SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 90
Confidential DoS-Resistant Code Update Protocol in WSN
Deeksha S
(Student M.Tech, CSE, SIT, Tumkur
Email: s.deeksha45@gmail.com)
I. INTRODUCTION
Wireless sensor network (WSN) consist of
collections of small, low-power nodes called sensor
nodes. These sensor nodes are capable of
performing some processing, gathering sensed
information, communicating with other connected
nodes in the network. Wireless sensor networks are
used in various safety-critical applications such as
critical infrastructure protection and surveillance,
health monitoring, monitoring and control of
environmental parameters etc. Sensor nodes
cooperatively pass data among themselves through
in the network. After deployment of sensor nodes in
the network sometimes there is need to send code
update data or new program image to update
installed programs of stored parameters or to add
new functionality or to perform software
maintenance or to adjust configuration parameters
or to distribute management commands and queries
without having to physically reach each individual
node in the network. These code update data is of
the order of kilobytes while a parameter is just few
bytes long. Due to such vast differences in their
sizes, design of the dissemination protocols is
Different. The two types of dissemination protocols
are developed. Code dissemination protocols are
developed to efficiently distribute long code update
data into a network, enabling complete system
reprogramming. On the other hand, short code
updates data such as several two-byte configuration
parameters, within a WSN. Common uses of this
kind of protocols include injecting small programs,
commands, queries, and configuration parameters.
Sensor nodes are battery operated, so energy should
be efficiently utilized. Security vulnerabilities occur
in the network, which allow adversary to update
undesirable values, erase critical values or launch
DoS (Daniel of Service) attack in the network. Lack
of authentication may allow attacker to attack one
sensor node and misuse it to send false program
image into the network and take control over entire
network. And in some applications like in military,
environmental applications these code updates need
to be kept secret because adversaries may gain
access to these code update information and misuse
it. In many code update protocols Digital signatures
have been used, but power consumption is more, as
sensor nodes are battery operated energy should be
efficiently utilized. Digital signature is used for
Abstract:
Wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes. WSNs are
widely applicable in monitoring and control of environmental parameters such as temperatures, sound,
pressure, etc. Sensor nodes cooperatively pass data among themselves in the network. Sometimes it is
necessary to update data or program image through wireless links after they are deployed in order to adjust
configuration parameters of sensors or distribute management commands and queries to the sensor nodes. In
many applications these code updates need to be kept secret. Authentication and confidentiality play a very
important role in providing secure code updates. Sometimes an adversary may transmit forged data, forcing
nodes to waste their energy in identifying it as invalid. And also adversaries may sometimes repeatedly send
invalid program image requests to its neighbours making them exhaust their energy. To avoid such attacks
authentication of nodes need to be made and code updates need to be kept confidential.
Keywords— Wireless sensor networks, secure code updates, confidentiality, authentication, denial of
service.
RESEARCH ARTICLE OPEN ACCESS
International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 91
authentication in code dissemination protocols, an
adversary can repeatedly broadcast false data
packet with an invalid signature to sensor node
making them exhaust their energy by causing
unnecessary signature verifications. And in multi-
hop code dissemination protocols, sensor nodes
need to broadcast their new program image to their
neighbors in response to a request. Hence, an
adversary can repeatedly send request to same
program image to its neighbors and make them
rebroadcast the same program image, until the
power resources of the sending node depletes.
II. RELATED WORK
Deluge [1] is a quick, reliable data dissemination
protocol. In Deluge large amount of data can be
propagated from one or more sensor nodes to all
other nodes over a multi hop, wireless sensor
network. In Deluge code update program is divided
