Kumaraguru College of Technology, Coimbatore, India. Abstract

Size: px
Start display at page:

Download "Kumaraguru College of Technology, Coimbatore, India. Abstract"

Transcription

1 Volume 116 No , ISSN: (printed version); ISSN: (on-line version) url: doi: /ijpam.v116i11.12 IMPLEMENTATION OF DATA GATHERING SYSTEM USING MOBILE RELAY NODE IN WIRELESS SENSOR NETWORK ijpam.eu M.Mathankumar 1, T.Viswanathan 2 and T.Dineshkumar 3 1,2,3 Assistant Professor, Department of EEE, Kumaraguru College of Technology, Coimbatore, India 1 mathankumarbit@gmail.com, 2 viswanathan@live.com, 3 dinesh161190@gmail.com Abstract Wireless Sensor Networks (WSN) are infrastructure-less network to monitor and share the physical conditions in the environment. There is a growing need for securing the data sharing in WSN. Because it is vulnerable to access unauthorized. In this paper, data sharing is secured by context based cryptographic algorithm which is not only depends on secret key but also depends on context which is set by the sender. To collect secured data from the sensor nodes, Mobile Relay Node (MRN) is used. It is a mobile device which roams around the network for data gathering using Wireless Personal Area Network (WPAN). The sensor nodes and data center are developed using ARM LPC2148 Processor and Mobile Relay Node (MRN) is developed using PIC16F877A microcontroller. To evade the illicit access of the data, context based cryptographic algorithm is developed and loaded into the ARM based sensor nodes and data center. Index Terms Wireless Sensor Network, Mobile Relay Node, Wireless Personal Area Network, ARM LPC2148, PIC16F877A, Cryptography. 1. Introduction Wireless Sensor Network is a group of Sensor Nodes (SN) which can sense, process and transmit information to other SN through relay nodes. The self organizing sensor nodes uses radio signal for communication [1]. In the existing systems, the communication among SN and the Data Center (DC) is established using router. There is variety of routing methods used between SN and the DC. If the router fails, there will be a loss of 111

2 data. Instead of router, relay nodes are used among the SN and the DC. For this several placement algorithms are needed to place the relay node to cover all the sensor nodes in the network. If the relay nodes are not placed correctly they can connect only partial sensor network [2]. To overcome these relay node issues, mobile relay nodes are used. MRN is a mobile device which moves throughout the WSN and collects the information from various sensor nodes placed in different locations by sending the request. It involves point to point communication, improves the packet delivery ratio and life time of the nodes [3] [4] [5]. In wireless communication, there is no assurance that the message is transmitted securely. There is a chance of hacking during the communication. The increasing demand for security in communication between the nodes results in the requirement of several cryptographic algorithms and secret keys [6]. The goal of this paper is to provide enhanced security in WSN. For that context based cryptographic algorithm is used in the sensor node. SN encrypts the data using context based encryption which is not only based on secret keys but it also based on contexts which is set by the sender corresponding to receiver s context [7] [8]. Here, the receiver must satisfy those contexts then only they are able to decrypt. Other encryption algorithms have the drawback of brute force attack. 2. Proposed System A. Process Description Figure 1 shows the secured data communication from sensor node to data center through mobile relay node. Initially, SN encrypts the sensed data using context based encryption 112

3 algorithm and it searches the nearby MRN using WPAN. When MRN receives the search signal, it transmits transmission command. Thereby SN transmits encrypted data to MRN. After receiving the data MRN will send acknowledgement to SN and transmits encrypted data to data center. Finally, data center decrypts using context based decryption algorithm, and then it stores in the memory and monitors the received data [11]. B. Context Based Encryption Algorithm Initially, secret key (K1) and contexts (constraints or rules) are selected and two files are created. In file 1, Rules and facts are concatenated and stored. Where, the rule specifies the contexts and fact specifies the key generation algorithm. In file 2, original information (sensed data) is stored. XOR operation is performed between both files to create cipher text(c*). File 1 is encrypted with secret key (K1) to create cipher text C1 then it is encrypted with secret key (K2) using DES encryption to create cipher text C2. Final cipher text C is formed by concatenating C1 and C2. Cipher text C is transmitted to MRN and it is forwarded to data center. This algorithm overcomes the problem of brute force attack by providing some threshold for the number of failed decryptions [11]. SN Sensor Node, MRN Mobile Relay Node Fig. 1. Proposed Wireless Sensor Network C. Context Based Decryption Algorithm 113

