SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3209
Markle Tree Based Authentication Protocol for
Lifetime Enhancement in Wireless Sensor
Networks
Mallikarjunaswamy N J 1
Assistant Professor, S.I.E.T, Tumkur
Research Scholar,
Visvesvaraya Technological University, Belgaum,
mallikarjuna2010@gmail.com
Latha Yadav T R 2
Assistant Professor, A.I.T, Tumkur
Research Scholar,
Visvesvaraya Technological,University, Belgaum,
chethusavi3@gmail.com
Dr. Keshava Prasanna 3
Professor, Dept of CSE,
C.I.T, Gubbi,
Tumkur
keshava2011@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable,
reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic
operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes
more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based
Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a
famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the
proposed method are more effective than the existing methodologies.
Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN).
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. Introduction
Wireless sensor network(WSN) is an Adhoc like
infrastructure less network that work like self organizing,
self healing, autonomous, each and every node cooperate
with each other. sensor nodes are unattended devices
that are severely constrained in terms of processing
power, memory size and energy levels and tradeoff
between security and energy consumption are major
concerns for all application.
Since WSN are resource constrained networks, we
propose a pragmatic approach where we try to balance
these two opposing design elements: security and
energy. We evaluate our proposal achieve more energy
efficient compare to previous.
Code dissemination protocol (eg., MNP[1], MOAP[2],
Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have
been improved recently to propagate code images using
the wireless network created by the wireless nodes.
Originally these proposed protocols generally will not
give any security without using a hash function. In this,
common question raises is that, how we apply hash
function to the piece of data which traverse throughout
the network widely. assume well-behaves (i.e.,non
malicious) sensors of all the reprogramming protocol in
the literature Deluge[6] is the benchmark. Also it has
been included in the tinyOS distributions.
In order to provide authentication to the entire data is
normally based on signature of hash tree. The generating
hash tree signature is of two types, one is by using chain
operation and other is markle tree. To generate hash
chain, each packet gives its hash value to its upstream
packets until to reach end of packet with the signature.
As in markle tree each packet generates its own hash
value independently and produces hash tree with the
signature (top of the node).
In the recent years much progress has been made in the
design of practical one way hashing algorithms which is
efficient for implementation by both hardware and
software. The message digest family which consist of
various algorithms such as MD5, SHA1, and 2AMD
which produces standard output of 128bit, 160bit and
160bit respectively.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3210
Fig 1, States that the previous affairs of message
authentication which deals with the balancing nature
between security and energy. When security increases
along with the energy so challenging task is to provide
high security with the minimum energy.
Fig 1: Previous affairs of message authentication
The main purpose of this research is to produce a
signature at receiver by using partial hash tree
information by the base station and validate the each
packet by using one way hashing algorithm of 160 bit
output to enhance the security and energy consumption.
The proposed paper gives improved version of security
with a less execution/run time at receiver end. The result
shows that proposed scheme provides better security
than the existing one.
This paper is organized as follows: Section II presents
the related work and section III presents the proposed
methodology. Section IV presents the Experimental
