Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

Eswar Publications
Eswar PublicationsEswar Publications

Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the proposed method are more effective than the existing methodologies.

Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3209
Markle Tree Based Authentication Protocol for
Lifetime Enhancement in Wireless Sensor
Networks
Mallikarjunaswamy N J 1
Assistant Professor, S.I.E.T, Tumkur
Research Scholar,
Visvesvaraya Technological University, Belgaum,
mallikarjuna2010@gmail.com
Latha Yadav T R 2
Assistant Professor, A.I.T, Tumkur
Research Scholar,
Visvesvaraya Technological,University, Belgaum,
chethusavi3@gmail.com
Dr. Keshava Prasanna 3
Professor, Dept of CSE,
C.I.T, Gubbi,
Tumkur
keshava2011@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable,
reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic
operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes
more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based
Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a
famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the
proposed method are more effective than the existing methodologies.
Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN).
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. Introduction
Wireless sensor network(WSN) is an Adhoc like
infrastructure less network that work like self organizing,
self healing, autonomous, each and every node cooperate
with each other. sensor nodes are unattended devices
that are severely constrained in terms of processing
power, memory size and energy levels and tradeoff
between security and energy consumption are major
concerns for all application.
Since WSN are resource constrained networks, we
propose a pragmatic approach where we try to balance
these two opposing design elements: security and
energy. We evaluate our proposal achieve more energy
efficient compare to previous.
Code dissemination protocol (eg., MNP[1], MOAP[2],
Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have
been improved recently to propagate code images using
the wireless network created by the wireless nodes.
Originally these proposed protocols generally will not
give any security without using a hash function. In this,
common question raises is that, how we apply hash
function to the piece of data which traverse throughout
the network widely. assume well-behaves (i.e.,non
malicious) sensors of all the reprogramming protocol in
the literature Deluge[6] is the benchmark. Also it has
been included in the tinyOS distributions.
In order to provide authentication to the entire data is
normally based on signature of hash tree. The generating
hash tree signature is of two types, one is by using chain
operation and other is markle tree. To generate hash
chain, each packet gives its hash value to its upstream
packets until to reach end of packet with the signature.
As in markle tree each packet generates its own hash
value independently and produces hash tree with the
signature (top of the node).
In the recent years much progress has been made in the
design of practical one way hashing algorithms which is
efficient for implementation by both hardware and
software. The message digest family which consist of
various algorithms such as MD5, SHA1, and 2AMD
which produces standard output of 128bit, 160bit and
160bit respectively.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3210
Fig 1, States that the previous affairs of message
authentication which deals with the balancing nature
between security and energy. When security increases
along with the energy so challenging task is to provide
high security with the minimum energy.
Fig 1: Previous affairs of message authentication
The main purpose of this research is to produce a
signature at receiver by using partial hash tree
information by the base station and validate the each
packet by using one way hashing algorithm of 160 bit
output to enhance the security and energy consumption.
The proposed paper gives improved version of security
with a less execution/run time at receiver end. The result
shows that proposed scheme provides better security
than the existing one.
This paper is organized as follows: Section II presents
the related work and section III presents the proposed
methodology. Section IV presents the Experimental
analysis. Section V contains the conclusion and future
work.
II. Related Work
Wireless sensor networking is a wide technology to
observe and extract data from the environment and has
an important role in ubiquitous computing. However,
these benefits come with various limitations,
vulnerabilities, and risks.
To distinguish legitimate data from intruder's data,
authentication techniques are frequently used to verify
the integrity of the received data in a communication
system. There are several message authentication
schemes in wireless sensor networks have been
proposed. The authentication techniques used in the
severely constrained wireless sensor network
environments.
Carlos F. et al[7] aims at having a more balanced
solution by being more energy conscious, proposing in
some instances partial but attack aware solutions. More
chance of being adopted in sensor network scenarios
needing security in the reprogramming process. Another
contribution is that can make evident in energy that radio
operations are the most energy consuming operations in
update dissemination.
Ayman Tajeddine et al[8] proposed a different
authentication techniques suitable for the severely
constrained sensor nodes in WSNs, and addressed three
main categories based on symmetric cryptography,
asymmetric cryptography, and hybrid techniques using
both cryptographic methods.
Haider M. AI-Mashhadi et al [9] proposed that the
performance of 2AMD-160 improves in increasing of
security and time consuming without compromising the
security. It is found that the number of message blocks
influences the run time of the hash function while the
increment in message size only slightly increase the run
time.
So, by using the new proposed approach the
performance is evaluated and compared with other
methods under the same test results to demonstrate the
effectiveness of the new approach with regards to
enhancement of the run time and security of message in
wireless sensor network nodes.
