
configurations; simulate the network event and record
event and statistics in to the trace files. After the
simulation, Nam method can demonstrate the events
in a visualized way.
VI. NETWORK FORMATION AND
COMMUNICATION IN WSN
In this module designing of complete WSN
will be done and the number of Mote, cluster node
and gateway node and then interrelate them to form
the network. Once, designing of Wireless Sensor
Networks is completed, and then the next step is to
have the communication between each node [9]. The
communication in the sense there will be transmission
of the data amongst different motes in the network.
The proposed module will emphasize on distribution
of data security and dissemination protocols and the
functional requirements of such protocols, it sets their
design objectives [15]. It identifies the security
problems in predefined data dissemination protocols.
The communication in the sense there will be
transmission of the data amongst different motes in
the network. The module is a RSA asymmetric key
algorithm.RSA is the leading in the known general
service asymmetric key algorithm. This had been
created by Rivest, Shamir & Adleman of MIT. It is
depend on exponentiation in a known range over
integers modulo a prime, using huge integers leads up
to 1024 bits. Its security is due to the amount of
factorizing huge numbers. In RSA algorithm, to
encode a plain text P the sender should obtains
asymmetric key of receiver PU={s, r} and by using
that computes cipher text T = Ps
mod r, where 0≤P<r
to encode the plain text. To find decoding key k
applied the following equation s.k=1 mod ø(r) and
0≤k≤r.After those steps publish their asymmetric
encoding key, PU={s, r} and keep secret private
decoding key, PR= {k, r} in source and destination
side.For this algorithm to be satisfactory for
asymmetric key encoding, it must be possible to find
values of k, s, r such that Ps
k mod r = P for all P < r.
We need to find a relation of the form Pkd mod r = P.
The preceding relation stands if s and k are inverse
multiplication mod ø (r), where ø (r) is a totient
function. This is the straight reaction of Euler’s
function, so that taking a number to power s then k or
vica versa produces the original number.
VII. SECURITY ANALYSIS
In the following, we will analyze the security
of seDrip to verify that the security requirements. To
pass the verification of mote, each user has to submit
the secrete key and the dissemination permissions to
the network provider for registration. Authorized
users are capable to process data dissemination in a
circulated manner with a Support of various user
permissions [6]. Activities of users in a network can
be restricted by setting user permission Prij, which is
included in the user certificate. Since each user
certificate is created based on Prij, it will not pass the
verification at mote if Prij is modified. Thus, only the
network mentors can modify Prij and then updates the
certificate accordingly to provide authenticity and
integrity of the data items. With the RSA Algorithm,
an authorized user signs the data into SHA(Secure
Hash Algorithm) with their secrete key [3]. Using the
network provider’s asymmetric key, each mote can
validate the user certificate and obtains the user’s
asymmetric key. Then, using the user’s asymmetric
key, each mote can validate the data packet received
and other data packets regarding Secure Hash
Algorithm. With the assumption that the network
provider cannot be compromised, it is guaranteed that
all forged or modified data items can be very simply
founded by the authentication process. User
accountability, Users identities and the data
dissemination activities are exposed to wireless sensor
nodes. Thus, the mote can report such records to the
network provider periodically. Since each user
certificate is created regarding to the user id, except
the network provider, no one can modify the user
identity specified in the user certificate which will
pass the authentication. Therefore, the users should
not repudiate their activities, Node compromise and
user collision tolerance. As described above, for basic
the protocol, only the asymmetric arguments are
preloaded in each and every node. Also for the
enhanced protocol, the dissemination-privilege set of
a network user is loaded into the mote. Therefore, not
important how many number of mote are being used,
the adversary just obtains the asymmetric arguments
and the dissemination- privileged set of a user. The
intruder does not make any issue by compromising
mote. A few users conspire; a benign node will not
permit any dissemination privilege that is beyond
those of conspiring users. This property Resistance to
DoS(Denial-of-Service) attacks. There are Denial-of-
Service attacks takes upon basic Data dissemination
protocol by exploiting the authentication delays,
signature verifications and the Trickle algorithm [1].
M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 29 | P a g e
First, by applying Secure Hash Algorithm, each mote
can efficiently validate a data packet by a few hash
operations. Second, using the 160 bit message digest
we can securely transfer data in a efficient manner[8].
Therefore, all the above DoS attacks are defended.
SeDrip can successfully defeat all three types of
Denial of services attacks with a presents of a
compromised network users and mote. Without
knowing the secret key and the asymmetric keys of
the network users, even an inside attacker cannot
forge any data packets with ensure of freshness[4].
Thus we will consider how to implement data
confidentiality in the model of secure seDrip and RSA
algorithm. This system will maintain the data integrity
also to ensure the performance of the system[5]. Here
we can conclude that the proposed system will
provide the high security. Then by applying energy
efficient SHA algorithm we will encode and decode
the plain text for the security purpose. We applied
SHA and RSA algorithm to represent a security
process for wireless sensor networks which is simple
to implement as well as impossible to break. In this
research we are simply going to provide secure
communication, but we will also reduce the energy
inefficiencies by providing gateway nodes, which will
make the system much more protected and reliable.
This will provide us a high security to the wireless
sensor network by detecting and sending secrete data
to the recipient only from a source by applying
authentication on data[2].
VIII. SYSTEM REQUIREMENTS