4 The data center receives the encrypted data from MRN and decrypts the data using context based decryption algorithm. From the received cipher text C, first cipher text C1 is extracted and decrypted with secret key (K1). From this file 1 is obtained and then the rules and facts are extracted. Afterward rules and facts make a decision whether receiver satisfies the context or not. If the receiver satisfies the context, then second key is generated by specified key generation algorithm. Using the second key cipher text C2 is decrypted to provide original information. If the receiver does not satisfy the context, then error message is displayed [11]. 3. Hardware implementation The proposed system consists of three nodes namely sensor node, mobile relay node and data center. Here, sensor node is used to sense the environment and encrypt the data. MRN is used to collect the data from sensor nodes. Data Center is used to decrypt the encrypted data and monitoring. A. Sensor Node Sensor Node consists of ARM LPC2148 processor, zigbee, temperature sensor, amplifier, LCD display, buzzer and RS232. Here the sensor (temperature sensor) is connected to ARM through amplifier and zigbee is connected to UART of ARM through RS232. Initially temperature sensor senses the environment, then amplifies the sensed signal and gives it to processor. The processor converts the received analog signal into the digital signal then encrypts the information using context based encryption algorithm and displays the encrypted information in the LCD display connected to it. The encrypted information is transmitted through zigbee. Buzzer is provided for failed 114

5 decryption notification. The block diagram of sensor node is represented in figure 5. Hardware setup for this node is shown in figure 6. Fig. 2. Block diagram of Sensor Node. Fig. 3. Sensor Node with encrypted information B. Mobile Relay Node MRN consists of PIC16F877A Microcontroller, Moving robot, zigbee, LCD display and RS232. Here zigbee is connected to USART of PIC microcontroller through RS232. The MRN receives the encrypted information from sensor node through zigbee. Moving robot allows the relay node to roam throughout the network. The data received and transmitted notifications are indicated in the LCD Display. The MRN forwards the received information to data center through zigbee. The diagrammatic representation of MRN is shown in figure 7. Hardware setup for this node is shown in figure

6 Fig. 4. Mobile Relay Node Fig. 5. C. Data Center Hardware setup for Mobile Relay Node Data center consists of ARM processor, zigbee, LCD display, keypad and RS232. Here, data are received through zigbee which is connected to ARM processor through RS232. Decryption is performed in the ARM processor using context based decryption algorithm where decryption key is entered through keypad connected to ARM. The decrypted information is stored in the database and displayed in LCD display. The block diagram of data center is shown in figure 9. Hardware setup for this node is shown in figure 10. Fig. 6. Block diagram of Data center 116

7 4. Conclusion Fig. 7. Data Center with decrypted information Thus, the context based cryptographic algorithm and mobile data gathering functions are successfully implemented in both the software and hardware. Using NetBeans IDE simulator, context based cryptographic algorithm was simulated successfully. In this system, ARM LPC2148 is used as sensing node as well as monitoring node for providing enhanced security and PIC16F877A is used as mobile relay node for easy mobility and cost effective purposes. Using this system data sharing is secured and authentication is improved by overcoming brute force attack, man in the middle attack etc. It also reduces the memory requirement and communication delay. References [1] M.Preethi, M.Mathankumar and N.Sugandhi Elucidation of Effectual and Immune Multipath Routing With Multilevel Data Aggregation in Wireless Sensor Networks International Journal of Applied Engineering Research, Vol. 10 No.20, [2] Jorge Mena, Vana Kalogeraki Dynamic Relay Node Placement in Wireless Sensor Networks International Symposium on Applications and the Internet, [3] Weimin Wen et al. Energy Efficient Data Collection Scheme in Mobile Wireless Sensor Networks 31st International 117

8 Conference on Advanced Information Networking and Applications Workshops (WAINA), [4] Songtao Guo1, Cong Wang2, and Yuanyuan Yang2 Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks IEEE Transactions on Mobile Computing, [5] Hu Yin and Yunfei Lv A Proposal of Sensor Data Collection System Using Mobile Relay Nodes International Conference on Information Security and Intelligence Control (ISIC), [6] C. Mohanraj et al. Design and development of secret session key generation using embedded crypto device ARM- LPC2148, Journal of Artificial Intelligence, vol. 6 (2), [7] Chinmoy Mukherjee, Mehak Soni and Rajarathnam Nallusamy A context based cryptographic content sharing system International Conference on Advances in Computing, Communications and Informatics (ICACCI),

9 119

10 120

Status Monitoring and Control in Industrial Application Using Mobile Relay Node - LPC2148