Assumptions
1. The Base station is a powerful entity, with unlimited
energy and memory with high frequency range.
2. There is a packet size limit; maximum payload size is
102 bytes.
3. Each sensor node in the network is preconfigured
with the minimum energy and memory.
III. Proposed Methodology
The solution we proposed is the image size is divided
into equal number of pages and each page is subdivided
into equal number of packets.
Apply the hash function for number of packets [10], as
shown in fig 2.
Fig 2. Applying Hash Functions
Generating signature has two types 1) using partial tree
information and 2) using hexadecimal addition.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3211
In case of partial tree information sender sends the
partial information of tree as like h2, h10 and h14.
Using partial information receiver can easily
generate the signature at receiver side.
h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side.
In case of using hexadecimal addition the receiver can
generate the signature as shown below format.
h1+h2=h9
h3+h4=h10
h5+h6=h11
h7+h8=h12
h9+h10=h13
h11+h12=h14
h13+h14=h15  Signature at receiver side
Finally, 160 bit signature is generated. This proposed
approach is more effective compare to previous
approaches. Existing methodologies proposes either
MD5 (which gives output of 120 bits, but 2AMD gives
160 bits) or SHA1 (which gives 80 rounds where as in
2AMD-160 included 64 rounds).
Table 1.key characteristics of 2AMD-160
algorithm[9].
IV. Experimental Analysis
The 2AMD-160 methodology enhances the efficient way
of encrypting the data in secured environment. In order
to encrypt data, SHA1 algorithm uses 0.47 Time/ms to
process only the single space, but the new methodology
2AMD-160 takes 0.2 Time/ms of execution time. So,
2AMD-160 consumes less execution time compared to
the existing methods such as SHA1, SHA256 and
SHA512, which in turn gives the better performance.
Performance Evaluation
In this we evaluate the comparison between chain based
hash tree versus markle tree based hash tree in terms of
packet verification, packet receiving at destination node,
size of the signature in terms of bits.
Table 2. key characteristics of Hash tree.
Hash
tree
Packet
verification
Packets
receive at
destination
Signature
(size)
Chain
based
Dependent Sequential 160 bit
Markle
tree
Independent Random 160 bit
V. Conclusion
The proposed system message authentication enhances
security with light weight hash function at the receiver
node; the default hash tree balances security and
provides independent packet verification with 160bit
signature and authenticates every packet by using
2AMD-160 algorithm. The proposed scheme ensures
that markle tree is more efficient then chain based hash.
The performance evaluation result shows that the
proposed scheme is effective and scalable.
Future work
We are planning to propose new algorithm for better
encryption and decryption method for message
authentication.
References
[1] S. Kulkarni, and L. Wang, “MNP: Multihop network
reprogramming service for sensor networks”,
Proceedings of the 25th IEEE International Conference
on Distributed Computing Systems, Columbus Ohio
USA, pp. 7-16, Jun 2005.
[2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A
remote code update mechanism for wireless sensor
networks", CENS Technical Report 30, University of
California UCLA, 2003.
[3] J. Hui, and D. Culler, “The dynamic behavior of a
data dissemination protocol for network programming at
scale”, Proceedings of the 2nd international conference
on Embedded networked sensor systems, Baltimore MD
USA, pp. 81-94, Nov 2004.
[4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and
W. Chappell, “Energy-efficient on-demand
reprogramming of large-scale sensor networks”, ACM
Transactions on Sensor Network, 4(1):1-38, 2008.
[5] V. Naik, A. Arora, P. Sinha, and H. Zhang,
“Sprinkler: A reliable and energy efficient data
dissemination service for wireless embedded devices”,
Proceedings of the 26th IEEE International Real-Time
Systems Symposium, Miami Florida USA, pp. 277-286,
Dec 2005.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3212
[6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low
overhead wireless reprogramming for sensor networks",
26th IEEE International Conference on Computer
Communications, pp. 928-936, 2007.
[7] Ayman Tajeddine Ayman Kayssi Ali Chehab
Imad Elhajj, ”Authentication Schemes for Wireless
Sensor Networks ”Proceedings of 17th
IEEE
Mediterranean Electro technical Conference, Beirut,
Lebanon, 13-16 April 2014.
[8] Carlos F. Caloca de la Parra, J. Antonio Garcia-
Macias,” A Protocol for Secure and Energy-Aware
Reprogramming in WSN”, Proceedings of 2009
International Conference on wireless communications
and mobile computing connecting the world wirelessly.
[9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq
Rehab F. Hassan ,” Secure and Time Efficient Hash-
based Message Authentication Algorithm for Wireless
Sensor Networks” Proceedings of IEEE,978-1-4799-
5627-2/14, 2014.
[10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional
Broadcasting Authentication Scheme for Wireless
Sensor Networks” Proceedings of IEEE,978-1-5090-
0089-0/15, 2015.
[11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime
enhancement in wireless sensor networks using fuzzy
approach and A-star algorithm," IEEE Sensors J., vol.
12, no. 10, pp. 3010-3018, Oct. 2012.
[12] Trevatha.l., Ghodosi H., and Myers T., "Efficient
batch authentication for hierarchical wireless sensor
networks," in IEEE ISSNIP, pp. 217-222, 2011.
Biographies and Photographs
Mallikarjunswamy received BE from
Visvesvaraya Technological
University and M.Tech in computer
science and engineering in the year
2011 and pursuing Ph.D in VTU.
Teaching and Academic experience of 5 years. Life
membership in Indian Society for Technical Education.
Latha Yadav T R received BE from
Visvesvaraya Technological
University and M.Tech in Digital
Electronics in the year 2013 and
pursuing Ph.D in VTU. Teaching and
Academic experience of 3.5 years.
Dr. KeshavaPrasanna received B.E
from Bangalore University and
M.Tech in Information and
Technology in the year 2005 and Ph.D
from Tumkur University in the year
2014. Teaching and Academic experience of 14 years.
Life membership in Indian Society for Technical
Education (ISTE).