To be utilized productively, all PC
programming needs certain apparatus segments or any
programming assets to be available on a PC. These
are known as PC framework essentials and are
simultaneously applied as a procedure instead of a flat
out standard. Many programming uses least and
prescribed arrangements for framework precondition,.
With enlarging interest for higher handling force and
belonging in more up to date variants of
programming, framework precondition tend to
increment after some time. Industry examiners
recommend that this pattern have affected largely in
propulsive moves up to existing PC frameworks than
inventive progressions.
A.Software Requirements
 Operating system : Linux ( Ubuntu )
 Software : Network Simulator 2.35
 Coding : TCL, AWK, C++
B.Hardware Requirements
 Main processor : Dual Core
 Hard disk capacity : 60GB
 RAM memory : 4 GB
IX. IMPLIMENTATION DETAILS
seDrip mainly includes five steps to
disseminate the data between the motes among the
wireless sensor network. Figure2 depicts the structure
of secure SeDrip, which shows the dissemination of
data from source to destination through the authorized
users only. where it contains the following
mechanisms:
 Network mentors
 Authorized users
 Mote
Advantages
 Applicable for multi-owner with multi-user WSNs.
 Identified the security issues in data dissemination
protocol when used in WSNs.
Fig 2: Structure of secure seDrip
SeDrip consists of four phases, data model,
user entering, and packet validation and packet
verification. seDrip protocol, in data modeling part,
the network mentors gets their asymmetric and
symmetric keys, and then place the public arguments
on each mote before the network deployment. In user
enter part, a user gets the disseminated data authorize
through registering to the network mentors. In packet
validation part, a user registered and wants to
dissemination some data, they required to create the
data dissemination packets and then send them to the
mote. In packet verification part, a mote verifies every
accepted packet. If the result is positive, it updates the
data related to the accepted packet. After a wireless
sensor network (WSN) is utilized, there is normally
required to update old small programs or parameters
stored in the mote. This could be carry out by seDrip,
which request a source to insert small codes,
commands, controls, and configuration fields to mote.
For modifying configuration arguments distributing
management commands, data dissemination protocol
is important.
M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 30 | P a g e
A.Simulation Design Model
Fig 3: Network model
Fig 4: Secure data dissemination
X.CONCLUSION AND FUTURE WORK
This paper proposed the data dissemination
protocol for distributed data in wireless sensor
networks. This addresses the drawbacks associated
with sink based approach of data dissemination. Also
the security problems which were the main faults to
be concerned in earlier approaches are addressed here.
This paper provides data authentication by a secure
hash function.Data integrity is provided using RSA
asymmetric algorithm which is a strong encryption
technique. As a future enhancement, additional
security measures like data confidentiality can be
added and efforts are taken to reduce the memory and
energy overheads.
REFERENCES
[1]. He D, Chen C, Chan S, Bu J. DiCode: DoS-
Resistant and Distributed Code
Dissemination in Wireless Sensor Networks.
Wireless Communications, IEEE
Transactions on 2012; 11(5): 1946-1956.
[2]. Perrig A, Canetti R, Tygar JD, Song, D.
Efficient authentication and signing of
multicast streams over lossy channels.
Security and Privacy, 2000.S&P
2000.Proceedings. 2000 IEEE Symposium
on 2000;.56-73.
[3]. Levi A, Savas E. Performance evaluation of
public-key cryptosystem operations in
WTLS protocol. Computers and
Communication.(ISCC 2003).Proceedings.
Eighth IEEE International Symposium on
2003; 2: 1245-1250.
[4]. Sun Z, Ma Y. Copyright protection of
multimedia content using homomorphic
public key cryptosystems. Communications
and Networking in China. ChinaCOM 2009.
Fourth International Conference on 2009; 1-
4.
[5]. Rahman M, El-Khatib K. Secure Time
Synchronization for Wireless Sensor
Networks Based on Bilinear Pairing
Functions. Parallel and Distributed Systems,
IEEE Transactions on 2010; 99: 1.
[6]. He D, Chan S, Tang S, Guizani M. Secure
Data Discovery and Dissemination based on
Hash Tree for Wireless Sensor Networks.
Wireless Communications, IEEE
Transactions on 2013; 12(9): 4638-4646.
[7]. Ceriotti M, Mottola L, Picco GP, Murphy
AL, Guna S, Corra M, Pozzi M, Zonta D,
Zanon P. Monitoring heritage buildings with
wireless sensor networks: The Torre Aquila
deployment. Information Processing in
Sensor Networks. International Conference
on 2009; 277- 288.
[8]. He D, Chen C, Chan S, Bu J. DiCode: DoS-
Resistant and Distributed Code
Dissemination in Wireless Sensor Networks.
Wireless Communications, IEEE
Transactions on 2012; 11(5): 1946-1956.
[9]. Tolle G, Culler D. Design of an application-
cooperative management system for wireless
sensor networks, Wireless Sensor Networks
2005.
[10]. M. Kowsigan, P. Balasubramanie, An
Improved Job Scheduling in Cloud
Environment using Auto-Associative-
Memory Network, Asian Journal of Research
in Social Sciences and Humanities, Vol. 6,
No. 12, December 2016, pp. 390-410.
[11]. M. Kowsigan, P Balasubramanie,
Scheduling of Jobs in Cloud Environment
using Soft Computing Techniques,
International Journal of Applied Engineering
Research, ISSN 0973-4562 Vol. 10 No.38
(2015).
[12]. A. Jameer Baasha, R. Kanmani, Performance
Analysis of Wireless OCDMA Systems
Using PC OOC, EPC Codes, Asian Journal
of Information Technology, Vol 15, No.12,
pp.2087-20938.
[13]. A Jameer Basha, V Palanisamy, T
Purusothaman, Multimodal Personal
Authentication with Fingerprint, Speech and
M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31
www.ijera.com DOI: 10.9790/9622- 0703042631 31 | P a g e
Teeth Traits using SVM Classifier, European
Journal of Scientific Research, Vol.6, No. 3,
pp.463-473.
[14]. M. Kowsigan, S. Rajkumar, P. Seenivasan,
C. Vikramkumar, An Enhanced Job
Scheduling in Cloud Environment using
Improved Metaheuristic Approach,
International Journal of Engineering
Research & Technology, Vol.6. No. 2, 2017
[15]. Lavanya. G, Pandeeswari. S, Shanmugapriya.
R.K, Fuzzy Bases Interference Reduction in
Cognitive Networks, International
conference on advances in computing, Vol.
174, pp 1061- 1068, (2012).

