SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011



       Pairwise Keys Generation Using Prime Number
           Function in Wireless Sensor Networks
                    Nayan1 , Swapnil Singh2, Mahesh Kumar Bhandari3 and Sanjay Kumar4
                     1 ,2,3 ,4 I cf ai U niversity, Department of C omputer Science, Dehradun , I ndia,
                      Email: 1nayan366, 2swapnilsingh17, 3mahesh.kamtess, 4sanju2077@gmail.com


Abstract —Providing security in wireless sensor networks is         algorithm, public key cryptography and digital signature
a very crucial task. Because of its dynamic nature (no fixed        methods. The public key and digital signature method is
topology) and resource constraint devices. Which has limited        not suitable for small sensor because of two reasons
computational abilities, memory storage and physical                   • Economically
restrictions. Advancement in the field of intrusion and
                                                                      • large amount of energy is used in signature methods
evaesdroping has increased challenges for a secure
communication between nodes. So, establishments of pair wise             The other methods became fragile due to advancement in
keys in a wireless network becomes a vital issue. Hence,            intrusion and eavesdroping techniques. Recently a new
securely distributing keys among sensor nodes is a                  method of LDU decomposition method of numerical anal-
fundamental challenge for providing seamless transmission           ysis is been designed by Park, Choi, and Youn [5] which is
and security services. Having little resources in our hand,         one of the best method for generation of pair wise keys in
it is always a tough task to design and implement protocols.        sensor networks. but prediction of element of diagonal matrix
But this paper proposes a new robust key pre-distribution           make it vulnerable to attacker.
scheme which resolves this issue without compromising                    Our technique which is based on two fundamental
security. This paper presents a new mechanism to achieve
                                                                    principle of number system. We have used prime number
pair wise keys between two sensor nodes by using the
algebraic, exponential, logarithm functions and prime               concept and various types of algebraic, logarithmic,
numbers. The resilience method under this scheme is based           exponential and some discontinuous function. By using
on discontinuous functions which is hard to be spoofed.             the prime numbers we have immaterialize the prediction
                                                                    aspects because it is not easy to predict prime numbers .It
                      I. INTRODUCTION                               has only two factors 1 and number itself. We are not taking
                                                                    1 into account for our calculation.
    The advancement of computer literacy in world is                     The rest of the paper is organized as follows. Next
very much dependent upon internet and various types of              section contains literature survey and motivation for
information. Wireless sensor networks acts as a bridge in           our work. In Section 3, we propose the key distribution
between the development and computer literacy. Wsns                 scheme for two nodes and individual nodes between a
consist of small nodes which is a paradigm of small                 node and a sink node. Section 4 provides resilience and
computers. It consist of memory space, a small processor            contains methods of improvement in our scheme. Section
and lifelong battery. Since another source of energy is             6,7 ends the paper with conclusions and Acknowledgement.
solar power. These sensor nodes are deployed in hostile
environments of military areas and forest. Where nothing                                II. RELATED WORK
can be handled manually nor updation of resources is
possible. These sensor nodes has a special type of sensor              There are various key distribution schemes are
installed with them which works on heat ,light and                  avail- able. But Ecliptic curve schemes[1] are the basis of
pressure e.t.c. a light sensor communicate with another             modern key distribution schemes. As the science
light sensor and in same fashion heat and pressure nodes            progressed various Ref[7]Deterministic key distribution
works. The basic topology consist of large number of sensor         schemes are launched. Other methods include public
nodes and a sink node. A sink node is like a base station           key cryptography and digital Signature methods which
where all the data are organized and processed which is             not suitable for tiny wireless Sensors. Deterministic key
gathered by different sensor nodes. Sink node has a large           methods include SNEP, TESLA,SPIN Which has their
memory space, more powerful processing units and robust             advantages and disadvantages. Neither of them has
security techniques. The most important part in wireless            holistic approach to deal with wireless network. Recently
sensor network re- volves round a crucial juncture i.e. The         Park, Choi and Youn proposed a new scheme called Ref[5]A
way of communica- tion between different sensor nodes.              noble key pre-distribution scheme with LU matrix for secure
Secure establishment of pair wise keys between two sensor           wireless sensor networks. According to this scheme, the
nodes is very impor- tant. Because it deals with various            base station creates a large pool of elements and selects
security aspects like authentication, data integrity, non-          randomly some numbers elements from the pool to
repudation e.t.c.. Vari- ous techniques have been discovered        construct a symmetric matrix . After constructing this
and implemented, few examples are Difflie-hellman, RSA              symmetric matrix, the base station applies LU decomposition