Recomendados

Implementation on Data Security Approach in Dynamic Multi Hop Communication por
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
32 vistas6 diapositivas
“Optimizing the data transmission between multiple nodes during link failure ... por
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
186 vistas3 diapositivas
Elgamal signature for content distribution with network coding por
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
120 vistas6 diapositivas
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY por
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
200 vistas8 diapositivas
A Secure Chaotic Communication System por
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication Systemijsrd.com
496 vistas4 diapositivas
Hf3612861290 por
Hf3612861290Hf3612861290
Hf3612861290IJERA Editor
428 vistas5 diapositivas

Más contenido relacionado

La actualidad más candente

Using Cisco Network Components to Improve NIDPS Performance por
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
125 vistas21 diapositivas
Online stream mining approach for clustering network traffic por
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
124 vistas5 diapositivas
Online stream mining approach for clustering network traffic por
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
295 vistas5 diapositivas
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ... por
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
63 vistas11 diapositivas
A Review on Text Mining in Data Mining por
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Miningijsc
151 vistas8 diapositivas
7 ijcse-01229 por
7 ijcse-012297 ijcse-01229
7 ijcse-01229Shivlal Mewada
109 vistas5 diapositivas

La actualidad más candente(20)

Using Cisco Network Components to Improve NIDPS Performance por csandit
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
csandit125 vistas
Online stream mining approach for clustering network traffic por eSAT Journals
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals124 vistas
Online stream mining approach for clustering network traffic por eSAT Publishing House
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ... por IJCNCJournal
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal63 vistas
A Review on Text Mining in Data Mining por ijsc
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc151 vistas
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus... por ijsrd.com
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
ijsrd.com903 vistas
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N... por IJERA Editor
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor41 vistas
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA... por ijsc
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
ijsc78 vistas
Ttacca por csandit
TtaccaTtacca
Ttacca
csandit435 vistas
Paper id 26201429 por IJRAT
Paper id 26201429Paper id 26201429
Paper id 26201429
IJRAT177 vistas
Prevention of Packet Hiding Methods In Selective Jamming Attack por IJCERT
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
IJCERT111 vistas
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO... por cscpconf
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf61 vistas
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks por IRJET Journal
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
IRJET Journal64 vistas
A review on distributed beam forming techniques an approach in wireless rela... por eSAT Journals
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals116 vistas
Internet Worm Classification and Detection using Data Mining Techniques por iosrjce
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
iosrjce252 vistas