into fixed sized blocks called pages. And these
pages are divided into fixed sized packets. Deluge
employs three phase process - Advertisement phase,
Request phase, Update phase. In Deluge each node
periodically broadcast the program version
available for sending. This advertisement is not
authenticated, and any node in the network may
advertise any version number. Deluge also exports
a simple, one-hop network querying interface. Any
node in the network which is not authenticated can
query to obtain the program version number
currently installed. Without authenticated
broadcasts an attacker can advertise a new version
number, can broadcast false data or program to any
number of nodes, and can hijack the entire network
and can take control over the network. Deluge uses
16-bit cyclic redundancy checks (CRC) across both
packets and pages to verify program integrity. The
CRCs do not protect against an attacker injecting a
bogus program or program fragment.
To provide security to Deluge network
programming [2], hash function is used. Hash of
each packet is computed and placed in the previous
packet. The hash of the first packet is digitally
signed using private key of Base Station. And each
node verifies the first packet with Base Station’s
public key. Seluge [3] is an efficient, secure, robust,
and DoS-resistant code dissemination system for
wireless sensor networks. Seluge relies on Deluge
for efficiency and robustness. Seluge further
provides three layers of protection: Immediate
authentication of code dissemination packets,
authentication of page advertisement and SNACK
packets, and anti-DoS protection for signature
packets.
III. DESIGN
Fig1: BS and Sensor nodes deployment region
The network area consists of Base Station and
sensor nodes. BS will have public and private key
pair. And all sensor nodes in the network will be
pre-configure with public key of BS. The code
dissemination scheme consists of 3 phases:
1. Initialization phase
2. Packet processing phase
3. Verification phase
1. Initialization phase:
BS will generate one-way hash chain of length
‘n’ by applying hash to an initial element ‘n’ times.
The result obtained is called committed value. The
hash values are used as cryptographic keys. The
length of hash chain must be at least equal to the
number of expected program image updates. The
ith element in this hash chain is denoted as Vi.
Then we have
Vi =H(Vi +1), 0<=i<=n.
International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 92
Where: n=maximum number of program image
updates.
The committed value (V0) will be pre-loaded in
each node before deployment along with Base
station’s public key. The ith element of this hash
chain will be stored in sensor node is called version
key.
2. Packet processing phase:
After initialization phase, if BS has any program
image updates then it will prepare the data packets.
Initially, an M-byte nonce (i.e., Q) is concatenated
with the last packets of the program image (i.e., Pn).
Then hash function is applied to Pn||Q i.e.,
hn<=H(Pn||Q).
The first M bytes of hn are used as a session key
to encrypt Pn||Q, which produces last encrypted
data packet (Ehn(Pn||Q)). Next, the first M bytes of
hn are concatenated with the previous packet (Pn-1).
Again, the one-way hash function is applied to Pn-
1||hn, yielding hn-1. The encryption process for Pn-1 is
similar to that for Pn. This concatenation-hashing-
encryption process is applied to all program image
data packets until the first packet of the whole
program image is reached. After h1 is used to
encrypt first packet (P1||h2), it will be used in the
module called cipher puzzle constructor, h1 is
digitally signed by the Base station (Sig(h1)).
A weak authenticator called Cipher Puzzle (CP)
is constructed by finding fixed size segments(S)
which satisfies
ETMV0(h1|S|V1) = H(Sig(h1))
in the first k bytes, where k is the strength of the
Cipher Puzzle. Cipher Puzzle is used to defend
against a signature-based attack. Sig(h1) and the
cipher text ETMV0(h1|S|V1) without first k bytes,
are included in Advertisement packet, which will be
broadcasted initially to sensor nodes to alert sensor
nodes about the new update that is available. When
new program image is to send afte ith updates, the
above procedure is repeated using nonce for the last
data packets different from all I previous updates.
3. Verification phase:
This phase comprises of three stage process i.e.,
Advertisement verification, Request verification
and Update verification.
3.1 Advertisement verification:
Each advertisement verification packet contains a
number called version number of the program
