Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two secure and efficient data transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the identitybased digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.

EXISTING SYSTEM: Adding security to LEACH-like protocols is challenging because they dynamically, randomly, and periodically rearrange the network’s clusters and data links. Therefore, providing steady long-lasting node-to-node trust relationships and common key distributions are inadequate for LEACH-like protocols. There are some secure data transmission protocols based on LEACH-like protocols, such as SecLEACH , GS-LEACH, and RLEACH. DISADVANTAGES OF EXISTING SYSTEM:  Symmetric key management suffers from a so-called orphan node problem.  It cannot participate in any cluster, and therefore, has to elect itself as a CH.  Increases the overhead of transmission and system energy consumption by raising the number of CHs.

PROPOSED SYSTEM: We propose two Secure and Efficient data transmission protocols for CWSNs, called SET-IBS and SET-IBOOS. it provide feasibility of the proposed SET-IBS and SET-IBOOS with respect to the security requirements and analysis against routing attacks. SET-IBS and SET-IBOOS are efficient in communication and applying the ID- based cryptosystem, which achieves security requirements in

CWSNs, as well as solved the orphan node problem in the secure transmission protocols with the symmetric key management.

ADVANTAGES OF PROPOSED SYSTEM:  The proposed SET-IBS and SET-IBOOS protocols have better performance than existing secure protocols for CWSNs. With respect to both computation and communication costs, we pointed out the merits that using SET-IBOOS with less auxiliary security overhead is preferred for secure data transmission in CWSNs.  Reduce the computational overhead for security using the IBOOS scheme.

SYSTEM ARCHITECTURE:

SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System

:

Pentium IV 2.4 GHz.

 Hard Disk

:

40 GB.

 Floppy Drive

:

1.44 Mb.

 Monitor

:

15 VGA Colour.

 Mouse

:

Logitech.

 Ram

:

512 Mb.

SOFTWARE REQUIREMENTS:  Operating system :

Windows XP/7/LINUX.

 Implementation

:

NS2

 NS2 Version

:

NS2.2.28

 Front End

:

OTCL

(Object

Oriented

Tool

Command

Language)  Tool

:

Cygwin (To simulate in Windows OS)

REFERENCE: Huang Lu,Jie Li and Mohsen Guizani,“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks”, IEEE TRANSACTIONS, VOL. 25, NO. 3, MARCH 2014.

Secure and Efficient Data Transmission.pdf

Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the system. performance of WSNs. In this paper, we study a secure data ...

221KB Sizes 0 Downloads 267 Views

Recommend Documents

Enabling And Secure Efficient Ranked Keyword Search Over ...
... searchable encryption, order-preserving mapping, confidential data, cloud computing. ✦ ... management, universal data access with independent ..... Enabling And Secure Efficient Ranked Keyword Search Over Outsourced Cloud Data.pdf.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
Abstract—Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be ...

The Implementation of Secure and Efficient Digital ...
A cloud server can make a decision that some digital goods contain specific keywords assigned by the buyer, but can not know any information about the ...

An Efficient and Secure User Revocation Scheme in ...
a set of custom simulations built in Java. In the following, we detail .... fine-grained data access control in cloud computing,” in INFOCOM,. 2010, pp. 534–542.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ...

Design of secure and energy-efficient cooperative video distribution ...
www.ijrit.com. ISSN 2001-5569. Design of secure and energy-efficient cooperative video distribution over wireless networks. 1 Divya J Alapatt, 2 Prof.Gayathri N.

Secure and Efficient Route Discovery by selecting ...
*[email protected]. ** [email protected] ... networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed .... The aim of the message exchange is collect infor

Design of secure and energy-efficient cooperative video distribution ...
In a real-time video broadcast where multiple users are interested in the same content, mobile-to- mobile cooperation can be utilized to improve delivery efficiency and reduce network utilization. Under such cooperation, however, real-time video tran

Efficient Secure Primitive for Privacy Preserving ...
Department of Computer Science and Technology,. University of ... with each other to conduct computations on the union of data they each hold. ... benefits, the hospitals may be unwilling to compromise patients' privacy or vio- late any ... serving h

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
The ABE scheme can be specialised to obtain an IBBE system with constant sized ... product encryption have been omitted due to reasons explained earlier.

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
applications including pay-TV, copyright protection of digital content and encrypted file systems. At a broad level, there are two settings for BE. In symmetric key ...

An efficient secure distributed anonymous routing ...
Available online 30 September 2004. Abstract. An ad hoc wireless network ... communicate with each other without the intervention of any centralized administration or established infrastructure. Due to the limited transmission range ..... neighboring

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

high speed and secure data transmission using ...
in the amount of digital data transmitted via the Internet, representing text .... each word with an approximate signature pattern for the word opposed to an actual.

Secure Perturbations of Data Provenance and ...
Fig.2.System Architecture. The data receiver utilizing an optimal doorstep-based mechanism, which minimizes the probability of provenance decoding errors,.

Compression Scheme for Faster and Secure Data ...
IDBE (Intelligent Dictionary Based Encoding) is used as a pre processing stage so as to improve the compression ratio and the rate of compression. The compression method suggested will greatly reduce the transmission time as well as the bandwidth req

Secure and Scalable Access to Cloud Data in ...
IJRIT International Journal of Research in Information Technology, Volume 3, Issue .... In future, we continue working on storage security and data dynamics with ...

Secure Erase for SSDs Helps Sanitize Data and Boost ... - Media16
Intel IT uses secure erase (see Figure 1) because it is the most effective ... laptops every two to four years. .... EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY ...

Efficient and Effective Similarity Search over Probabilistic Data ...
To define Earth Mover's Distance, a metric distance dij on object domain D must be provided ...... Management of probabilistic data: foundations and challenges.

REX: Resilient and Efficient Data Structure for Tracking ...
Mar 7, 2017 - In [6], researchers demonstrated attacks on the Bro intrusion detection system [7]. When performance degrades, a hash table (increasingly) rejects and thereby stops tracking flows even when there is free space within the data structure.

Efficient data structure for representing and simplifying ...
minimal simplices in the set difference Flag(G) \ K. We call these minimal ... bert [GH97] proposed an elegant way of prioritizing edge contractions for surface ...... ings of the 24th annual conference on Computer graphics and interactive ...

efficient automatic verification of loop and data-flow ...
and transformations that is common in the domain of digital signal pro- cessing and ... check, it generates feedback on the possible locations of errors in the program. ...... statements and for-loops as the only available constructs to specify the.

Localized Delay-bounded and Energy-efficient Data ...
efficient Data Aggregation scheme (DEDA) for wireless sensor and actor ..... to be large with loose delay requirement and high electric unit energy consumption,.

Efficient and Effective Similarity Search over Probabilistic Data Based ...
networks have created a deluge of probabilistic data. While similarity search is an important tool to support the manipulation of probabilistic data, it raises new.