Similar a Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En... por
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
42 vistas4 diapositivas
Enhanced security for non English users of Wireless Sensor Networks por
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
29 vistas4 diapositivas
User Selective Encryption Method for Securing MANETs por
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
12 vistas9 diapositivas
Aps 10june2020 por
Aps 10june2020Aps 10june2020
Aps 10june2020Gopal Mulgund
29 vistas34 diapositivas
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR... por
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
219 vistas23 diapositivas
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH... por
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
157 vistas22 diapositivas

Similar a Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks(20)

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En... por Eswar Publications
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Eswar Publications42 vistas
Enhanced security for non English users of Wireless Sensor Networks por Eswar Publications
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications29 vistas
User Selective Encryption Method for Securing MANETs por IJECEIAES
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES12 vistas
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR... por ijassn
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
ijassn219 vistas
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH... por ijassn
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
ijassn157 vistas
Wireless communication without pre shared secrets using spread spectrum techn... por eSAT Journals
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
eSAT Journals142 vistas
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A... por ijsrd.com
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com1K vistas
Balancing Trade-off between Data Security and Energy Model for Wireless Senso... por IJECEIAES
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
IJECEIAES19 vistas
International Journal of Engineering Research and Development (IJERD) por IJERD Editor
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor797 vistas
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi... por IJTET Journal
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal366 vistas
Energy Proficient and Security Protocol for WSN: A Review por theijes
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes345 vistas
J031101064069 por theijes
J031101064069J031101064069
J031101064069
theijes257 vistas
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ... por IRJET Journal
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
IRJET Journal22 vistas
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio... por IJAAS Team
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team29 vistas
M.Phil Computer Science Network Security Projects por Vijay Karan
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan337 vistas
M phil-computer-science-network-security-projects por Vijay Karan
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan4.2K vistas
M.E Computer Science Network Security Projects por Vijay Karan
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan553 vistas
Tdp.a029a10 por Nithirekha
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
Nithirekha224 vistas
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET por Editor IJCATR
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Editor IJCATR150 vistas

Más de Eswar Publications

Content-Based Image Retrieval Features: A Survey por
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
621 vistas17 diapositivas
Clickjacking Attack: Hijacking User’s Click por
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
240 vistas6 diapositivas
Performance Analysis of Audio and Video Synchronization using Spreaded Code D... por
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
164 vistas7 diapositivas
Android Based Home-Automation using Microcontroller por
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
134 vistas4 diapositivas
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle... por
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
89 vistas7 diapositivas
App for Physiological Seed quality Parameters por
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
102 vistas4 diapositivas

Más de Eswar Publications(20)

Content-Based Image Retrieval Features: A Survey por Eswar Publications
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications621 vistas
Clickjacking Attack: Hijacking User’s Click por Eswar Publications
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications240 vistas
Performance Analysis of Audio and Video Synchronization using Spreaded Code D... por Eswar Publications
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications164 vistas
Android Based Home-Automation using Microcontroller por Eswar Publications
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications134 vistas
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle... por Eswar Publications
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications89 vistas
App for Physiological Seed quality Parameters por Eswar Publications
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications102 vistas
What happens when adaptive video streaming players compete in time-varying ba... por Eswar Publications
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications152 vistas
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System por Eswar Publications
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications77 vistas
Spreading Trade Union Activities through Cyberspace: A Case Study por Eswar Publications
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications88 vistas
Identifying an Appropriate Model for Information Systems Integration in the O... por Eswar Publications
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications118 vistas
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance... por Eswar Publications
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications56 vistas
Bridging Centrality: Identifying Bridging Nodes in Transportation Network por Eswar Publications
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications74 vistas
A Literature Survey on Internet of Things (IoT) por Eswar Publications
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications1.9K vistas
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System por Eswar Publications
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications811 vistas
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model por Eswar Publications
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications48 vistas
Impact of Technology on E-Banking; Cameroon Perspectives por Eswar Publications
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications167 vistas
Classification Algorithms with Attribute Selection: an evaluation study using... por Eswar Publications
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications131 vistas
Mining Frequent Patterns and Associations from the Smart meters using Bayesia... por Eswar Publications
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications126 vistas
Network as a Service Model in Cloud Authentication by HMAC Algorithm por Eswar Publications
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications44 vistas
Explosive Detection Approach by Printed Antennas por Eswar Publications
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications92 vistas