© 2011 ACEEE                                                   10
DOI: 01.IJNS.02.04.537
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


for calculating and matrices by using some formula.                  if x is a prime number greater than 3.If that x contains 5
                                                                     in unit‘s place then it should be removed because that
       III. NEW PROPOSED KEY DISTRIBUTION SCHEME                     number will be divisible by 5 and it will not be a prime
                                                                     number The given equation check values for positive integer.
   We start with a brief description of various concepts
                                                                     • Step1.2:- each node is deployed with different types
and definitions used in this paper.
                                                                     functions like:
A. Definition:                                                       (group1 ) Algebraic (group 2 ) Logarithmic (group 3 )
    • Definition 1 : prime number :-a number which has only          Exponential (group4 ) Discontinuous
2 factors 1 and number itself.                                       • Sensitiveness of function depends upon environment
• Definition 2 : A hash function (H)is any well-defined              where it is employed.             Like for house hold works
procedure or mathematical function that converts a large,            algebraic functions with low degrees are used. Places where
possibly variable-sized amount of data into a small datum,           high security is required then exponential and logarithm
usually a single integer that may serve as an index to an            functions are used. Functions are taken from square
array. The values returned by a hash function are called             matrix for sensor nodes. During the selection of functions
hash values, hash codes, hash sums, or simply hashes.                to each node is done in such a way that there must be at least
• Definition 3: Discontinuous function: a function is said to        one common function is pre deployed in nodes. If this does
be discontinuous at a point where neither its lower value            not happen then node will able to make connection with
exist nor upper value. At that point the function is not             other node , with the help of common functions which is
defined.                                                             shared between any other sensor nodes(i.e. generation
• Definition 4: A reverse function (R) is a function that            of path key).In case of logarithmic and exponential functions
rearranges the entries of a tuple in a reverse order ex:-            approximation is done so that actual prime values are
R((m,n,p,q))=(q,p,n,m)                                               calculated.
• Definition 5: If a square matrix A has the property AT = A,        • Phase 2:-( connection between two nodes)
where transpose of matrix A is denoted by AT                         • step 1. For pair wise establishment between two
                                                                     sensor nodes only three group functions is used.
B. Node to Node Pair wise Key establishment                          Group4 functions will only used in resilience which will
    Generation of functions to deploy in nodes                       be discussed in later chapter. First node say (nodea ) sends
All the functions which are used in pairwise generation of           number of values for (nodeb).These values are calculated
keys is pre-deployed with the help of large square matrix.           by a on a function say f (x) = (x2 + 2).Node takes
let‘s say a network has 1000 nodes then a matrix of n × n is         values as(13,17,19) because these values are prime
used. n will basically half of total number of nodes. The            numbers. After taking these values, these values are
matrix has 20 functions 5 each of from                               calculated over any algebraic function. Let say f (x) = (x2
4 different groups (Algebraic ,Logarithmic, Exponential,             + 2) Values are (171,291,363) and (nodea ) has applied hash
discontinuous ).From matrix functions are deployed as                functions.           H (171, 291, 363) = (h1 , h2 , h3 ) R(h1 , h2 ,
node(a) will have a first row of matrix and node(b) will             h3 ) = (h3 , h2 , h1 )
have first column of matrix. This distribution will create at        • Step 2: when (nodeb ) receives these data it decrypts using
least a common function between them. Same distribution              reverse function and applying hash function in same manner
with alternate row and column is followed with every                 as it is been encrypted. It calculates the value of x by
node. Separate matrixes of 20 × 20 is used to deploy                 using different functions which is already deployed in
functions. Each matrices have some common rows and                   node. After calculating these values it checks whether the
columns. This will create common functions between                   x is a prime number or not. if x is a prime number then it
different nodes and will reduce the formation of path                sends another copy of numbers for node a Using same
keys. Each matrixes have some common rows,common                     function, hash function and reverse function. The values
column and common functions.This improves probability                are different than the previous data.
of common functions between two nodes and time taken                 • Step 3: when (nodea ) receives the values it again
for connection establishment.                                        calculates and check the function type .if same function
                                                                     type is there then in that case the pair wise key establishment
                                                                     is generated between two nodes.
                                                                     • Step 4: After establishment of a secure connection between
                                                                     two nodes ,all the data which have been send for connection
                                                                     establishment is deleted. There are two advantages of this
                                                                     1) Memory usage is reduced because there is no need to
                                                                     store that values.
• phase 1: First phase: (pre-deployment work)                        2) It has improved security between two nodes.
• Step 1.1:- Each sensor nodes have a particular func-tion
  Remainder((x2-1)/24)) = 0                          (1)

© 2011 ACEEE                                                    11
DOI: 01.IJNS.02.04.537
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