analysis. Section V contains the conclusion and future
work.
II. Related Work
Wireless sensor networking is a wide technology to
observe and extract data from the environment and has
an important role in ubiquitous computing. However,
these benefits come with various limitations,
vulnerabilities, and risks.
To distinguish legitimate data from intruder's data,
authentication techniques are frequently used to verify
the integrity of the received data in a communication
system. There are several message authentication
schemes in wireless sensor networks have been
proposed. The authentication techniques used in the
severely constrained wireless sensor network
environments.
Carlos F. et al[7] aims at having a more balanced
solution by being more energy conscious, proposing in
some instances partial but attack aware solutions. More
chance of being adopted in sensor network scenarios
needing security in the reprogramming process. Another
contribution is that can make evident in energy that radio
operations are the most energy consuming operations in
update dissemination.
Ayman Tajeddine et al[8] proposed a different
authentication techniques suitable for the severely
constrained sensor nodes in WSNs, and addressed three
main categories based on symmetric cryptography,
asymmetric cryptography, and hybrid techniques using
both cryptographic methods.
Haider M. AI-Mashhadi et al [9] proposed that the
performance of 2AMD-160 improves in increasing of
security and time consuming without compromising the
security. It is found that the number of message blocks
influences the run time of the hash function while the
increment in message size only slightly increase the run
time.
So, by using the new proposed approach the
performance is evaluated and compared with other
methods under the same test results to demonstrate the
effectiveness of the new approach with regards to
enhancement of the run time and security of message in
wireless sensor network nodes.
Assumptions
1. The Base station is a powerful entity, with unlimited
energy and memory with high frequency range.
2. There is a packet size limit; maximum payload size is
102 bytes.
3. Each sensor node in the network is preconfigured
with the minimum energy and memory.
III. Proposed Methodology
The solution we proposed is the image size is divided
into equal number of pages and each page is subdivided
into equal number of packets.
Apply the hash function for number of packets [10], as
shown in fig 2.
Fig 2. Applying Hash Functions
Generating signature has two types 1) using partial tree
information and 2) using hexadecimal addition.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3211
In case of partial tree information sender sends the
partial information of tree as like h2, h10 and h14.
Using partial information receiver can easily
generate the signature at receiver side.
h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side.
In case of using hexadecimal addition the receiver can
generate the signature as shown below format.
h1+h2=h9
h3+h4=h10
h5+h6=h11
h7+h8=h12
h9+h10=h13
h11+h12=h14
h13+h14=h15  Signature at receiver side
Finally, 160 bit signature is generated. This proposed
approach is more effective compare to previous
approaches. Existing methodologies proposes either
MD5 (which gives output of 120 bits, but 2AMD gives
160 bits) or SHA1 (which gives 80 rounds where as in
2AMD-160 included 64 rounds).
Table 1.key characteristics of 2AMD-160
algorithm[9].
IV. Experimental Analysis
The 2AMD-160 methodology enhances the efficient way
of encrypting the data in secured environment. In order
to encrypt data, SHA1 algorithm uses 0.47 Time/ms to
process only the single space, but the new methodology
2AMD-160 takes 0.2 Time/ms of execution time. So,
2AMD-160 consumes less execution time compared to
the existing methods such as SHA1, SHA256 and
SHA512, which in turn gives the better performance.
Performance Evaluation
In this we evaluate the comparison between chain based
hash tree versus markle tree based hash tree in terms of
packet verification, packet receiving at destination node,
size of the signature in terms of bits.
Table 2. key characteristics of Hash tree.