Status Monitoring and Control in Industrial Application Using Mobile Relay Node - LPC2148 Status Monitoring and Control in Industrial Application Using Mobile Relay Node - LPC2148 U.Rajkanna 1, D.Manivannan 2 School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur, Tamilnadu, India

More information

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2 Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar

More information

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN Saranya.N 1, Sharmila.S 2, Jeevanantham.C 3 1,2,3 Assistant Professor, Department of ECE, SNS College of Engineering

More information

BIOMETRIC BASED VOTING MACHINE

BIOMETRIC BASED VOTING MACHINE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE

More information

A New Application of Zigbee Based Wireless Automation System for Safety of Municipal Workers

A New Application of Zigbee Based Wireless Automation System for Safety of Municipal Workers A New Application of Zigbee Based Wireless Automation System for Safety of Municipal Workers Mr. Balaji. v. phad 1, Dr. H. K. Naidu 2, Prof. Pratik Gutke 3 1,2,3 Integrated Power System Dept., Tulsiramji

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College

More information

Implementation of Modified RC4 Algorithm for Wireless Sensor Networks on CC2431

Implementation of Modified RC4 Algorithm for Wireless Sensor Networks on CC2431 Indian Journal of Science and Technology, Vol 8(S9), 198 206, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Implementation of Modified RC4 Algorithm for Wireless Sensor Networks on CC2431

More information

OPTIMIZED LEHE: A MODIFIED DATA GATHERING MODEL FOR WIRELESS SENSOR NETWORK

OPTIMIZED LEHE: A MODIFIED DATA GATHERING MODEL FOR WIRELESS SENSOR NETWORK ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Arasu et al. ARTICLE OPEN ACCESS OPTIMIZED LEHE: A MODIFIED DATA GATHERING MODEL FOR WIRELESS SENSOR NETWORK S. Senthil

More information

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING E. PRAGANAVI 1,A. GAYATHRI 2 12 Assistant Professor, 12 Department of Computer Science, UCE OU, Hyderabad, Telangana, India. Abstract: - Mobile

More information

EMBEDDED DATA ACQUISITION SYSTEM USING M2M COMMUNICATION

EMBEDDED DATA ACQUISITION SYSTEM USING M2M COMMUNICATION International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 2 Issue 4 Dec 2012 37-42 TJPRC Pvt. Ltd., EMBEDDED DATA ACQUISITION

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

GPRS based SCADA implementation for multisensory security with SMS alerts.

GPRS based SCADA implementation for multisensory security with SMS alerts. GPRS based SCADA implementation for multisensory security with SMS alerts. Priyanka somashekhar malabagi 1, Latha shenoy 2 M.Tech Student, Microelectronics and Control Systems, NMAM Institute of Technology,

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Automatic Environmental Monitoring System using Wireless Sensor Network

Automatic Environmental Monitoring System using Wireless Sensor Network Automatic Environmental Monitoring System using Wireless Sensor Network Soniya Sunny Department of Electronics and Communication Engineering Believers Church Caarmel Engineering College, Pathanamthitta,

More information

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17,   ISSN International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, www.ijcea.com ISSN 2321-3469 DYNAMIC SELECTION OF ALGORITHM TO IMPROVE SECURITY Amit Jain 1 1 Computer Science

More information

Wireless Communication Using Zigbee Module and Aurdino

Wireless Communication Using Zigbee Module and Aurdino International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 6 Issue 4 Ver. I ǁ 2018 ǁ PP. 66-70 Wireless Communication Using Zigbee Module

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Improved ELGAMAL Encryption for Elliptic Curve Cryptography

Improved ELGAMAL Encryption for Elliptic Curve Cryptography Volume 118 No. 17 2018, 341-353 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Improved ELGAMAL Encryption for Elliptic Curve Cryptography Dr. C.R.

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,

More information

Implementation of ATM security using IOT

Implementation of ATM security using IOT Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering

More information

Chaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru, India

Chaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru, India Development of Power Line Communication System for Residential and Industry Monitoring Chaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru,

More information

A Low-Cost Energy Management System That Compares Power Consumption of Electronic Home Appliances

A Low-Cost Energy Management System That Compares Power Consumption of Electronic Home Appliances IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 06-10 A Low-Cost Energy Management System That Compares Power Consumption of Electronic

More information

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

SSL/TLS. How to send your credit card number securely over the internet

SSL/TLS. How to send your credit card number securely over the internet SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying

More information

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Providing Security to the Architecture of Presence Servers

Providing Security to the Architecture of Presence Servers Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,