Recomendados

Secure and Efficient DiDrip Protocol for Improving Performance of WSNs por
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
50 visualizações6 slides
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N... por
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
41 visualizações7 slides
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola por
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha YeolaIJET - International Journal of Engineering and Techniques
242 visualizações5 slides
Ijarcet vol-2-issue-3-901-903 por
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Editor IJARCET
158 visualizações3 slides
International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
455 visualizações5 slides
Correlation Associativity b/w Sensor Information Network Architecture & Softw... por
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
288 visualizações25 slides

Mais conteúdo relacionado

Mais procurados

02 1 nov17 28apr17 6333 17460-1-ed edit iqbal por
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
17 visualizações6 slides
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE... por
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
81 visualizações21 slides
Issues and Challenges in Distributed Sensor Networks- A Review por
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
287 visualizações9 slides
Study Of Coded Based Mechanism In WSN System por
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
31 visualizações6 slides
Jt2416841691 por
Jt2416841691Jt2416841691
Jt2416841691IJERA Editor
722 visualizações8 slides
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir... por
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
65 visualizações10 slides

Mais procurados(17)

02 1 nov17 28apr17 6333 17460-1-ed edit iqbal por IAESIJEECS
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS17 visualizações
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE... por ijwmn
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn81 visualizações
Issues and Challenges in Distributed Sensor Networks- A Review por IOSR Journals
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals287 visualizações
Study Of Coded Based Mechanism In WSN System por IJERA Editor
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor31 visualizações
Jt2416841691 por IJERA Editor
Jt2416841691Jt2416841691
Jt2416841691
IJERA Editor722 visualizações
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir... por IJCSIS Research Publications
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications65 visualizações
International Journal of Engineering Research and Development (IJERD) por IJERD Editor
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor598 visualizações
F33022028 por IJERA Editor
F33022028F33022028
F33022028
IJERA Editor371 visualizações
Source location privacy in wireless sensor networks using data mules. por Rahul Kumar
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar1K visualizações
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por IRJET Journal
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal39 visualizações
Secure data dissemination protocol in wireless sensor networks using xor netw... por eSAT Publishing House
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House878 visualizações
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me... por IJAAS Team
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
IJAAS Team12 visualizações
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN... por IJEEE
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE 336 visualizações
Bidirectional data centric routing protocol to improve the energy efficiency ... por prj_publication
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication113 visualizações
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ... por csandit
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit46 visualizações
Wireless Micro-Sensor Network Models por IOSR Journals
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals582 visualizações

Destaque

Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy... por
Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...
Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...IJERA Editor
46 visualizações8 slides
Seismic Study of Building with Roof Top Telecommunication Towers por
Seismic Study of Building with Roof Top Telecommunication TowersSeismic Study of Building with Roof Top Telecommunication Towers
Seismic Study of Building with Roof Top Telecommunication TowersIJERA Editor
25 visualizações4 slides
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical... por
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...IJERA Editor
34 visualizações8 slides
Enhancing the Efficiency of Solar Panel Using Cooling Systems por
Enhancing the Efficiency of Solar Panel Using Cooling SystemsEnhancing the Efficiency of Solar Panel Using Cooling Systems
Enhancing the Efficiency of Solar Panel Using Cooling SystemsIJERA Editor
73 visualizações3 slides
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou... por
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...IJERA Editor
29 visualizações12 slides
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen... por
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...IJERA Editor
35 visualizações5 slides

Destaque(17)

Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy... por IJERA Editor
Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...
Does a Hybrid Approach of Agile and Plan-Driven Methods Work Better for IT Sy...
IJERA Editor46 visualizações
Seismic Study of Building with Roof Top Telecommunication Towers por IJERA Editor
Seismic Study of Building with Roof Top Telecommunication TowersSeismic Study of Building with Roof Top Telecommunication Towers
Seismic Study of Building with Roof Top Telecommunication Towers
IJERA Editor25 visualizações
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical... por IJERA Editor
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...
Improved Thermal Performance of Solar Air Heater Using V-Rib with Symmetrical...
IJERA Editor34 visualizações
Enhancing the Efficiency of Solar Panel Using Cooling Systems por IJERA Editor
Enhancing the Efficiency of Solar Panel Using Cooling SystemsEnhancing the Efficiency of Solar Panel Using Cooling Systems
Enhancing the Efficiency of Solar Panel Using Cooling Systems
IJERA Editor73 visualizações
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou... por IJERA Editor
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...
MHD Mixed Convection Flow from a Vertical Plate Embedded in a Saturated Porou...
IJERA Editor29 visualizações
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen... por IJERA Editor
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...
A Comparative Study of Centroid-Based and Naïve Bayes Classifiers for Documen...
IJERA Editor35 visualizações
Microstructural Analysis of the Influence of Ecap on the Pure Nb Rolling Plane por IJERA Editor
Microstructural Analysis of the Influence of Ecap on the Pure Nb Rolling PlaneMicrostructural Analysis of the Influence of Ecap on the Pure Nb Rolling Plane
Microstructural Analysis of the Influence of Ecap on the Pure Nb Rolling Plane
IJERA Editor36 visualizações
Multi-Purpose Robot using Raspberry Pi & Controlled by Smartphone por IJERA Editor
Multi-Purpose Robot using Raspberry Pi & Controlled by SmartphoneMulti-Purpose Robot using Raspberry Pi & Controlled by Smartphone
Multi-Purpose Robot using Raspberry Pi & Controlled by Smartphone
IJERA Editor46 visualizações
A Study on Project Planning Using the Deterministic and Probabilistic Models ... por IJERA Editor
A Study on Project Planning Using the Deterministic and Probabilistic Models ...A Study on Project Planning Using the Deterministic and Probabilistic Models ...
A Study on Project Planning Using the Deterministic and Probabilistic Models ...
IJERA Editor37 visualizações
A Study on Atomic Spectroscopic Term Symbols for Nonequivalent Electrons of (... por IJERA Editor
A Study on Atomic Spectroscopic Term Symbols for Nonequivalent Electrons of (...A Study on Atomic Spectroscopic Term Symbols for Nonequivalent Electrons of (...
A Study on Atomic Spectroscopic Term Symbols for Nonequivalent Electrons of (...
IJERA Editor198 visualizações
The Effects of Marine Simulators on Training por IJERA Editor
The Effects of Marine Simulators on TrainingThe Effects of Marine Simulators on Training
The Effects of Marine Simulators on Training
IJERA Editor30 visualizações
Navigation Tools and Equipment and How They Have Improved Aviation Safety por IJERA Editor
Navigation Tools and Equipment and How They Have Improved Aviation SafetyNavigation Tools and Equipment and How They Have Improved Aviation Safety
Navigation Tools and Equipment and How They Have Improved Aviation Safety
IJERA Editor29 visualizações
Quantitative Review Techniques of Edge Detection Operators. por IJERA Editor
Quantitative Review Techniques of Edge Detection Operators.Quantitative Review Techniques of Edge Detection Operators.
Quantitative Review Techniques of Edge Detection Operators.
IJERA Editor29 visualizações
Snapping During Gas Welding por IJERA Editor
Snapping During Gas WeldingSnapping During Gas Welding
Snapping During Gas Welding
IJERA Editor34 visualizações
A Review on Marathi Language Speech Database Development for Automatic Speech... por IJERA Editor
A Review on Marathi Language Speech Database Development for Automatic Speech...A Review on Marathi Language Speech Database Development for Automatic Speech...
A Review on Marathi Language Speech Database Development for Automatic Speech...
IJERA Editor49 visualizações
Design of Secured Ground Vehicle Event Data Recorder for Data Analysis por IJERA Editor
Design of Secured Ground Vehicle Event Data Recorder for Data AnalysisDesign of Secured Ground Vehicle Event Data Recorder for Data Analysis
Design of Secured Ground Vehicle Event Data Recorder for Data Analysis
IJERA Editor46 visualizações
Performance Evaluation of Self-Excited Cage and Cageless Three Phase Synchron... por IJERA Editor
Performance Evaluation of Self-Excited Cage and Cageless Three Phase Synchron...Performance Evaluation of Self-Excited Cage and Cageless Three Phase Synchron...
Performance Evaluation of Self-Excited Cage and Cageless Three Phase Synchron...
IJERA Editor40 visualizações

Similar a Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks

Characterization of directed diffusion protocol in wireless sensor network por
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
243 visualizações18 slides
Energy Proficient and Security Protocol for WSN: A Review por
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
345 visualizações6 slides
J031101064069 por
J031101064069J031101064069
J031101064069theijes
257 visualizações6 slides
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ... por
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
241 visualizações6 slides
Mobile Wireless Network Essay por
Mobile Wireless Network EssayMobile Wireless Network Essay
Mobile Wireless Network EssaySusan Myers
2 visualizações47 slides
40120140503011 por
4012014050301140120140503011
40120140503011IAEME Publication
264 visualizações15 slides

Similar a Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks(20)