B.1 Advantages of proposed protocol                                  N=1000,m=4,k=20 Number         of keys= 20 + log
   • By using prime number concept we are minimizing the                 (1000/4) = 22.39
prediction values which is send for connection establishment.        N=2000, m=4, k= 20 Number of keys = 20+ log
since there are only two factors of prime number 1 and               (2000/4) = 22.69.
number itself. an eavesdropper cannot able to take value             • Number of neighboring nodes:
because formula is only applicable for number greater                Ref[8]The upper range or maximum number of neighboring
than 3. And there are no multiples of prime number. prime            nodes in a network can be calculated with the help of
number has only two factors one and number itself and                ((N modulus10) + 1)
we are not considering one. so ultimately she has to                 (3) N = total number of nodes inside a network For
discover correct prime number. Which is not an easy task             N=1000 total number of neighboring nodes= 101 N=
because after that she have to find the function which we are        2000 total number of neighboring nodes=201
using for generation of pair wise keys.
• By using this algorithm a node can be connected with                          IV. RESILENCE IN   PROPOSED ALGROITHM
other sensor nodes with same function with different sets
                                                                          • Ref[2] It is defined as the number of the secure links
of values and also different functions which improves
                                                                     that are compromised after a certain number of nodes are
security threat and a challenging task for eavesdropper.
                                                                     captured by adversaries. We need to find the additional
C. Number of keys using the above protocol                           communication among uncaptured nodes that an adversary
    Ref[9]For dense sensor field (suppose there are aver-            can compromise based on the information retrieved from
age k neighbors per node). Every sensor node has different           captured nodes. Using Gilgor and Eschenaur scheme
functions which is grouped (m). N is the size of the                 probability of compromising the shared key between any
wireless network (i.e.) number of nodes. Each group has n            two non captured notes.
= (N/m) keys to communicate with different neighboring                    P compromised = (1 - (1 - (q/N ))x )                 (4)
nodes. Each sensor node is pre deployed with 15 functions            Where q= total number of keys in network, N=total number
which is grouped in 3 parts .These 15 keys constitute number         of nodes, x=number of compromised nodes.
of pair wise keys and log(n)group keys are there.                    • Case:1 If adversary did not get any information from
         keys(q) = k + log(n) = k + log(N/m)             (2)         compromised nodes about non compromised nodes.
For example:- N=1000, m=3, k=15 Number of keys                       we can say that x=0.                      For N=1000 ,x=0
= 15+ log (1000/3)=15+2.52=17.52                                     P compromised = (1 - (1 - (q/N ))0) = 0.
For N=2000, m=3 k=15 Number of keys= 15+ log                         • Case2: if there are compromised nodes.
(2000/3)=15+2.82=17.82                                               For           N=1000       assumed x=1      P compromised =
So by increasing the network size there is little increment          (1 - (1 - ((15.72/1000))1)
of keys on the network. An additional group of function is           =.0152 For x=4
deployed in every sensor nodes. these group consist of               P compromised = (1 - (1 - (15.72/1000))4)
discontinuous functions like:f (x) = 1/(1-x2 ) which is              =(1-.9385)
discontinuous at x=+-1these group are only used in the               =.061
case attack on sensor nodes. After attack if these malicious         • We can see that as the number of compromised nodes
sensor nodes is deployed in network then these special types         are increasing probability of compromised is increasing.
of function is multiplied with any normal group of                   But keys is not only a sole criteria through which a
functions . And whole of the process is repeated for                 network will be compromised. It depends upon the
establishment of connection between that node and sink               information which is retrieved through a particular node.
node (base station).after connection is established between          In our scheme an attacker can get information only about
that malicious node and sink node then this node is free to          the functions which are stored in that node. but the sets
connect with any node in that particular network. In that            of values over any function still remains an area which is
situation the number of keys in particular node will be              hard to crack. Because it is the values which is essential
increased such that.                                                 for pair wise generation of keys not functions.




© 2011 ACEEE                                                    12
DOI: 01.IJNS.02.04.537
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011

                                         TABLE I. NODE TO NODE PAIR WISE KEY   ESTABLISHMENT




A. Methods to improve resilience                                     is also called individual key which is generated between sink
                                                                     node and node. A new implementation is done with pair wise
    Suppose a situation comes in which a node is captured.
After some modification that compromised node is again               keys. Functions having point of discontinuity is
deployed in same environment. Then in that case it has to            introduced with normal functions. We have grouped four
establish connection with sink node for further transmis-            type of functions, in one group we will deploy functions
sion .without successful establishment of individual keys it         like f (x) = 1/(1 -x2 ). which is discontinuous at x = + -
will not be able to perform its transmission with other              (1).When a node want to set up individual keys with sink
neighboring nodes. Every node has a unique initialization            node with the functions values it can also send values
vector(iv) or called id‘s .These id‘s are stored in the base
                                                                     evaluated on this new type discontinuous function. it is
station. if any node is deployed after eavesdrop then it
has to send its id to base station checks that id with the           done on the same way as previous one only a new step is
stored value , if it matches then it is able to function as          introduced.
previously. Otherwise it will be discarded from the                  Ex:- suppose node (b) is captured after modifications it is
network and no transmission line is generated either with            again deployed in network.
sink node or neighboring nodes. This method will not                 • Step 1: it has to connect with sink node before normal
increase the burden of sink node because nothing stored.             functioning. It has to generate pair wise keys using the
This topic is more elaborated in next section.                       deployed functions with special type of discontinuous
                                                                     functions.
B. Method to evaluate a malicious node in the network by             • Step2 : it has to transmit computational time(Ctm ) and
sink node                                                            node(id‘s)(Nid ) with values which is calculated over
    • Transmission between a node and sink node(base                 particular function say= f (x) = ex/(1 -x2).
station) is always a vital transmission in wireless sensor           • Step3 : sink node computes the value to find the function
networks. Because all the information which is gathered is           on which the value is calculated and it stores the
transmitted to sink node for further processing. so an               computational time. It matches computational time with the
additional security is needed with above pair wise keys. It          send values. If value matches then node is allowed from