image update. Each node after receiving
advertisement packet will check the version number
and check whether it is a newer than the current
version. And to avoid vulnerabilities node further
investigates by checking whether decrypted Vi+1
and the current version key are same. In addition
Request_counter is set to 0 to avoid Request-Based
Dos attack during request verification i.e.,
Request_counter will be used to check how many
times same request has been made by the
neighboring node.
3.2 Request verification:
After verifying advertisement packet, node
encrypts the puzzle solution and the sequence
number updated of the same program image. This
encrypted result is called request authenticator is
attached to the Request packet and will be unicasted
to the sender. The sending node will decrypt the
authenticator packet and will initialize the
respective sequence number for the receiver. And at
the same time sending node will check whether
same request has been made more than threshold
value (i.e., Max_updates). If this request has not
been made more that Max_updates times then the
request will be processed and Request_counter will
be incremented by 1.
3.3 Update verification:
When the request is accepted sending node will
prepare the update packets and will send it to its
one-hop neighbors. Receiving nodes after receiving
encrypted packets, it uses session key from (i+1)th
packet to decrypt ith packet. After decryption one-
way hash relationship between decrypted packets
and session key is checked. This check is to ensure
the integrity of update packets.
IV. CONCLUSIONS
International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 93
In this work, a new security scheme is proposed
to provide confidentiality and Dos-resistance in
muti-hop code update in WSN. Here session keys
are derived from hashing data packets inorder to
encrypt the same data packets. And Cipher Puzzle
is used as a weak authenticator to provide
confidentiality for the first session key which is
used to defend against signature-based and request-
based DoS attack.
REFERENCES
1. Jonathan W. Hui and David Culler. The Dynamic
Behavior of a Data Dissemination Protocol for
Network Programming at Scale,In SenSys '04,
pages 81-94, Nwe York, NY, USA, 2004, ACM press.
2. Dutta Prabal K, Hui Jonathan W, Chu David C,
Culler David E. “ Securing the deluge network
programming system “. In: IPSN’06: Processing of
International Conference on Information Processing
in Sensor Networks. New York, NY, USA: ACM
Press; 2006.p.326-33.
3. Hyun, S.; Ning, P.; Liu, A.; Du, W. Seluge: Secure
and DoS-Resistant Code Dissemination in Wireless
Sensor Networks. In Proceedings of 2008
International Conference on Information Processing
in Sensor Networks, St. Louis, MO, 22–24 April
2008; pp. 445–456.
4. Ning Peng, Liu An, Du Wenliang. DoS attacks
against broadcast authentication in wireless sensor
network. ACM Transaction on Sensor Networks
January 2008;4(1):1-35.
5. Lanigan PE, Gandhi R, Narasimhan P. Sluice:
Secure dissemination of code updates in sensor
networks. In: 26th
IEEE International Conference on
Distributed omputing Systems, 2006(ICDCS 2006);
2006. p. 53-63.
6. Hyun Sangwon, Ning Peng, Liu An. Mitigating
wireless jamming attacks via channel migration. In:
Distributed Computing Systems Workshops
(ICDCSW), 2011 31st
International Conference on.
IEEE; June 2011. p. 313-22.
7. Hu YC, Perrig A, Johnson DB. Packet leashes: a
defense against wormhole attacks in wireless
networks. In: INFOCOM ’03:Proceedings of 23rd
IEEE International Conference on Computer
Communications, vol. 3; 2003. p. 1976-86.
8. Hu Wen, Tan Hailun, Corke Peter, Shih Wen C, Jha
Sanjay. Towards trusted wireless sensor networks,
vol. 7.New York, NY, USA: ACM; August 2010. 1-25.
9. Hu Wen, Chou Chun T, Jha Sanjay, Bulusu
Nirupama. Deploying long-lived and cost-effective
hybrid sensor networks. Ad Hoc Networks Nov
2006;4(6):749-67.
10. Du X, Guizani M, Xiao Y, Chen HH. Defending DoS
attacks on broadcast authentication in wireless
sensor networks. In:Communications, 2008. ICC ’08.
IEEE International Conference ; 2008.p.1653-7.
11. Deng Jing, Han Richard, Mishra Shivakant. Secure
code distribution in dynamically programmable
wireless sensor networks. In: IPSN’06:Processings
of International Conference on Information
Processing in Sensor Networks. New York, NY, USA:
ACM Press; 2006.p. 292-300.
12. Jeong Jaein, Culler D. Incremental network
programming for wireless sensors. In: Sensor and Ad
Hoc Communications and Networks, 2004. IEEE
SECON 2004. 2004 First Annual IEEE
Communications Soceity Conference on; 2004.p. 25-
33.