Characterization of directed diffusion protocol in wireless sensor network por ijwmn
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn243 visualizações
Energy Proficient and Security Protocol for WSN: A Review por theijes
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes345 visualizações
J031101064069 por theijes
J031101064069J031101064069
J031101064069
theijes257 visualizações
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ... por IJERA Editor
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor241 visualizações
Mobile Wireless Network Essay por Susan Myers
Mobile Wireless Network EssayMobile Wireless Network Essay
Mobile Wireless Network Essay
Susan Myers2 visualizações
40120140503011 por IAEME Publication
4012014050301140120140503011
40120140503011
IAEME Publication264 visualizações
paper presentation _ survey of wireless sensor netwrok por ejbyun77
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun776.9K visualizações
Paper On Wireless Sensor Networking por Gerri Dominguez
Paper On Wireless Sensor NetworkingPaper On Wireless Sensor Networking
Paper On Wireless Sensor Networking
Gerri Dominguez2 visualizações
Data Security via Public-Key Cryptography in Wireless Sensor Network por IJCI JOURNAL
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL18.3K visualizações
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ... por IRJET Journal
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal46 visualizações
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir... por IRJET Journal
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal47 visualizações
An efficient transport protocol for delivery of multimedia content in wireles... por Alexander Decker
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
Alexander Decker537 visualizações
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O... por IJEEE
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE 305 visualizações
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS por ijwmn
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn9 visualizações
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ... por cscpconf
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf45 visualizações
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be... por IJCNCJournal
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
IJCNCJournal377 visualizações
seminar report on wireless Sensor network por Jawhar Ali
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali3.4K visualizações
A Paired Key Mechanism for Wirelesslink Security for WSNS por IRJET Journal
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal23 visualizações
Reliable and Efficient Routing in WLAN por ijtsrd
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
ijtsrd12 visualizações
Design Issues and Applications of Wireless Sensor Network por ijtsrd
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd703 visualizações

Último

What is Unit Testing por
What is Unit TestingWhat is Unit Testing
What is Unit TestingSadaaki Emura
23 visualizações25 slides
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...ijseajournal
5 visualizações13 slides
NEW SUPPLIERS SUPPLIES (copie).pdf por
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdfgeorgesradjou
15 visualizações30 slides
MK__Cert.pdf por
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
10 visualizações1 slide
What is Whirling Hygrometer.pdf por
What is Whirling Hygrometer.pdfWhat is Whirling Hygrometer.pdf
What is Whirling Hygrometer.pdfIIT KHARAGPUR
11 visualizações3 slides
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
23 visualizações16 slides

Último(20)

What is Unit Testing por Sadaaki Emura
What is Unit TestingWhat is Unit Testing
What is Unit Testing
Sadaaki Emura23 visualizações
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por ijseajournal
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
ijseajournal5 visualizações
NEW SUPPLIERS SUPPLIES (copie).pdf por georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou15 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdf
Hassan Khan10 visualizações
What is Whirling Hygrometer.pdf por IIT KHARAGPUR
What is Whirling Hygrometer.pdfWhat is Whirling Hygrometer.pdf
What is Whirling Hygrometer.pdf
IIT KHARAGPUR 11 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome23 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 12 visualizações
Dynamics of Hard-Magnetic Soft Materials por Shivendra Nandan
Dynamics of Hard-Magnetic Soft MaterialsDynamics of Hard-Magnetic Soft Materials
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan15 visualizações
Object Oriented Programming with JAVA por Demian Antony D'Mello
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVA
Demian Antony D'Mello119 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla635 visualizações
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... por IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES13 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla64 visualizações
Digital Watermarking Of Audio Signals.pptx por AyushJaiswal781174
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal78117411 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez12 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty78714815 visualizações
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi7 visualizações
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... por AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1266 visualizações
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 visualizações
Investor Presentation por eser sevinç
Investor PresentationInvestor Presentation
Investor Presentation
eser sevinç24 visualizações

Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks

  • 1. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 26 | P a g e Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks M. Kowsigan1 , M.Rubasri2 , R.Sujithra2 , H.Sumaiya Banu2 1 Assistant professor, Department of Information Technology, Sri Krishna College of Technology, Coimbatore, India 2 Department of Information Technology, Sri Krishna College of Technology, Coimbatore, India ABSTRACT A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice. Index Terms: data security, seDrip, capability. I. INTRODUCTION Wireless sensor network is necessary to change small codes or fields stored in the wireless mote. These could be gained by the data dissemination protocol, which facilities a sender to insert small codes, commands and configuration fields to mote. It varies from the code dissemination protocol which circulates large binals to the entire network of sensor nodes. Example, effectively disseminating a binal files of kilobytes requires a code disseminating protocol. When disseminating various two-byte configuration field needs data dissemination protocol. Considering mote would be circulated in an environment, remotely transporting such small amount of data to the mote through the wireless communication is mostly accepted and visual approach than manual implementation. functional requirement of such protocol, and said there design objective. Also we found the authenticationissues in existing data dissemination protocol. II. A BRIEF LITERATURE REVIEW There has been a large body of research on WSNs in the literature. In the following, we outline the research issues that have been actively pursued by the researchers. Pairing-based secure timing synchronization for heterogeneous sensor networks: These papers consider HSNs as a model for our proposed novel time synchronization protocol based on pairing and IBC. This is the first approach for synchronization protocol using pairing based cryptography in HSNs. The proposed scheme reduces the key space of mote as well as it prevents from all security attacks. TinyECC: A configurable library for ECC in wireless sensor networks. This paper presents the design and implementation of TinyECC, a configurable library for ECC operations in WSNs. The objective of TinyECC is to provide a ready-to- use, publicly available software packages for ECC based operations that can be flexibly configured and integrated into sensor network applications. The evaluation results show the impact of individual optimizations on the execution time and resource consumption and give the most computationally efficient and the most storage efficient configuration of TinyECC. Monitoring heritage buildings with WSNs: The Torre Aquila deployment:It shows that our system is an effective tool for assessing the tower's stability, as it delivers data reliably (with loss ratios less than 0.01%) and has an estimated lifetime. DiCode: DoS resistant and distributed code dissemination in WSNs.This paper develops a secure and distributed code dissemination protocol named DiCode. A salient feature of DiCode is its ability to resist denial of service attack which have severe consequence on network availability. Performance analysis wireless OCDMA systems had been done in [12]. Further, the security properties of our protocol are demonstrated by theoretical analysis. Secure data discovery based on hash tree for wireless sensor networks:This paper identifies the security problems in data discovery and dissemination when used in wireless sensor networks. An efficient job scheduling was implemented and it performs useful task regarding to the wireless sensor networks [10][11]. Such problems allow an adversary to update a network with undesirable values and erase critical RESEARCH ARTICLE OPEN ACCESS
  • 2. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 27 | P a g e variables or launch denial of service (DoS) attacks. To address these attacks this paper presents the design, implementation and evaluation of secure, lightweight and DoS resistant data dissemination protocol named diDrip for WSNs. III. PROPOSED SYSTEM To protect wireless sensor networks from security issue, we introduce an improved filtering technique. Those techniques make them not only collision robust but also more accurate and faster converging. In our proposed work we increase data level security by introducing asymmetric key encryption. Using RSA algorithm we provide security in data. The suggested protocol is efficient in a multi- scale WSN.Distributed seDrip, which permits the network mentors and authenticated users to distribute data items into WSNs without depending on the sink. Our dedicated analysis states that SeDrip will satisfy the authentication needs of the protocols of this kind. In particular, we applied some of the algorithms to provide the authenticity and integrity of the disseminated data items in SeDrip. IV. WIRELESS SENSOR NETWORK A wireless sensor network contains a circulated independent mote to analyze physical conditions such as environment, noise, pressure to co- operatively send their informationpasses by the network to a particular location. The present networks are bi-directional and also controls the sensor activity. The development of WSN were developed in inspirationwith applications used in military increased fields [7]. Now-a-days WSNs are employed in several industries and commercial applications. A.Routing In Wireless Sensor Network In connect with many recent technological advancements, the evolution of a very small and low cost sensors became possible. The sensing electronics measures the medium conditions in relation with the environment surrounding the mote and converts them into an electric signal. Processing such signals shows few properties about information located and things happening around of the mote. Genetic algorithm was used as one of the tool for routing the jobs in cloud [14].These motes have the capability to transmit among each other or to an external sink. A great number of sensor motes allows for sensing over a large area with a greater exactness. Few years back, an exhaustive research that labels the potentiality in association with sensors in data gathering, data handling activities were conducted. Motes are confined in the energy distribution and in the bandwidth. Thus, innovative techniques removes energy incompetent that could shorten the life of the network are largely required. Such confined combining with an assessing of huge number of mote pose various issues to the develop and manage the wireless sensor networks at all layers of the networking protocol stacks. Routing in wireless sensor networks is demanding the inherent characteristics that distinguish the networks from external wireless networks such as mobile ad hoc networks or cellular networks. Due to the many of the motes, building a global level addressing scheme is not possible for the evolvation of nodes in sensor network as the overhead of ID maintenance is high. Fig 1: Wireless Sensor Network B.Multi-Path Routing Protocols We examine the routing protocols which uses multiple paths rather than a unidirectional way in account to enhance the network’s performance. The fault tolerance of a protocol is evaluated by the probability of a different path existing between a sender and a receipt when a primary path fails. These alternative paths are kept active by passing repeated information. Hence, the network authenticity can be enhanced at the cost of enlarging overhead of retaining the alternative paths. Handling spread is a good for powerful multi-path routing. Ground of the handling spread function, a multi-path routing protocol that finds a various slightly separated paths. It found that the application of multi-path routing protocol provides viable alternate for energy efficient recovery from failures in a wireless sensor networks. The motivation of using these to retain the expense of supervising each and every other paths low. V.INTRODUCTION TO NETWORK NS2 is a simulation tool aiming at both the local and the satellite networking research. Network Simulator is a very promising tool which is being used by scholars and universities. We provided information in steps to setup NS2 on UNIX. Then we have scrutinized how to implement NS2 to simulate limited and wide area networks. We discussed both the methods. Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier [13]. Finally, the methods to animate uses NAM and to analyze it uses X graph / GNU picture the simulation results are presented.
  • 3. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 28 | P a g e NS, a separate event simulator at the network research is used in companies by scholars and universities. Network Simulator provides background needs for simulation of transmission control protocol, multi-cast protocols, and routing over limited and wide area networks. It deploys network protocols such as file transfer protocol and Telecommunication network, routing algorithms such as DV and SPF. A simple way NS2 could be applied to study the characteristic of a well-known protocol. A script language OTcl is employed to glue the network components such as nodes, links, agents, applications, etc which are provided by NS2, configure the parameters such as band-width, delay, routing protocol, etc and launch activities (data transfer, topology change, etc). NS2 will read the configurations; simulate the network event and record event and statistics in to the trace files. After the simulation, Nam method can demonstrate the events in a visualized way. VI. NETWORK FORMATION AND COMMUNICATION IN WSN In this module designing of complete WSN will be done and the number of Mote, cluster node and gateway node and then interrelate them to form the network. Once, designing of Wireless Sensor Networks is completed, and then the next step is to have the communication between each node [9]. The communication in the sense there will be transmission of the data amongst different motes in the network. The proposed module will emphasize on distribution of data security and dissemination protocols and the functional requirements of such protocols, it sets their design objectives [15]. It identifies the security problems in predefined data dissemination protocols. The communication in the sense there will be transmission of the data amongst different motes in the network. The module is a RSA asymmetric key algorithm.RSA is the leading in the known general service asymmetric key algorithm. This had been created by Rivest, Shamir & Adleman of MIT. It is depend on exponentiation in a known range over integers modulo a prime, using huge integers leads up to 1024 bits. Its security is due to the amount of factorizing huge numbers. In RSA algorithm, to encode a plain text P the sender should obtains asymmetric key of receiver PU={s, r} and by using that computes cipher text T = Ps mod r, where 0≤P<r to encode the plain text. To find decoding key k applied the following equation s.k=1 mod ø(r) and 0≤k≤r.After those steps publish their asymmetric encoding key, PU={s, r} and keep secret private decoding key, PR= {k, r} in source and destination side.For this algorithm to be satisfactory for asymmetric key encoding, it must be possible to find values of k, s, r such that Ps k mod r = P for all P < r. We need to find a relation of the form Pkd mod r = P. The preceding relation stands if s and k are inverse multiplication mod ø (r), where ø (r) is a totient function. This is the straight reaction of Euler’s function, so that taking a number to power s then k or vica versa produces the original number. VII. SECURITY ANALYSIS In the following, we will analyze the security of seDrip to verify that the security requirements. To pass the verification of mote, each user has to submit the secrete key and the dissemination permissions to the network provider for registration. Authorized users are capable to process data dissemination in a circulated manner with a Support of various user permissions [6]. Activities of users in a network can be restricted by setting user permission Prij, which is included in the user certificate. Since each user certificate is created based on Prij, it will not pass the verification at mote if Prij is modified. Thus, only the network mentors can modify Prij and then updates the certificate accordingly to provide authenticity and integrity of the data items. With the RSA Algorithm, an authorized user signs the data into SHA(Secure Hash Algorithm) with their secrete key [3]. Using the network provider’s asymmetric key, each mote can validate the user certificate and obtains the user’s asymmetric key. Then, using the user’s asymmetric key, each mote can validate the data packet received and other data packets regarding Secure Hash Algorithm. With the assumption that the network provider cannot be compromised, it is guaranteed that all forged or modified data items can be very simply founded by the authentication process. User accountability, Users identities and the data dissemination activities are exposed to wireless sensor nodes. Thus, the mote can report such records to the network provider periodically. Since each user certificate is created regarding to the user id, except the network provider, no one can modify the user identity specified in the user certificate which will pass the authentication. Therefore, the users should not repudiate their activities, Node compromise and user collision tolerance. As described above, for basic the protocol, only the asymmetric arguments are preloaded in each and every node. Also for the enhanced protocol, the dissemination-privilege set of a network user is loaded into the mote. Therefore, not important how many number of mote are being used, the adversary just obtains the asymmetric arguments and the dissemination- privileged set of a user. The intruder does not make any issue by compromising mote. A few users conspire; a benign node will not permit any dissemination privilege that is beyond those of conspiring users. This property Resistance to DoS(Denial-of-Service) attacks. There are Denial-of- Service attacks takes upon basic Data dissemination protocol by exploiting the authentication delays, signature verifications and the Trickle algorithm [1].