More information

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Nagarajan Ravi #, Jeyanthi. P *2 # Department of Information Technology, Sathyabama University,

More information

Development of Coalmine Safety System Using Wireless Sensor Network

Development of Coalmine Safety System Using Wireless Sensor Network Development of Coalmine Safety System Using Wireless Sensor Network S.Vandana, PG Scholar, Department of Electronics and Communications Engineering Sri Vasavi Engineering College, Tadepalligudem Andhra

More information

Secured Data Transfer using ZigBee

Secured Data Transfer using ZigBee Indian Journals of Science and Technology, Vol 9(17), DOI: 10.17485/ijst/2016/v9i17/93110, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Secured Data Transfer using ZigBee A. S. R. Murty

More information

ZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT

ZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT HOME SYSTEM USING ARM 7 ZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT Kajal R. Gat 1, Prof. V.G.Puranik 2 Volume 6, Issue 6, June (2015), pp. 48-56 Article Id: 40120150606007 International Journal

More information

Enhancedsecure sensor protocol with information via negotiation(sspin)

Enhancedsecure sensor protocol with information via negotiation(sspin) Enhancedsecure sensor protocol with information via negotiation(sspin) Asha P.N #1, S.C Lingareddy# 2, Mahalakshmi T #3, Archana S #4 1 Research Scholar, Research and development Center, Bharathiar University,

More information

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation

More information

Diversified Caesar Cipher for Impeccable Security

Diversified Caesar Cipher for Impeccable Security Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics

More information

A New variant of Hill Cipher Algorithm for Data Security

A New variant of Hill Cipher Algorithm for Data Security Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi

More information

Wireless Network Security Architecture with Blowfish Encryption Model

Wireless Network Security Architecture with Blowfish Encryption Model IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 6 (Sep. - Oct. 2013), PP 63-70 Wireless Network Security Architecture with Blowfish

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN

More information

Wireless Power Transmission for Wireless Sensor Networks

Wireless Power Transmission for Wireless Sensor Networks International Journal of Scientific and Research Publications, Volume 4, Issue 10, October 2014 1 Wireless Power Transmission for Wireless Sensor Networks Harshil Sheth, Aishwarya Karnik, Darpan Damani

More information

An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network

An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1567-1574 International Research Publications House http://www. irphouse.com An Improved Gateway

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

HOURS SYLLABUS

HOURS SYLLABUS 8051 40 HOURS SYLUS Introduction of 8051 Pin configuration of 8051, Register structure of 8051. Hardware and software part of Embedded Systems, s in 8051 Assembly level programming, Embedded C programming

More information

Securing Internet of things Infrastructure Standard and Techniques

Securing Internet of things Infrastructure Standard and Techniques Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards

More information

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Obstacle Avoiding Wireless Surveillance Bot

Obstacle Avoiding Wireless Surveillance Bot Volume 118 No. 20 2018, 4309-4314 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Obstacle Avoiding Wireless Surveillance Bot ijpam.eu Aman Aryan, Aakanksha Mishra, Raashi Pradeep Shetty Department

More information

Artificial Neural Network To Detect Know And Unknown DDOS Attack

Artificial Neural Network To Detect Know And Unknown DDOS Attack IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 56-61 www.iosrjournals.org Artificial Neural Network To Detect Know

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

1-7 Attacks on Cryptosystems

1-7 Attacks on Cryptosystems 1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Smart Home Control System by Internet of Things Based on WIFI Module

Smart Home Control System by Internet of Things Based on WIFI Module Smart Home Control System by Internet of Things Based on WIFI Module M.Sangeetha 1, C.Udhayanila 2, G.Gayathri 3, N.Rakshana 4 Assistant Professor, Dept. of ECE, Kathir College of Engineering, Coimbatore,

More information

DESIGN AND IMPLEMENTATION OF IoT GATEWAY FOR HETEROGENEOUS INDUSTRIAL CONTROL NETWORKS

DESIGN AND IMPLEMENTATION OF IoT GATEWAY FOR HETEROGENEOUS INDUSTRIAL CONTROL NETWORKS Volume 116 No. 23 2017, 357-361 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu DESIGN AND IMPLEMENTATION OF IoT GATEWAY FOR HETEROGENEOUS INDUSTRIAL

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

ANDROID BASED VOICE CONTROLLED SMART WHEELCHAIR

ANDROID BASED VOICE CONTROLLED SMART WHEELCHAIR ANDROID BASED VOICE CONTROLLED SMART WHEELCHAIR S. Jaanaa Rubavathy 1, P. Bavithra 2, M. Harsha Priya 3, R. Umamageshwari 4 1Assistant Professor, Electrical and Electronics Engineering, Jeppiaar SRR Engineering

More information

Power infrastructure monitoring system on Embedded Web

Power infrastructure monitoring system on Embedded Web Volume 1, Number 2-2013 PP-71-76 IJSE Available at www.ijse.org International Journal of Science and Engineering ISSN-2347-2200 Power infrastructure monitoring system on Embedded Web Jayant H. Gambhir

More information

XV International PhD Workshop OWD 2013, October Applications of control in intelligent house via ZigBee technology

XV International PhD Workshop OWD 2013, October Applications of control in intelligent house via ZigBee technology XV International PhD Workshop OWD 2013, 19 22 October 2013 Applications of control in intelligent house via ZigBee technology Ján Ďurech, Mária Franeková, University of Žilina Abstract In the paper the

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

CS Computer Networks 1: Authentication

CS Computer Networks 1: Authentication CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores

More information

ARM7 TDMI Microcontroller

ARM7 TDMI Microcontroller ARM7 TDMI Microcontroller Course Name: ARM7 Microcontroller Certification: By UVSoftsTechnologies Pvt. Ltd. Introduction:- Introduction of Embedded System & robotics Evolution in Microcontroller technology

More information

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,

More information

Wi-Fi Module and Wireless Sensor Network Based Automated Irrigation System

Wi-Fi Module and Wireless Sensor Network Based Automated Irrigation System Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 e-issn: 2394-5494 Wi-Fi Module and Wireless Sensor Network Based Automated

More information

Zero private information leak using multi-level security and privileged access for designated authorities on demand

Zero private information leak using multi-level security and privileged access for designated authorities on demand Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of

More information

The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol Abstract The TETRA system provides an authentication service which permits only the authorized terminal to access its network

More information

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD [1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June

More information

Implementation of Enhanced AKA in LTE Network

Implementation of Enhanced AKA in LTE Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1124

More information

An Information Framework for Creating a Smart City through Internet of Things

An Information Framework for Creating a Smart City through Internet of Things An Information Framework for Creating a Smart City through Internet of Things Nilesh Mali 1, Prof A. B. Kanwade 2, PG Scholar, Dept. Of VLSI & Embedded System Engg, SITS Narhe, Pune, M.S., India 1 Assistant

More information

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.432

More information

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology

Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Xi Wang 1 and Hui Gao 2 1 Heilongjiang Bayi Agricultural Reclamation University, Daqing 163319, China 2 Lanzhou Jiaotong

More information

Swarm Robots for Environmental Monitoring and Surveillance

Swarm Robots for Environmental Monitoring and Surveillance Swarm Robots for Environmental Monitoring and Surveillance D Narendhar Singh Department of Electronics and Communication Engineering ANURAG Group of Institutions& JNT University Hyderabad G Ashwini Department

More information

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network ISSN (e): 2250 3005 Volume, 06 Issue, 06 June 2016 International Journal of Computational Engineering Research (IJCER) Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor

More information

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Home Automation Using Smartphone Application

Home Automation Using Smartphone Application Home Automation Using Smartphone Application T.Rajesh, R.Rahul, M.Malligarjun, M.Suvathi Associate Professor, Department of EEE, Info Institute of Engineering, Kovilpalayam, Coimbatore, Tamilnadu, India.

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

IoT Based Disaster Detection and Early Warning Device

IoT Based Disaster Detection and Early Warning Device IoT Based Disaster Detection and Early Warning Device Amjath Ali J 1, B. Thangalakshmi 2, A. Vincy Beaulah 3 1 Lecturer, Department of Electrical and Electronics Engg., Ibra college of Technology, Oman

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

SECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY

SECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY SECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY Suganya #1 Nagarajan Srinivasan *2 # M.Tech, Advanced Computing, School of Computing, SASTRA University, Thanjavur, TamilNadu,India * Assistant

More information

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING Gagandeep Kaur, Dr. Gagandeep Abstract Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

A Theoretical Analysis of Different Hacking Techniques in Wireless Networks

A Theoretical Analysis of Different Hacking Techniques in Wireless Networks A Theoretical Analysis of Different Hacking Techniques in Wireless Networks Mr.S.Manimaran Assistant Professor Department of Computer Science and Engineering M.Kumarasamy College of Engineering, Karur,

More information

A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES

A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES The main aim of this project is to introduce a new universal remote control that gives easy-to-control interface for

More information