Más contenido relacionado

La actualidad más candente

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Ericsson
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 

La actualidad más candente (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Bi24385389
Bi24385389Bi24385389
Bi24385389
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 

Destacado

Destacado (18)

[IJET-V1I4P1] Authors :T.S.Geetha , Dr.S.SelvakumarRaja
[IJET-V1I4P1] Authors :T.S.Geetha , Dr.S.SelvakumarRaja[IJET-V1I4P1] Authors :T.S.Geetha , Dr.S.SelvakumarRaja
[IJET-V1I4P1] Authors :T.S.Geetha , Dr.S.SelvakumarRaja
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
[IJET-V1I6P3] Authors:Bachwad M.R. , Maske Ashadeep M
[IJET-V1I6P3] Authors:Bachwad M.R. , Maske Ashadeep M[IJET-V1I6P3] Authors:Bachwad M.R. , Maske Ashadeep M
[IJET-V1I6P3] Authors:Bachwad M.R. , Maske Ashadeep M
 
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
 
[IJET-V1I3P16] Authors : A.Eswari,T. Ravi Kumar Naidu,T.V.S.Gowtham Prasad.
[IJET-V1I3P16] Authors : A.Eswari,T. Ravi Kumar Naidu,T.V.S.Gowtham Prasad.[IJET-V1I3P16] Authors : A.Eswari,T. Ravi Kumar Naidu,T.V.S.Gowtham Prasad.
[IJET-V1I3P16] Authors : A.Eswari,T. Ravi Kumar Naidu,T.V.S.Gowtham Prasad.
 
[IJET-V2I1P8] Authors:Mr. Mayur k Nemade , Porf. S.I.Kolhe
[IJET-V2I1P8] Authors:Mr. Mayur k Nemade , Porf. S.I.Kolhe[IJET-V2I1P8] Authors:Mr. Mayur k Nemade , Porf. S.I.Kolhe
[IJET-V2I1P8] Authors:Mr. Mayur k Nemade , Porf. S.I.Kolhe
 
[IJET-V1I4P6] Authors :Galal Ali Hassaan
[IJET-V1I4P6] Authors :Galal Ali Hassaan[IJET-V1I4P6] Authors :Galal Ali Hassaan
[IJET-V1I4P6] Authors :Galal Ali Hassaan
 
[IJET-V1I3P9] Authors :Velu.S, Baskar.K, Kumaresan.A, Suruthi.K
[IJET-V1I3P9] Authors :Velu.S, Baskar.K, Kumaresan.A, Suruthi.K[IJET-V1I3P9] Authors :Velu.S, Baskar.K, Kumaresan.A, Suruthi.K
[IJET-V1I3P9] Authors :Velu.S, Baskar.K, Kumaresan.A, Suruthi.K
 
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
 
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
 
[IJET-V1I2P6] Authors :Sarat K Kotamraju, K.Ch.Sri Kavya, A.Gnandeep Reddy, G...
[IJET-V1I2P6] Authors :Sarat K Kotamraju, K.Ch.Sri Kavya, A.Gnandeep Reddy, G...[IJET-V1I2P6] Authors :Sarat K Kotamraju, K.Ch.Sri Kavya, A.Gnandeep Reddy, G...
[IJET-V1I2P6] Authors :Sarat K Kotamraju, K.Ch.Sri Kavya, A.Gnandeep Reddy, G...
 
[IJET-V2I1P1] Authors:Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
[IJET-V2I1P1] Authors:Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar[IJET-V2I1P1] Authors:Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
[IJET-V2I1P1] Authors:Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
 
[IJET-V1I5P8] Author: Rashmi Jangale, Sujata Khedkar
[IJET-V1I5P8] Author: Rashmi Jangale, Sujata Khedkar[IJET-V1I5P8] Author: Rashmi Jangale, Sujata Khedkar
[IJET-V1I5P8] Author: Rashmi Jangale, Sujata Khedkar
 
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
 
[IJET-V1I2P10] Authors :L. O. Osuman, A. Dosunmu , B .S. Odagme
[IJET-V1I2P10] Authors :L. O. Osuman, A. Dosunmu , B .S. Odagme [IJET-V1I2P10] Authors :L. O. Osuman, A. Dosunmu , B .S. Odagme
[IJET-V1I2P10] Authors :L. O. Osuman, A. Dosunmu , B .S. Odagme
 
[IJET-V1I6P10] Authors: Mr.B.V.Sathish Kumar, M.Tech Scholar G.Sumalatha
[IJET-V1I6P10] Authors: Mr.B.V.Sathish Kumar, M.Tech Scholar G.Sumalatha [IJET-V1I6P10] Authors: Mr.B.V.Sathish Kumar, M.Tech Scholar G.Sumalatha
[IJET-V1I6P10] Authors: Mr.B.V.Sathish Kumar, M.Tech Scholar G.Sumalatha
 