  • 4. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 29 | P a g e First, by applying Secure Hash Algorithm, each mote can efficiently validate a data packet by a few hash operations. Second, using the 160 bit message digest we can securely transfer data in a efficient manner[8]. Therefore, all the above DoS attacks are defended. SeDrip can successfully defeat all three types of Denial of services attacks with a presents of a compromised network users and mote. Without knowing the secret key and the asymmetric keys of the network users, even an inside attacker cannot forge any data packets with ensure of freshness[4]. Thus we will consider how to implement data confidentiality in the model of secure seDrip and RSA algorithm. This system will maintain the data integrity also to ensure the performance of the system[5]. Here we can conclude that the proposed system will provide the high security. Then by applying energy efficient SHA algorithm we will encode and decode the plain text for the security purpose. We applied SHA and RSA algorithm to represent a security process for wireless sensor networks which is simple to implement as well as impossible to break. In this research we are simply going to provide secure communication, but we will also reduce the energy inefficiencies by providing gateway nodes, which will make the system much more protected and reliable. This will provide us a high security to the wireless sensor network by detecting and sending secrete data to the recipient only from a source by applying authentication on data[2]. VIII. SYSTEM REQUIREMENTS To be utilized productively, all PC programming needs certain apparatus segments or any programming assets to be available on a PC. These are known as PC framework essentials and are simultaneously applied as a procedure instead of a flat out standard. Many programming uses least and prescribed arrangements for framework precondition,. With enlarging interest for higher handling force and belonging in more up to date variants of programming, framework precondition tend to increment after some time. Industry examiners recommend that this pattern have affected largely in propulsive moves up to existing PC frameworks than inventive progressions. A.Software Requirements  Operating system : Linux ( Ubuntu )  Software : Network Simulator 2.35  Coding : TCL, AWK, C++ B.Hardware Requirements  Main processor : Dual Core  Hard disk capacity : 60GB  RAM memory : 4 GB IX. IMPLIMENTATION DETAILS seDrip mainly includes five steps to disseminate the data between the motes among the wireless sensor network. Figure2 depicts the structure of secure SeDrip, which shows the dissemination of data from source to destination through the authorized users only. where it contains the following mechanisms:  Network mentors  Authorized users  Mote Advantages  Applicable for multi-owner with multi-user WSNs.  Identified the security issues in data dissemination protocol when used in WSNs. Fig 2: Structure of secure seDrip SeDrip consists of four phases, data model, user entering, and packet validation and packet verification. seDrip protocol, in data modeling part, the network mentors gets their asymmetric and symmetric keys, and then place the public arguments on each mote before the network deployment. In user enter part, a user gets the disseminated data authorize through registering to the network mentors. In packet validation part, a user registered and wants to dissemination some data, they required to create the data dissemination packets and then send them to the mote. In packet verification part, a mote verifies every accepted packet. If the result is positive, it updates the data related to the accepted packet. After a wireless sensor network (WSN) is utilized, there is normally required to update old small programs or parameters stored in the mote. This could be carry out by seDrip, which request a source to insert small codes, commands, controls, and configuration fields to mote. For modifying configuration arguments distributing management commands, data dissemination protocol is important.
  • 5. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 30 | P a g e A.Simulation Design Model Fig 3: Network model Fig 4: Secure data dissemination X.CONCLUSION AND FUTURE WORK This paper proposed the data dissemination protocol for distributed data in wireless sensor networks. This addresses the drawbacks associated with sink based approach of data dissemination. Also the security problems which were the main faults to be concerned in earlier approaches are addressed here. This paper provides data authentication by a secure hash function.Data integrity is provided using RSA asymmetric algorithm which is a strong encryption technique. As a future enhancement, additional security measures like data confidentiality can be added and efforts are taken to reduce the memory and energy overheads. REFERENCES [1]. He D, Chen C, Chan S, Bu J. DiCode: DoS- Resistant and Distributed Code Dissemination in Wireless Sensor Networks. Wireless Communications, IEEE Transactions on 2012; 11(5): 1946-1956. [2]. Perrig A, Canetti R, Tygar JD, Song, D. Efficient authentication and signing of multicast streams over lossy channels. Security and Privacy, 2000.S&P 2000.Proceedings. 2000 IEEE Symposium on 2000;.56-73. [3]. Levi A, Savas E. Performance evaluation of public-key cryptosystem operations in WTLS protocol. Computers and Communication.(ISCC 2003).Proceedings. Eighth IEEE International Symposium on 2003; 2: 1245-1250. [4]. Sun Z, Ma Y. Copyright protection of multimedia content using homomorphic public key cryptosystems. Communications and Networking in China. ChinaCOM 2009. Fourth International Conference on 2009; 1- 4. [5]. Rahman M, El-Khatib K. Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions. Parallel and Distributed Systems, IEEE Transactions on 2010; 99: 1. [6]. He D, Chan S, Tang S, Guizani M. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. Wireless Communications, IEEE Transactions on 2013; 12(9): 4638-4646. [7]. Ceriotti M, Mottola L, Picco GP, Murphy AL, Guna S, Corra M, Pozzi M, Zonta D, Zanon P. Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment. Information Processing in Sensor Networks. International Conference on 2009; 277- 288. [8]. He D, Chen C, Chan S, Bu J. DiCode: DoS- Resistant and Distributed Code Dissemination in Wireless Sensor Networks. Wireless Communications, IEEE Transactions on 2012; 11(5): 1946-1956. [9]. Tolle G, Culler D. Design of an application- cooperative management system for wireless sensor networks, Wireless Sensor Networks 2005. [10]. M. Kowsigan, P. Balasubramanie, An Improved Job Scheduling in Cloud Environment using Auto-Associative- Memory Network, Asian Journal of Research in Social Sciences and Humanities, Vol. 6, No. 12, December 2016, pp. 390-410. [11]. M. Kowsigan, P Balasubramanie, Scheduling of Jobs in Cloud Environment using Soft Computing Techniques, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.38 (2015). [12]. A. Jameer Baasha, R. Kanmani, Performance Analysis of Wireless OCDMA Systems Using PC OOC, EPC Codes, Asian Journal of Information Technology, Vol 15, No.12, pp.2087-20938. [13]. A Jameer Basha, V Palanisamy, T Purusothaman, Multimodal Personal Authentication with Fingerprint, Speech and
  • 6. M. Kowsigan et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 3, ( Part -4) March 2017, pp.26-31 www.ijera.com DOI: 10.9790/9622- 0703042631 31 | P a g e Teeth Traits using SVM Classifier, European Journal of Scientific Research, Vol.6, No. 3, pp.463-473. [14]. M. Kowsigan, S. Rajkumar, P. Seenivasan, C. Vikramkumar, An Enhanced Job Scheduling in Cloud Environment using Improved Metaheuristic Approach, International Journal of Engineering Research & Technology, Vol.6. No. 2, 2017 [15]. Lavanya. G, Pandeeswari. S, Shanmugapriya. R.K, Fuzzy Bases Interference Reduction in Cognitive Networks, International conference on advances in computing, Vol. 174, pp 1061- 1068, (2012).