© 2011 ACEEE                                                    13
DOI: 01.IJNS.02.04. 537
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


transmission otherwise it is discarded and that node(id) is                                  VII. ACKNOWLEDGMENT
transmitted all over the network to all nodes. That particular
                                                                           The author wants to thank Mr. Gaurav Srivastava, Mr.
node is not used for carrying data in future use.
                                                                        Nishi Mani and Mr. Amit Kumar for there motivational
                                                                        support throughout this paper.
    V. ALGORITHM TO    CHECK MALICIOUS NODE IN NETWORK

    Suppose Nodeb is captured by an intruder and some                                              REFERENCES
modifications is done. After that these are steps which
                                                                        [1] ( Whitfield Diffie and Martin E. Hellman), New Directions
have to be followed by that malicious node before                       in Cryptography, year 1976
functioning as usual.                                                   [2] Laurent Eschenauer and Virgil D. Gligor,A key-management
1: N odeb has to set up pair wise key with sink node using              scheme for distributed sensor networks, ACM Conference on
discontinuous function.                                                 Computer and Communications Security, (year 2002, pages
2: it has to send evaluated values on which computation is              41-47), {http : / / doi . acm . org / 10 . 1145 / 586110 . 586117} ,
done along with computational time and own nodeid                       DBLP , http : / / dblp . uni-trier . de
3: after receiving that value sink node will find that func-            [3] Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil
tion on which evaluation is done.                                       Jajodia, Establishing Pair wise Keys for Secure Communication
                                                                        in       Ad      Hoc Networks: A Probabilistic Approach,
4: Sink node will evaluate same data set on same function
                                                                        (year2003,pages326-335,http : / / csdl . computer . org / comp /
and calculate computation time.                                         proceedings / icnp / 2003 / 2024 / 00 / 20240326abs . htm, bib-
5: Sink node will compare computational time which is                   source = DBLP, http://dblp.uni-trier.de
send by malicious node with the time which is calcu- lated              [4] Perrig, Adrian and Szewczyk, Robert and Wen, Victor
by itself                                                               and Culler, David and Tygar,                   J. D.,SPINS: security
6: if computational time is correct then that node is al-               protocols for sensor networks, MobiCom ’01:Proceedings
lowed to communicate with network.                                      of the 7th annual international conference on Mo- bile
7: otherwise that particular nodei d is transmitted over                computing and networking,year2001,pages = 189–199, http :
whole network and that node is discarded from normal                    / / doi . acm . org / 10 . 1145 / 381677 . 381696
                                                                        [5] Chang-Won Park and Sung Jin Choi and Hee Yong Youn,A
functioning.
                                                                        Noble Key Pre-distribution Scheme with LU Matrix for
8: End.                                                                 Secure Wireless Sensor Networks, year2005,pages = 494-
                                                                        499,http : / / dx . doi . org / 10 . 1007 / 11596981 _ 73,
                       VI. CONCLUSIONS                                  [6] Adrian Perrig and Robert Szewczyk and Victor Wen and
                                                                        David E. Culler and J. D. Tygar”, SPINS : security protocols
    The proposed algorithm is suitable for all type of                  for sensor networks”, “Mobile Computing and Networking”,
network places. The randomness of functions make it                     pages
almost impossible for eavesdropper to predict which                     “189-199”,year”2001",
function is working and corresponding values which are                  [7] Lee J. and             Stinson D.,” Deterministic key pre-
used in connection. values and function provide a two way               distribution schemes for                  distributed
security. Because for a same function two sets of values                sensor             networks”,             http :
are different from each other. After the node capture also              / / www . cacr . math . uwaterloo . ca / dstinson / pubs . html, year
                                                                        “2004”
node i d and computational time over particular
                                                                        [8] Mary Mathews, Min Song, Sachin Shetty, Rick
discontinuous function make aware of malicious node to                  McKenzie Detecting Compromised Nodes in Wireless Sensor
entire network. The future work will revolve around to                  Networks Eighth ACIS International Conference on Software
decrease the time which is used for connection establishment            Engineering, Artificial Intelligence, Networking, and Parallel/
and to minimize energy consumption. One technique is                    Distributed Computing
used when the nodes are only active when packets of data                [9] Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu A New Key
is arriving otherwise rest of time it is in sleep mode this will        Establishment Scheme For Wireless Sensor Networks journal
save energy.                                                            “International Journal of Network Security and Its Applications
                                                                        (IJNSA)”, Vol 1, No 2, July 2009




© 2011 ACEEE                                                       14
DOI: 01.IJNS.02.04. 537

Más contenido relacionado

La actualidad más candente

A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...IJERA Editor
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature LearningAmgad Muhammad
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...idescitation
 
NNFL 5 - Guru Nanak Dev Engineering College
NNFL  5 - Guru Nanak Dev Engineering CollegeNNFL  5 - Guru Nanak Dev Engineering College
NNFL 5 - Guru Nanak Dev Engineering CollegeMR. VIKRAM SNEHI
 
Artificial neural network for machine learning
Artificial neural network for machine learningArtificial neural network for machine learning
Artificial neural network for machine learninggrinu
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKScsandit
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesYannis Flet-Berliac
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCidescitation
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY IJNSA Journal
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Evolving Comprehensible Neural Network Trees
Evolving Comprehensible Neural Network TreesEvolving Comprehensible Neural Network Trees
Evolving Comprehensible Neural Network TreesAmr Kamel Deklel
 