[IJET-V1I5P1] Authors :Ahmed Mohamed Abushnafa, R. K. Pandeyb, Deepak Lalc
[IJET-V1I5P1] Authors :Ahmed  Mohamed  Abushnafa, R. K. Pandeyb, Deepak Lalc[IJET-V1I5P1] Authors :Ahmed  Mohamed  Abushnafa, R. K. Pandeyb, Deepak Lalc
[IJET-V1I5P1] Authors :Ahmed Mohamed Abushnafa, R. K. Pandeyb, Deepak Lalc
 
[IJET-V1I3P18] Authors :Galal Ali Hassaan.
[IJET-V1I3P18] Authors :Galal Ali Hassaan.[IJET-V1I3P18] Authors :Galal Ali Hassaan.
[IJET-V1I3P18] Authors :Galal Ali Hassaan.
 

Similar a [IJET-V1I3P15] Authors :Deeksha S.

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd Iaetsd
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature AlgorithmSecure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithmijcnes
 
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxWSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxAbhinavAshish21
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...IRJET Journal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd Iaetsd
 

Similar a [IJET-V1I3P15] Authors :Deeksha S. (20)

Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Paper1
Paper1Paper1
Paper1
 
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature AlgorithmSecure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
 
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxWSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptx
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit process
 

Más de IJET - International Journal of Engineering and Techniques

Más de IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Último

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 

Último (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 

[IJET-V1I3P15] Authors :Deeksha S.

  • 1. International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 90 Confidential DoS-Resistant Code Update Protocol in WSN Deeksha S (Student M.Tech, CSE, SIT, Tumkur Email: s.deeksha45@gmail.com) I. INTRODUCTION Wireless sensor network (WSN) consist of collections of small, low-power nodes called sensor nodes. These sensor nodes are capable of performing some processing, gathering sensed information, communicating with other connected nodes in the network. Wireless sensor networks are used in various safety-critical applications such as critical infrastructure protection and surveillance, health monitoring, monitoring and control of environmental parameters etc. Sensor nodes cooperatively pass data among themselves through in the network. After deployment of sensor nodes in the network sometimes there is need to send code update data or new program image to update installed programs of stored parameters or to add new functionality or to perform software maintenance or to adjust configuration parameters or to distribute management commands and queries without having to physically reach each individual node in the network. These code update data is of the order of kilobytes while a parameter is just few bytes long. Due to such vast differences in their sizes, design of the dissemination protocols is Different. The two types of dissemination protocols are developed. Code dissemination protocols are developed to efficiently distribute long code update data into a network, enabling complete system reprogramming. On the other hand, short code updates data such as several two-byte configuration parameters, within a WSN. Common uses of this kind of protocols include injecting small programs, commands, queries, and configuration parameters. Sensor nodes are battery operated, so energy should be efficiently utilized. Security vulnerabilities occur in the network, which allow adversary to update undesirable values, erase critical values or launch DoS (Daniel of Service) attack in the network. Lack of authentication may allow attacker to attack one sensor node and misuse it to send false program image into the network and take control over entire network. And in some applications like in military, environmental applications these code updates need to be kept secret because adversaries may gain access to these code update information and misuse it. In many code update protocols Digital signatures have been used, but power consumption is more, as sensor nodes are battery operated energy should be efficiently utilized. Digital signature is used for Abstract: Wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes. WSNs are widely applicable in monitoring and control of environmental parameters such as temperatures, sound, pressure, etc. Sensor nodes cooperatively pass data among themselves in the network. Sometimes it is necessary to update data or program image through wireless links after they are deployed in order to adjust configuration parameters of sensors or distribute management commands and queries to the sensor nodes. In many applications these code updates need to be kept secret. Authentication and confidentiality play a very important role in providing secure code updates. Sometimes an adversary may transmit forged data, forcing nodes to waste their energy in identifying it as invalid. And also adversaries may sometimes repeatedly send invalid program image requests to its neighbours making them exhaust their energy. To avoid such attacks authentication of nodes need to be made and code updates need to be kept confidential. Keywords— Wireless sensor networks, secure code updates, confidentiality, authentication, denial of service. RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 91 authentication in code dissemination protocols, an adversary can repeatedly broadcast false data packet with an invalid signature to sensor node making them exhaust their energy by causing unnecessary signature verifications. And in multi- hop code dissemination protocols, sensor nodes need to broadcast their new program image to their neighbors in response to a request. Hence, an adversary can repeatedly send request to same program image to its neighbors and make them rebroadcast the same program image, until the power resources of the sending node depletes. II. RELATED WORK Deluge [1] is a quick, reliable data dissemination protocol. In Deluge large amount of data can be propagated from one or more sensor nodes to all other nodes over a multi hop, wireless sensor network. In Deluge code update program is divided into fixed sized blocks called pages. And these pages are divided into fixed sized packets. Deluge employs three phase process - Advertisement phase, Request phase, Update phase. In Deluge each node periodically broadcast the program version available for sending. This advertisement is not authenticated, and any node in the network may advertise any version number. Deluge also exports a simple, one-hop network querying interface. Any node in the network which is not authenticated can query to obtain the program version number currently installed. Without authenticated broadcasts an attacker can advertise a new version number, can broadcast false data or program to any number of nodes, and can hijack the entire network and can take control over the network. Deluge uses 16-bit cyclic redundancy checks (CRC) across both packets and pages to verify program integrity. The CRCs do not protect against an attacker injecting a bogus program or program fragment. To provide security to Deluge network programming [2], hash function is used. Hash of each packet is computed and placed in the previous packet. The hash of the first packet is digitally signed using private key of Base Station. And each node verifies the first packet with Base Station’s public key. Seluge [3] is an efficient, secure, robust, and DoS-resistant code dissemination system for wireless sensor networks. Seluge relies on Deluge for efficiency and robustness. Seluge further provides three layers of protection: Immediate authentication of code dissemination packets, authentication of page advertisement and SNACK packets, and anti-DoS protection for signature packets. III. DESIGN Fig1: BS and Sensor nodes deployment region The network area consists of Base Station and sensor nodes. BS will have public and private key pair. And all sensor nodes in the network will be pre-configure with public key of BS. The code dissemination scheme consists of 3 phases: 1. Initialization phase 2. Packet processing phase 3. Verification phase 1. Initialization phase: BS will generate one-way hash chain of length ‘n’ by applying hash to an initial element ‘n’ times. The result obtained is called committed value. The hash values are used as cryptographic keys. The length of hash chain must be at least equal to the number of expected program image updates. The ith element in this hash chain is denoted as Vi. Then we have Vi =H(Vi +1), 0<=i<=n.