Hash
tree
Packet
verification
Packets
receive at
destination
Signature
(size)
Chain
based
Dependent Sequential 160 bit
Markle
tree
Independent Random 160 bit
V. Conclusion
The proposed system message authentication enhances
security with light weight hash function at the receiver
node; the default hash tree balances security and
provides independent packet verification with 160bit
signature and authenticates every packet by using
2AMD-160 algorithm. The proposed scheme ensures
that markle tree is more efficient then chain based hash.
The performance evaluation result shows that the
proposed scheme is effective and scalable.
Future work
We are planning to propose new algorithm for better
encryption and decryption method for message
authentication.
References
[1] S. Kulkarni, and L. Wang, “MNP: Multihop network
reprogramming service for sensor networks”,
Proceedings of the 25th IEEE International Conference
on Distributed Computing Systems, Columbus Ohio
USA, pp. 7-16, Jun 2005.
[2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A
remote code update mechanism for wireless sensor
networks", CENS Technical Report 30, University of
California UCLA, 2003.
[3] J. Hui, and D. Culler, “The dynamic behavior of a
data dissemination protocol for network programming at
scale”, Proceedings of the 2nd international conference
on Embedded networked sensor systems, Baltimore MD
USA, pp. 81-94, Nov 2004.
[4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and
W. Chappell, “Energy-efficient on-demand
reprogramming of large-scale sensor networks”, ACM
Transactions on Sensor Network, 4(1):1-38, 2008.
[5] V. Naik, A. Arora, P. Sinha, and H. Zhang,
“Sprinkler: A reliable and energy efficient data
dissemination service for wireless embedded devices”,
Proceedings of the 26th IEEE International Real-Time
Systems Symposium, Miami Florida USA, pp. 277-286,
Dec 2005.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290
3212
[6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low
overhead wireless reprogramming for sensor networks",
26th IEEE International Conference on Computer
Communications, pp. 928-936, 2007.
[7] Ayman Tajeddine Ayman Kayssi Ali Chehab
Imad Elhajj, ”Authentication Schemes for Wireless
Sensor Networks ”Proceedings of 17th
IEEE
Mediterranean Electro technical Conference, Beirut,
Lebanon, 13-16 April 2014.
[8] Carlos F. Caloca de la Parra, J. Antonio Garcia-
Macias,” A Protocol for Secure and Energy-Aware
Reprogramming in WSN”, Proceedings of 2009
International Conference on wireless communications
and mobile computing connecting the world wirelessly.
[9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq
Rehab F. Hassan ,” Secure and Time Efficient Hash-
based Message Authentication Algorithm for Wireless
Sensor Networks” Proceedings of IEEE,978-1-4799-
5627-2/14, 2014.
[10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional
Broadcasting Authentication Scheme for Wireless
Sensor Networks” Proceedings of IEEE,978-1-5090-
0089-0/15, 2015.
[11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime
enhancement in wireless sensor networks using fuzzy
approach and A-star algorithm," IEEE Sensors J., vol.
12, no. 10, pp. 3010-3018, Oct. 2012.
[12] Trevatha.l., Ghodosi H., and Myers T., "Efficient
batch authentication for hierarchical wireless sensor
networks," in IEEE ISSNIP, pp. 217-222, 2011.
Biographies and Photographs
Mallikarjunswamy received BE from
Visvesvaraya Technological
University and M.Tech in computer
science and engineering in the year
2011 and pursuing Ph.D in VTU.
Teaching and Academic experience of 5 years. Life
membership in Indian Society for Technical Education.
Latha Yadav T R received BE from
Visvesvaraya Technological
University and M.Tech in Digital
Electronics in the year 2013 and
pursuing Ph.D in VTU. Teaching and
Academic experience of 3.5 years.
Dr. KeshavaPrasanna received B.E
from Bangalore University and
M.Tech in Information and
Technology in the year 2005 and Ph.D
from Tumkur University in the year
2014. Teaching and Academic experience of 14 years.
Life membership in Indian Society for Technical
Education (ISTE).
Ad