La actualidad más candente (20)

PPID3 AICCSA08
PPID3 AICCSA08PPID3 AICCSA08
PPID3 AICCSA08
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature Learning
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
 
A Study On Deep Learning
A Study On Deep LearningA Study On Deep Learning
A Study On Deep Learning
 
NNFL 5 - Guru Nanak Dev Engineering College
NNFL  5 - Guru Nanak Dev Engineering CollegeNNFL  5 - Guru Nanak Dev Engineering College
NNFL 5 - Guru Nanak Dev Engineering College
 
Artificial neural network for machine learning
Artificial neural network for machine learningArtificial neural network for machine learning
Artificial neural network for machine learning
 
Neural Network
Neural NetworkNeural Network
Neural Network
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
Deep Learning Survey
Deep Learning SurveyDeep Learning Survey
Deep Learning Survey
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language Services
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
 
Image captioning
Image captioningImage captioning
Image captioning
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Evolving Comprehensible Neural Network Trees
Evolving Comprehensible Neural Network TreesEvolving Comprehensible Neural Network Trees
Evolving Comprehensible Neural Network Trees
 

Similar a Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks

Handwritten Digit Recognition using Convolutional Neural Networks
Handwritten Digit Recognition using Convolutional Neural  NetworksHandwritten Digit Recognition using Convolutional Neural  Networks
Handwritten Digit Recognition using Convolutional Neural NetworksIRJET Journal
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Sahana B S
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSREVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSijassn
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksijassn
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Journals
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Publishing House
 
House price prediction
House price predictionHouse price prediction
House price predictionSabahBegum
 
WSN performance based on node placement by genetic algorithm at smart home en...
WSN performance based on node placement by genetic algorithm at smart home en...WSN performance based on node placement by genetic algorithm at smart home en...
WSN performance based on node placement by genetic algorithm at smart home en...TELKOMNIKA JOURNAL
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsaciijournal
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingIAEME Publication
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithmsaciijournal
 
Neural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance IndustryNeural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance IndustryInderjeet Singh
 

Similar a Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks (20)

Handwritten Digit Recognition using Convolutional Neural Networks
Handwritten Digit Recognition using Convolutional Neural  NetworksHandwritten Digit Recognition using Convolutional Neural  Networks
Handwritten Digit Recognition using Convolutional Neural Networks
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSREVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
House price prediction
House price predictionHouse price prediction
House price prediction
 
WSN performance based on node placement by genetic algorithm at smart home en...
WSN performance based on node placement by genetic algorithm at smart home en...WSN performance based on node placement by genetic algorithm at smart home en...
WSN performance based on node placement by genetic algorithm at smart home en...
 
88 92
88 9288 92
88 92
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applying
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Neural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance IndustryNeural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance Industry
 