  • 3. International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 92 Where: n=maximum number of program image updates. The committed value (V0) will be pre-loaded in each node before deployment along with Base station’s public key. The ith element of this hash chain will be stored in sensor node is called version key. 2. Packet processing phase: After initialization phase, if BS has any program image updates then it will prepare the data packets. Initially, an M-byte nonce (i.e., Q) is concatenated with the last packets of the program image (i.e., Pn). Then hash function is applied to Pn||Q i.e., hn<=H(Pn||Q). The first M bytes of hn are used as a session key to encrypt Pn||Q, which produces last encrypted data packet (Ehn(Pn||Q)). Next, the first M bytes of hn are concatenated with the previous packet (Pn-1). Again, the one-way hash function is applied to Pn- 1||hn, yielding hn-1. The encryption process for Pn-1 is similar to that for Pn. This concatenation-hashing- encryption process is applied to all program image data packets until the first packet of the whole program image is reached. After h1 is used to encrypt first packet (P1||h2), it will be used in the module called cipher puzzle constructor, h1 is digitally signed by the Base station (Sig(h1)). A weak authenticator called Cipher Puzzle (CP) is constructed by finding fixed size segments(S) which satisfies ETMV0(h1|S|V1) = H(Sig(h1)) in the first k bytes, where k is the strength of the Cipher Puzzle. Cipher Puzzle is used to defend against a signature-based attack. Sig(h1) and the cipher text ETMV0(h1|S|V1) without first k bytes, are included in Advertisement packet, which will be broadcasted initially to sensor nodes to alert sensor nodes about the new update that is available. When new program image is to send afte ith updates, the above procedure is repeated using nonce for the last data packets different from all I previous updates. 3. Verification phase: This phase comprises of three stage process i.e., Advertisement verification, Request verification and Update verification. 3.1 Advertisement verification: Each advertisement verification packet contains a number called version number of the program image update. Each node after receiving advertisement packet will check the version number and check whether it is a newer than the current version. And to avoid vulnerabilities node further investigates by checking whether decrypted Vi+1 and the current version key are same. In addition Request_counter is set to 0 to avoid Request-Based Dos attack during request verification i.e., Request_counter will be used to check how many times same request has been made by the neighboring node. 3.2 Request verification: After verifying advertisement packet, node encrypts the puzzle solution and the sequence number updated of the same program image. This encrypted result is called request authenticator is attached to the Request packet and will be unicasted to the sender. The sending node will decrypt the authenticator packet and will initialize the respective sequence number for the receiver. And at the same time sending node will check whether same request has been made more than threshold value (i.e., Max_updates). If this request has not been made more that Max_updates times then the request will be processed and Request_counter will be incremented by 1. 3.3 Update verification: When the request is accepted sending node will prepare the update packets and will send it to its one-hop neighbors. Receiving nodes after receiving encrypted packets, it uses session key from (i+1)th packet to decrypt ith packet. After decryption one- way hash relationship between decrypted packets and session key is checked. This check is to ensure the integrity of update packets. IV. CONCLUSIONS
  • 4. International Journal of Engineering and Techniques - Volume 1 Issue 3, May -June 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 93 In this work, a new security scheme is proposed to provide confidentiality and Dos-resistance in muti-hop code update in WSN. Here session keys are derived from hashing data packets inorder to encrypt the same data packets. And Cipher Puzzle is used as a weak authenticator to provide confidentiality for the first session key which is used to defend against signature-based and request- based DoS attack. REFERENCES 1. Jonathan W. Hui and David Culler. The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale,In SenSys '04, pages 81-94, Nwe York, NY, USA, 2004, ACM press. 2. Dutta Prabal K, Hui Jonathan W, Chu David C, Culler David E. “ Securing the deluge network programming system “. In: IPSN’06: Processing of International Conference on Information Processing in Sensor Networks. New York, NY, USA: ACM Press; 2006.p.326-33. 3. Hyun, S.; Ning, P.; Liu, A.; Du, W. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. In Proceedings of 2008 International Conference on Information Processing in Sensor Networks, St. Louis, MO, 22–24 April 2008; pp. 445–456. 4. Ning Peng, Liu An, Du Wenliang. DoS attacks against broadcast authentication in wireless sensor network. ACM Transaction on Sensor Networks January 2008;4(1):1-35. 5. Lanigan PE, Gandhi R, Narasimhan P. Sluice: Secure dissemination of code updates in sensor networks. In: 26th IEEE International Conference on Distributed omputing Systems, 2006(ICDCS 2006); 2006. p. 53-63. 6. Hyun Sangwon, Ning Peng, Liu An. Mitigating wireless jamming attacks via channel migration. In: Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on. IEEE; June 2011. p. 313-22. 7. Hu YC, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM ’03:Proceedings of 23rd IEEE International Conference on Computer Communications, vol. 3; 2003. p. 1976-86. 8. Hu Wen, Tan Hailun, Corke Peter, Shih Wen C, Jha Sanjay. Towards trusted wireless sensor networks, vol. 7.New York, NY, USA: ACM; August 2010. 1-25. 9. Hu Wen, Chou Chun T, Jha Sanjay, Bulusu Nirupama. Deploying long-lived and cost-effective hybrid sensor networks. Ad Hoc Networks Nov 2006;4(6):749-67. 10. Du X, Guizani M, Xiao Y, Chen HH. Defending DoS attacks on broadcast authentication in wireless sensor networks. In:Communications, 2008. ICC ’08. IEEE International Conference ; 2008.p.1653-7. 11. Deng Jing, Han Richard, Mishra Shivakant. Secure code distribution in dynamically programmable wireless sensor networks. In: IPSN’06:Processings of International Conference on Information Processing in Sensor Networks. New York, NY, USA: ACM Press; 2006.p. 292-300. 12. Jeong Jaein, Culler D. Incremental network programming for wireless sensors. In: Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Soceity Conference on; 2004.p. 25- 33.