More Related Content

What's hot (20)

Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
csandit
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Publishing House
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc
 
7 ijcse-01229
7 ijcse-012297 ijcse-01229
7 ijcse-01229
Shivlal Mewada
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
ijsrd.com
 
E017422935
E017422935E017422935
E017422935
IOSR Journals
 
Ee4301798802
Ee4301798802Ee4301798802
Ee4301798802
IJERA Editor
 
AWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPERAWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPER
Chandrasekar Hariharan
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
ijsc
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
IJERA Editor
 
Ttacca
TtaccaTtacca
Ttacca
csandit
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
IJRAT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
IJCERT
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
IRJET Journal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
iosrjce
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
csandit
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Publishing House
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
ijsrd.com
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
ijsc
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
IJRAT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
IJCERT
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
IRJET Journal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
iosrjce
 

Similar to Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks (20)

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Eswar Publications
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
Gopal Mulgund
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
ijassn
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
ijassn
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
eSAT Journals
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
IRJET Journal
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
Nithirekha
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Editor IJCATR
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Eswar Publications
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
ijassn
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
ijassn
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
eSAT Journals
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
IRJET Journal
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Editor IJCATR
 
Ad

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 
Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 
Ad

Recently uploaded (20)

An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 

Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3209 Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks Mallikarjunaswamy N J 1 Assistant Professor, S.I.E.T, Tumkur Research Scholar, Visvesvaraya Technological University, Belgaum, mallikarjuna2010@gmail.com Latha Yadav T R 2 Assistant Professor, A.I.T, Tumkur Research Scholar, Visvesvaraya Technological,University, Belgaum, chethusavi3@gmail.com Dr. Keshava Prasanna 3 Professor, Dept of CSE, C.I.T, Gubbi, Tumkur keshava2011@rediffmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the proposed method are more effective than the existing methodologies. Keywords – Authentication, Cryptography, Hash function, Security, Wireless Sensor Networks (WSN). -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: March 07, 2017 Date of Acceptance: March 15, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. Introduction Wireless sensor network(WSN) is an Adhoc like infrastructure less network that work like self organizing, self healing, autonomous, each and every node cooperate with each other. sensor nodes are unattended devices that are severely constrained in terms of processing power, memory size and energy levels and tradeoff between security and energy consumption are major concerns for all application. Since WSN are resource constrained networks, we propose a pragmatic approach where we try to balance these two opposing design elements: security and energy. We evaluate our proposal achieve more energy efficient compare to previous. Code dissemination protocol (eg., MNP[1], MOAP[2], Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have been improved recently to propagate code images using the wireless network created by the wireless nodes. Originally these proposed protocols generally will not give any security without using a hash function. In this, common question raises is that, how we apply hash function to the piece of data which traverse throughout the network widely. assume well-behaves (i.e.,non malicious) sensors of all the reprogramming protocol in the literature Deluge[6] is the benchmark. Also it has been included in the tinyOS distributions. In order to provide authentication to the entire data is normally based on signature of hash tree. The generating hash tree signature is of two types, one is by using chain operation and other is markle tree. To generate hash chain, each packet gives its hash value to its upstream packets until to reach end of packet with the signature. As in markle tree each packet generates its own hash value independently and produces hash tree with the signature (top of the node). In the recent years much progress has been made in the design of practical one way hashing algorithms which is efficient for implementation by both hardware and software. The message digest family which consist of various algorithms such as MD5, SHA1, and 2AMD which produces standard output of 128bit, 160bit and 160bit respectively.