Último

STPI OctaNE CoE Brochure.pdf por
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
14 vistas1 diapositiva
SAP Automation Using Bar Code and FIORI.pdf por
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
23 vistas38 diapositivas
Business Analyst Series 2023 - Week 3 Session 5 por
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
248 vistas20 diapositivas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
127 vistas17 diapositivas
Piloting & Scaling Successfully With Microsoft Viva por
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
12 vistas160 diapositivas
The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 vistas25 diapositivas

Último(20)

STPI OctaNE CoE Brochure.pdf por madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 vistas
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP23 vistas
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10248 vistas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 vistas
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge12 vistas
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Serverless computing with Google Cloud (2023-24) por wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 vistas
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 vistas
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 vistas
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld18 vistas
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 vistas
AMAZON PRODUCT RESEARCH.pdf por JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 vistas

Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3209 Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks Mallikarjunaswamy N J 1 Assistant Professor, S.I.E.T, Tumkur Research Scholar, Visvesvaraya Technological University, Belgaum, mallikarjuna2010@gmail.com Latha Yadav T R 2 Assistant Professor, A.I.T, Tumkur Research Scholar, Visvesvaraya Technological,University, Belgaum, chethusavi3@gmail.com Dr. Keshava Prasanna 3 Professor, Dept of CSE, C.I.T, Gubbi, Tumkur keshava2011@rediffmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the proposed method are more effective than the existing methodologies. Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN). -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. Introduction Wireless sensor network(WSN) is an Adhoc like infrastructure less network that work like self organizing, self healing, autonomous, each and every node cooperate with each other. sensor nodes are unattended devices that are severely constrained in terms of processing power, memory size and energy levels and tradeoff between security and energy consumption are major concerns for all application. Since WSN are resource constrained networks, we propose a pragmatic approach where we try to balance these two opposing design elements: security and energy. We evaluate our proposal achieve more energy efficient compare to previous. Code dissemination protocol (eg., MNP[1], MOAP[2], Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have been improved recently to propagate code images using the wireless network created by the wireless nodes. Originally these proposed protocols generally will not give any security without using a hash function. In this, common question raises is that, how we apply hash function to the piece of data which traverse throughout the network widely. assume well-behaves (i.e.,non malicious) sensors of all the reprogramming protocol in the literature Deluge[6] is the benchmark. Also it has been included in the tinyOS distributions. In order to provide authentication to the entire data is normally based on signature of hash tree. The generating hash tree signature is of two types, one is by using chain operation and other is markle tree. To generate hash chain, each packet gives its hash value to its upstream packets until to reach end of packet with the signature. As in markle tree each packet generates its own hash value independently and produces hash tree with the signature (top of the node). In the recent years much progress has been made in the design of practical one way hashing algorithms which is efficient for implementation by both hardware and software. The message digest family which consist of various algorithms such as MD5, SHA1, and 2AMD which produces standard output of 128bit, 160bit and 160bit respectively.
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3210 Fig 1, States that the previous affairs of message authentication which deals with the balancing nature between security and energy. When security increases along with the energy so challenging task is to provide high security with the minimum energy. Fig 1: Previous affairs of message authentication The main purpose of this research is to produce a signature at receiver by using partial hash tree information by the base station and validate the each packet by using one way hashing algorithm of 160 bit output to enhance the security and energy consumption. The proposed paper gives improved version of security with a less execution/run time at receiver end. The result shows that proposed scheme provides better security than the existing one. This paper is organized as follows: Section II presents the related work and section III presents the proposed methodology. Section IV presents the Experimental analysis. Section V contains the conclusion and future work. II. Related Work Wireless sensor networking is a wide technology to observe and extract data from the environment and has an important role in ubiquitous computing. However, these benefits come with various limitations, vulnerabilities, and risks. To distinguish legitimate data from intruder's data, authentication techniques are frequently used to verify the integrity of the received data in a communication system. There are several message authentication schemes in wireless sensor networks have been proposed. The authentication techniques used in the severely constrained wireless sensor network environments. Carlos F. et al[7] aims at having a more balanced solution by being more energy conscious, proposing in some instances partial but attack aware solutions. More chance of being adopted in sensor network scenarios needing security in the reprogramming process. Another contribution is that can make evident in energy that radio operations are the most energy consuming operations in update dissemination. Ayman Tajeddine et al[8] proposed a different authentication techniques suitable for the severely constrained sensor nodes in WSNs, and addressed three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. Haider M. AI-Mashhadi et al [9] proposed that the performance of 2AMD-160 improves in increasing of security and time consuming without compromising the security. It is found that the number of message blocks influences the run time of the hash function while the increment in message size only slightly increase the run time. So, by using the new proposed approach the performance is evaluated and compared with other methods under the same test results to demonstrate the effectiveness of the new approach with regards to enhancement of the run time and security of message in wireless sensor network nodes. Assumptions 1. The Base station is a powerful entity, with unlimited energy and memory with high frequency range. 2. There is a packet size limit; maximum payload size is 102 bytes. 3. Each sensor node in the network is preconfigured with the minimum energy and memory. III. Proposed Methodology The solution we proposed is the image size is divided into equal number of pages and each page is subdivided into equal number of packets. Apply the hash function for number of packets [10], as shown in fig 2. Fig 2. Applying Hash Functions Generating signature has two types 1) using partial tree information and 2) using hexadecimal addition.
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3211 In case of partial tree information sender sends the partial information of tree as like h2, h10 and h14. Using partial information receiver can easily generate the signature at receiver side. h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side. In case of using hexadecimal addition the receiver can generate the signature as shown below format. h1+h2=h9 h3+h4=h10 h5+h6=h11 h7+h8=h12 h9+h10=h13 h11+h12=h14 h13+h14=h15  Signature at receiver side Finally, 160 bit signature is generated. This proposed approach is more effective compare to previous approaches. Existing methodologies proposes either MD5 (which gives output of 120 bits, but 2AMD gives 160 bits) or SHA1 (which gives 80 rounds where as in 2AMD-160 included 64 rounds). Table 1.key characteristics of 2AMD-160 algorithm[9]. IV. Experimental Analysis The 2AMD-160 methodology enhances the efficient way of encrypting the data in secured environment. In order to encrypt data, SHA1 algorithm uses 0.47 Time/ms to process only the single space, but the new methodology 2AMD-160 takes 0.2 Time/ms of execution time. So, 2AMD-160 consumes less execution time compared to the existing methods such as SHA1, SHA256 and SHA512, which in turn gives the better performance. Performance Evaluation In this we evaluate the comparison between chain based hash tree versus markle tree based hash tree in terms of packet verification, packet receiving at destination node, size of the signature in terms of bits. Table 2. key characteristics of Hash tree. Hash tree Packet verification Packets receive at destination Signature (size) Chain based Dependent Sequential 160 bit Markle tree Independent Random 160 bit V. Conclusion The proposed system message authentication enhances security with light weight hash function at the receiver node; the default hash tree balances security and provides independent packet verification with 160bit signature and authenticates every packet by using 2AMD-160 algorithm. The proposed scheme ensures that markle tree is more efficient then chain based hash. The performance evaluation result shows that the proposed scheme is effective and scalable. Future work We are planning to propose new algorithm for better encryption and decryption method for message authentication. References [1] S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005. [2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003. [3] J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004. [4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008. [5] V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3212 [6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007. [7] Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014. [8] Carlos F. Caloca de la Parra, J. Antonio Garcia- Macias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly. [9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hash- based Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-4799- 5627-2/14, 2014. [10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks” Proceedings of IEEE,978-1-5090- 0089-0/15, 2015. [11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012. [12] Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011. Biographies and Photographs Mallikarjunswamy received BE from Visvesvaraya Technological University and M.Tech in computer science and engineering in the year 2011 and pursuing Ph.D in VTU. Teaching and Academic experience of 5 years. Life membership in Indian Society for Technical Education. Latha Yadav T R received BE from Visvesvaraya Technological University and M.Tech in Digital Electronics in the year 2013 and pursuing Ph.D in VTU. Teaching and Academic experience of 3.5 years. Dr. KeshavaPrasanna received B.E from Bangalore University and M.Tech in Information and Technology in the year 2005 and Ph.D from Tumkur University in the year 2014. Teaching and Academic experience of 14 years. Life membership in Indian Society for Technical Education (ISTE).