Kn2518431847
Kn2518431847Kn2518431847
Kn2518431847
 

Más de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Más de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks Nayan1 , Swapnil Singh2, Mahesh Kumar Bhandari3 and Sanjay Kumar4 1 ,2,3 ,4 I cf ai U niversity, Department of C omputer Science, Dehradun , I ndia, Email: 1nayan366, 2swapnilsingh17, 3mahesh.kamtess, 4sanju2077@gmail.com Abstract —Providing security in wireless sensor networks is algorithm, public key cryptography and digital signature a very crucial task. Because of its dynamic nature (no fixed methods. The public key and digital signature method is topology) and resource constraint devices. Which has limited not suitable for small sensor because of two reasons computational abilities, memory storage and physical • Economically restrictions. Advancement in the field of intrusion and • large amount of energy is used in signature methods evaesdroping has increased challenges for a secure communication between nodes. So, establishments of pair wise The other methods became fragile due to advancement in keys in a wireless network becomes a vital issue. Hence, intrusion and eavesdroping techniques. Recently a new securely distributing keys among sensor nodes is a method of LDU decomposition method of numerical anal- fundamental challenge for providing seamless transmission ysis is been designed by Park, Choi, and Youn [5] which is and security services. Having little resources in our hand, one of the best method for generation of pair wise keys in it is always a tough task to design and implement protocols. sensor networks. but prediction of element of diagonal matrix But this paper proposes a new robust key pre-distribution make it vulnerable to attacker. scheme which resolves this issue without compromising Our technique which is based on two fundamental security. This paper presents a new mechanism to achieve principle of number system. We have used prime number pair wise keys between two sensor nodes by using the algebraic, exponential, logarithm functions and prime concept and various types of algebraic, logarithmic, numbers. The resilience method under this scheme is based exponential and some discontinuous function. By using on discontinuous functions which is hard to be spoofed. the prime numbers we have immaterialize the prediction aspects because it is not easy to predict prime numbers .It I. INTRODUCTION has only two factors 1 and number itself. We are not taking 1 into account for our calculation. The advancement of computer literacy in world is The rest of the paper is organized as follows. Next very much dependent upon internet and various types of section contains literature survey and motivation for information. Wireless sensor networks acts as a bridge in our work. In Section 3, we propose the key distribution between the development and computer literacy. Wsns scheme for two nodes and individual nodes between a consist of small nodes which is a paradigm of small node and a sink node. Section 4 provides resilience and computers. It consist of memory space, a small processor contains methods of improvement in our scheme. Section and lifelong battery. Since another source of energy is 6,7 ends the paper with conclusions and Acknowledgement. solar power. These sensor nodes are deployed in hostile environments of military areas and forest. Where nothing II. RELATED WORK can be handled manually nor updation of resources is possible. These sensor nodes has a special type of sensor There are various key distribution schemes are installed with them which works on heat ,light and avail- able. But Ecliptic curve schemes[1] are the basis of pressure e.t.c. a light sensor communicate with another modern key distribution schemes. As the science light sensor and in same fashion heat and pressure nodes progressed various Ref[7]Deterministic key distribution works. The basic topology consist of large number of sensor schemes are launched. Other methods include public nodes and a sink node. A sink node is like a base station key cryptography and digital Signature methods which where all the data are organized and processed which is not suitable for tiny wireless Sensors. Deterministic key gathered by different sensor nodes. Sink node has a large methods include SNEP, TESLA,SPIN Which has their memory space, more powerful processing units and robust advantages and disadvantages. Neither of them has security techniques. The most important part in wireless holistic approach to deal with wireless network. Recently sensor network re- volves round a crucial juncture i.e. The Park, Choi and Youn proposed a new scheme called Ref[5]A way of communica- tion between different sensor nodes. noble key pre-distribution scheme with LU matrix for secure Secure establishment of pair wise keys between two sensor wireless sensor networks. According to this scheme, the nodes is very impor- tant. Because it deals with various base station creates a large pool of elements and selects security aspects like authentication, data integrity, non- randomly some numbers elements from the pool to repudation e.t.c.. Vari- ous techniques have been discovered construct a symmetric matrix . After constructing this and implemented, few examples are Difflie-hellman, RSA symmetric matrix, the base station applies LU decomposition © 2011 ACEEE 10 DOI: 01.IJNS.02.04.537
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 for calculating and matrices by using some formula. if x is a prime number greater than 3.If that x contains 5 in unit‘s place then it should be removed because that III. NEW PROPOSED KEY DISTRIBUTION SCHEME number will be divisible by 5 and it will not be a prime number The given equation check values for positive integer. We start with a brief description of various concepts • Step1.2:- each node is deployed with different types and definitions used in this paper. functions like: A. Definition: (group1 ) Algebraic (group 2 ) Logarithmic (group 3 ) • Definition 1 : prime number :-a number which has only Exponential (group4 ) Discontinuous 2 factors 1 and number itself. • Sensitiveness of function depends upon environment • Definition 2 : A hash function (H)is any well-defined where it is employed. Like for house hold works procedure or mathematical function that converts a large, algebraic functions with low degrees are used. Places where possibly variable-sized amount of data into a small datum, high security is required then exponential and logarithm usually a single integer that may serve as an index to an functions are used. Functions are taken from square array. The values returned by a hash function are called matrix for sensor nodes. During the selection of functions hash values, hash codes, hash sums, or simply hashes. to each node is done in such a way that there must be at least • Definition 3: Discontinuous function: a function is said to one common function is pre deployed in nodes. If this does be discontinuous at a point where neither its lower value not happen then node will able to make connection with exist nor upper value. At that point the function is not other node , with the help of common functions which is defined. shared between any other sensor nodes(i.e. generation • Definition 4: A reverse function (R) is a function that of path key).In case of logarithmic and exponential functions rearranges the entries of a tuple in a reverse order ex:- approximation is done so that actual prime values are R((m,n,p,q))=(q,p,n,m) calculated. • Definition 5: If a square matrix A has the property AT = A, • Phase 2:-( connection between two nodes) where transpose of matrix A is denoted by AT • step 1. For pair wise establishment between two sensor nodes only three group functions is used. B. Node to Node Pair wise Key establishment Group4 functions will only used in resilience which will Generation of functions to deploy in nodes be discussed in later chapter. First node say (nodea ) sends All the functions which are used in pairwise generation of number of values for (nodeb).These values are calculated keys is pre-deployed with the help of large square matrix. by a on a function say f (x) = (x2 + 2).Node takes let‘s say a network has 1000 nodes then a matrix of n × n is values as(13,17,19) because these values are prime used. n will basically half of total number of nodes. The numbers. After taking these values, these values are matrix has 20 functions 5 each of from calculated over any algebraic function. Let say f (x) = (x2 4 different groups (Algebraic ,Logarithmic, Exponential, + 2) Values are (171,291,363) and (nodea ) has applied hash discontinuous ).From matrix functions are deployed as functions. H (171, 291, 363) = (h1 , h2 , h3 ) R(h1 , h2 , node(a) will have a first row of matrix and node(b) will h3 ) = (h3 , h2 , h1 ) have first column of matrix. This distribution will create at • Step 2: when (nodeb ) receives these data it decrypts using least a common function between them. Same distribution reverse function and applying hash function in same manner with alternate row and column is followed with every as it is been encrypted. It calculates the value of x by node. Separate matrixes of 20 × 20 is used to deploy using different functions which is already deployed in functions. Each matrices have some common rows and node. After calculating these values it checks whether the columns. This will create common functions between x is a prime number or not. if x is a prime number then it different nodes and will reduce the formation of path sends another copy of numbers for node a Using same keys. Each matrixes have some common rows,common function, hash function and reverse function. The values column and common functions.This improves probability are different than the previous data. of common functions between two nodes and time taken • Step 3: when (nodea ) receives the values it again for connection establishment. calculates and check the function type .if same function type is there then in that case the pair wise key establishment is generated between two nodes. • Step 4: After establishment of a secure connection between two nodes ,all the data which have been send for connection establishment is deleted. There are two advantages of this 1) Memory usage is reduced because there is no need to store that values. • phase 1: First phase: (pre-deployment work) 2) It has improved security between two nodes. • Step 1.1:- Each sensor nodes have a particular func-tion Remainder((x2-1)/24)) = 0 (1) © 2011 ACEEE 11 DOI: 01.IJNS.02.04.537
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 B.1 Advantages of proposed protocol N=1000,m=4,k=20 Number of keys= 20 + log • By using prime number concept we are minimizing the (1000/4) = 22.39 prediction values which is send for connection establishment. N=2000, m=4, k= 20 Number of keys = 20+ log since there are only two factors of prime number 1 and (2000/4) = 22.69. number itself. an eavesdropper cannot able to take value • Number of neighboring nodes: because formula is only applicable for number greater Ref[8]The upper range or maximum number of neighboring than 3. And there are no multiples of prime number. prime nodes in a network can be calculated with the help of number has only two factors one and number itself and ((N modulus10) + 1) we are not considering one. so ultimately she has to (3) N = total number of nodes inside a network For discover correct prime number. Which is not an easy task N=1000 total number of neighboring nodes= 101 N= because after that she have to find the function which we are 2000 total number of neighboring nodes=201 using for generation of pair wise keys. • By using this algorithm a node can be connected with IV. RESILENCE IN PROPOSED ALGROITHM other sensor nodes with same function with different sets • Ref[2] It is defined as the number of the secure links of values and also different functions which improves that are compromised after a certain number of nodes are security threat and a challenging task for eavesdropper. captured by adversaries. We need to find the additional C. Number of keys using the above protocol communication among uncaptured nodes that an adversary Ref[9]For dense sensor field (suppose there are aver- can compromise based on the information retrieved from age k neighbors per node). Every sensor node has different captured nodes. Using Gilgor and Eschenaur scheme functions which is grouped (m). N is the size of the probability of compromising the shared key between any wireless network (i.e.) number of nodes. Each group has n two non captured notes. = (N/m) keys to communicate with different neighboring P compromised = (1 - (1 - (q/N ))x ) (4) nodes. Each sensor node is pre deployed with 15 functions Where q= total number of keys in network, N=total number which is grouped in 3 parts .These 15 keys constitute number of nodes, x=number of compromised nodes. of pair wise keys and log(n)group keys are there. • Case:1 If adversary did not get any information from keys(q) = k + log(n) = k + log(N/m) (2) compromised nodes about non compromised nodes. For example:- N=1000, m=3, k=15 Number of keys we can say that x=0. For N=1000 ,x=0 = 15+ log (1000/3)=15+2.52=17.52 P compromised = (1 - (1 - (q/N ))0) = 0. For N=2000, m=3 k=15 Number of keys= 15+ log • Case2: if there are compromised nodes. (2000/3)=15+2.82=17.82 For N=1000 assumed x=1 P compromised = So by increasing the network size there is little increment (1 - (1 - ((15.72/1000))1) of keys on the network. An additional group of function is =.0152 For x=4 deployed in every sensor nodes. these group consist of P compromised = (1 - (1 - (15.72/1000))4) discontinuous functions like:f (x) = 1/(1-x2 ) which is =(1-.9385) discontinuous at x=+-1these group are only used in the =.061 case attack on sensor nodes. After attack if these malicious • We can see that as the number of compromised nodes sensor nodes is deployed in network then these special types are increasing probability of compromised is increasing. of function is multiplied with any normal group of But keys is not only a sole criteria through which a functions . And whole of the process is repeated for network will be compromised. It depends upon the establishment of connection between that node and sink information which is retrieved through a particular node. node (base station).after connection is established between In our scheme an attacker can get information only about that malicious node and sink node then this node is free to the functions which are stored in that node. but the sets connect with any node in that particular network. In that of values over any function still remains an area which is situation the number of keys in particular node will be hard to crack. Because it is the values which is essential increased such that. for pair wise generation of keys not functions. © 2011 ACEEE 12 DOI: 01.IJNS.02.04.537
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 TABLE I. NODE TO NODE PAIR WISE KEY ESTABLISHMENT A. Methods to improve resilience is also called individual key which is generated between sink node and node. A new implementation is done with pair wise Suppose a situation comes in which a node is captured. After some modification that compromised node is again keys. Functions having point of discontinuity is deployed in same environment. Then in that case it has to introduced with normal functions. We have grouped four establish connection with sink node for further transmis- type of functions, in one group we will deploy functions sion .without successful establishment of individual keys it like f (x) = 1/(1 -x2 ). which is discontinuous at x = + - will not be able to perform its transmission with other (1).When a node want to set up individual keys with sink neighboring nodes. Every node has a unique initialization node with the functions values it can also send values vector(iv) or called id‘s .These id‘s are stored in the base evaluated on this new type discontinuous function. it is station. if any node is deployed after eavesdrop then it has to send its id to base station checks that id with the done on the same way as previous one only a new step is stored value , if it matches then it is able to function as introduced. previously. Otherwise it will be discarded from the Ex:- suppose node (b) is captured after modifications it is network and no transmission line is generated either with again deployed in network. sink node or neighboring nodes. This method will not • Step 1: it has to connect with sink node before normal increase the burden of sink node because nothing stored. functioning. It has to generate pair wise keys using the This topic is more elaborated in next section. deployed functions with special type of discontinuous functions. B. Method to evaluate a malicious node in the network by • Step2 : it has to transmit computational time(Ctm ) and sink node node(id‘s)(Nid ) with values which is calculated over • Transmission between a node and sink node(base particular function say= f (x) = ex/(1 -x2). station) is always a vital transmission in wireless sensor • Step3 : sink node computes the value to find the function networks. Because all the information which is gathered is on which the value is calculated and it stores the transmitted to sink node for further processing. so an computational time. It matches computational time with the additional security is needed with above pair wise keys. It send values. If value matches then node is allowed from © 2011 ACEEE 13 DOI: 01.IJNS.02.04. 537
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 transmission otherwise it is discarded and that node(id) is VII. ACKNOWLEDGMENT transmitted all over the network to all nodes. That particular The author wants to thank Mr. Gaurav Srivastava, Mr. node is not used for carrying data in future use. Nishi Mani and Mr. Amit Kumar for there motivational support throughout this paper. V. ALGORITHM TO CHECK MALICIOUS NODE IN NETWORK Suppose Nodeb is captured by an intruder and some REFERENCES modifications is done. After that these are steps which [1] ( Whitfield Diffie and Martin E. Hellman), New Directions have to be followed by that malicious node before in Cryptography, year 1976 functioning as usual. [2] Laurent Eschenauer and Virgil D. Gligor,A key-management 1: N odeb has to set up pair wise key with sink node using scheme for distributed sensor networks, ACM Conference on discontinuous function. Computer and Communications Security, (year 2002, pages 2: it has to send evaluated values on which computation is 41-47), {http : / / doi . acm . org / 10 . 1145 / 586110 . 586117} , done along with computational time and own nodeid DBLP , http : / / dblp . uni-trier . de 3: after receiving that value sink node will find that func- [3] Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil tion on which evaluation is done. Jajodia, Establishing Pair wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach, 4: Sink node will evaluate same data set on same function (year2003,pages326-335,http : / / csdl . computer . org / comp / and calculate computation time. proceedings / icnp / 2003 / 2024 / 00 / 20240326abs . htm, bib- 5: Sink node will compare computational time which is source = DBLP, http://dblp.uni-trier.de send by malicious node with the time which is calcu- lated [4] Perrig, Adrian and Szewczyk, Robert and Wen, Victor by itself and Culler, David and Tygar, J. D.,SPINS: security 6: if computational time is correct then that node is al- protocols for sensor networks, MobiCom ’01:Proceedings lowed to communicate with network. of the 7th annual international conference on Mo- bile 7: otherwise that particular nodei d is transmitted over computing and networking,year2001,pages = 189–199, http : whole network and that node is discarded from normal / / doi . acm . org / 10 . 1145 / 381677 . 381696 [5] Chang-Won Park and Sung Jin Choi and Hee Yong Youn,A functioning. Noble Key Pre-distribution Scheme with LU Matrix for 8: End. Secure Wireless Sensor Networks, year2005,pages = 494- 499,http : / / dx . doi . org / 10 . 1007 / 11596981 _ 73, VI. CONCLUSIONS [6] Adrian Perrig and Robert Szewczyk and Victor Wen and David E. Culler and J. D. Tygar”, SPINS : security protocols The proposed algorithm is suitable for all type of for sensor networks”, “Mobile Computing and Networking”, network places. The randomness of functions make it pages almost impossible for eavesdropper to predict which “189-199”,year”2001", function is working and corresponding values which are [7] Lee J. and Stinson D.,” Deterministic key pre- used in connection. values and function provide a two way distribution schemes for distributed security. Because for a same function two sets of values sensor networks”, http : are different from each other. After the node capture also / / www . cacr . math . uwaterloo . ca / dstinson / pubs . html, year “2004” node i d and computational time over particular [8] Mary Mathews, Min Song, Sachin Shetty, Rick discontinuous function make aware of malicious node to McKenzie Detecting Compromised Nodes in Wireless Sensor entire network. The future work will revolve around to Networks Eighth ACIS International Conference on Software decrease the time which is used for connection establishment Engineering, Artificial Intelligence, Networking, and Parallel/ and to minimize energy consumption. One technique is Distributed Computing used when the nodes are only active when packets of data [9] Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu A New Key is arriving otherwise rest of time it is in sleep mode this will Establishment Scheme For Wireless Sensor Networks journal save energy. “International Journal of Network Security and Its Applications (IJNSA)”, Vol 1, No 2, July 2009 © 2011 ACEEE 14 DOI: 01.IJNS.02.04. 537