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3210 Fig 1, States that the previous affairs of message authentication which deals with the balancing nature between security and energy. When security increases along with the energy so challenging task is to provide high security with the minimum energy. Fig 1: Previous affairs of message authentication The main purpose of this research is to produce a signature at receiver by using partial hash tree information by the base station and validate the each packet by using one way hashing algorithm of 160 bit output to enhance the security and energy consumption. The proposed paper gives improved version of security with a less execution/run time at receiver end. The result shows that proposed scheme provides better security than the existing one. This paper is organized as follows: Section II presents the related work and section III presents the proposed methodology. Section IV presents the Experimental analysis. Section V contains the conclusion and future work. II. Related Work Wireless sensor networking is a wide technology to observe and extract data from the environment and has an important role in ubiquitous computing. However, these benefits come with various limitations, vulnerabilities, and risks. To distinguish legitimate data from intruder's data, authentication techniques are frequently used to verify the integrity of the received data in a communication system. There are several message authentication schemes in wireless sensor networks have been proposed. The authentication techniques used in the severely constrained wireless sensor network environments. Carlos F. et al[7] aims at having a more balanced solution by being more energy conscious, proposing in some instances partial but attack aware solutions. More chance of being adopted in sensor network scenarios needing security in the reprogramming process. Another contribution is that can make evident in energy that radio operations are the most energy consuming operations in update dissemination. Ayman Tajeddine et al[8] proposed a different authentication techniques suitable for the severely constrained sensor nodes in WSNs, and addressed three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. Haider M. AI-Mashhadi et al [9] proposed that the performance of 2AMD-160 improves in increasing of security and time consuming without compromising the security. It is found that the number of message blocks influences the run time of the hash function while the increment in message size only slightly increase the run time. So, by using the new proposed approach the performance is evaluated and compared with other methods under the same test results to demonstrate the effectiveness of the new approach with regards to enhancement of the run time and security of message in wireless sensor network nodes. Assumptions 1. The Base station is a powerful entity, with unlimited energy and memory with high frequency range. 2. There is a packet size limit; maximum payload size is 102 bytes. 3. Each sensor node in the network is preconfigured with the minimum energy and memory. III. Proposed Methodology The solution we proposed is the image size is divided into equal number of pages and each page is subdivided into equal number of packets. Apply the hash function for number of packets [10], as shown in fig 2. Fig 2. Applying Hash Functions Generating signature has two types 1) using partial tree information and 2) using hexadecimal addition.
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3211 In case of partial tree information sender sends the partial information of tree as like h2, h10 and h14. Using partial information receiver can easily generate the signature at receiver side. h(h(h(h(P1)||h2)||h10)||h14)  Signature at receiver side. In case of using hexadecimal addition the receiver can generate the signature as shown below format. h1+h2=h9 h3+h4=h10 h5+h6=h11 h7+h8=h12 h9+h10=h13 h11+h12=h14 h13+h14=h15  Signature at receiver side Finally, 160 bit signature is generated. This proposed approach is more effective compare to previous approaches. Existing methodologies proposes either MD5 (which gives output of 120 bits, but 2AMD gives 160 bits) or SHA1 (which gives 80 rounds where as in 2AMD-160 included 64 rounds). Table 1.key characteristics of 2AMD-160 algorithm[9]. IV. Experimental Analysis The 2AMD-160 methodology enhances the efficient way of encrypting the data in secured environment. In order to encrypt data, SHA1 algorithm uses 0.47 Time/ms to process only the single space, but the new methodology 2AMD-160 takes 0.2 Time/ms of execution time. So, 2AMD-160 consumes less execution time compared to the existing methods such as SHA1, SHA256 and SHA512, which in turn gives the better performance. Performance Evaluation In this we evaluate the comparison between chain based hash tree versus markle tree based hash tree in terms of packet verification, packet receiving at destination node, size of the signature in terms of bits. Table 2. key characteristics of Hash tree. Hash tree Packet verification Packets receive at destination Signature (size) Chain based Dependent Sequential 160 bit Markle tree Independent Random 160 bit V. Conclusion The proposed system message authentication enhances security with light weight hash function at the receiver node; the default hash tree balances security and provides independent packet verification with 160bit signature and authenticates every packet by using 2AMD-160 algorithm. The proposed scheme ensures that markle tree is more efficient then chain based hash. The performance evaluation result shows that the proposed scheme is effective and scalable. Future work We are planning to propose new algorithm for better encryption and decryption method for message authentication. References [1] S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005. [2] T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003. [3] J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004. [4] M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008. [5] V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3209-3212 (2017) ISSN: 0975-0290 3212 [6] R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007. [7] Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014. [8] Carlos F. Caloca de la Parra, J. Antonio Garcia- Macias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly. [9] Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hash- based Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-4799- 5627-2/14, 2014. [10] Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks” Proceedings of IEEE,978-1-5090- 0089-0/15, 2015. [11] I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012. [12] Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011. Biographies and Photographs Mallikarjunswamy received BE from Visvesvaraya Technological University and M.Tech in computer science and engineering in the year 2011 and pursuing Ph.D in VTU. Teaching and Academic experience of 5 years. Life membership in Indian Society for Technical Education. Latha Yadav T R received BE from Visvesvaraya Technological University and M.Tech in Digital Electronics in the year 2013 and pursuing Ph.D in VTU. Teaching and Academic experience of 3.5 years. Dr. KeshavaPrasanna received B.E from Bangalore University and M.Tech in Information and Technology in the year 2005 and Ph.D from Tumkur University in the year 2014. Teaching and Academic experience of 14 years. Life membership in Indian Society for Technical Education (ISTE).
  翻译: