Kumaraguru College of Technology, Coimbatore, India. Abstract
|
|
- Kellie Malone
- 5 years ago
- Views:
Transcription
1 Volume 116 No , ISSN: (printed version); ISSN: (on-line version) url: doi: /ijpam.v116i11.12 IMPLEMENTATION OF DATA GATHERING SYSTEM USING MOBILE RELAY NODE IN WIRELESS SENSOR NETWORK ijpam.eu M.Mathankumar 1, T.Viswanathan 2 and T.Dineshkumar 3 1,2,3 Assistant Professor, Department of EEE, Kumaraguru College of Technology, Coimbatore, India 1 mathankumarbit@gmail.com, 2 viswanathan@live.com, 3 dinesh161190@gmail.com Abstract Wireless Sensor Networks (WSN) are infrastructure-less network to monitor and share the physical conditions in the environment. There is a growing need for securing the data sharing in WSN. Because it is vulnerable to access unauthorized. In this paper, data sharing is secured by context based cryptographic algorithm which is not only depends on secret key but also depends on context which is set by the sender. To collect secured data from the sensor nodes, Mobile Relay Node (MRN) is used. It is a mobile device which roams around the network for data gathering using Wireless Personal Area Network (WPAN). The sensor nodes and data center are developed using ARM LPC2148 Processor and Mobile Relay Node (MRN) is developed using PIC16F877A microcontroller. To evade the illicit access of the data, context based cryptographic algorithm is developed and loaded into the ARM based sensor nodes and data center. Index Terms Wireless Sensor Network, Mobile Relay Node, Wireless Personal Area Network, ARM LPC2148, PIC16F877A, Cryptography. 1. Introduction Wireless Sensor Network is a group of Sensor Nodes (SN) which can sense, process and transmit information to other SN through relay nodes. The self organizing sensor nodes uses radio signal for communication [1]. In the existing systems, the communication among SN and the Data Center (DC) is established using router. There is variety of routing methods used between SN and the DC. If the router fails, there will be a loss of 111
2 data. Instead of router, relay nodes are used among the SN and the DC. For this several placement algorithms are needed to place the relay node to cover all the sensor nodes in the network. If the relay nodes are not placed correctly they can connect only partial sensor network [2]. To overcome these relay node issues, mobile relay nodes are used. MRN is a mobile device which moves throughout the WSN and collects the information from various sensor nodes placed in different locations by sending the request. It involves point to point communication, improves the packet delivery ratio and life time of the nodes [3] [4] [5]. In wireless communication, there is no assurance that the message is transmitted securely. There is a chance of hacking during the communication. The increasing demand for security in communication between the nodes results in the requirement of several cryptographic algorithms and secret keys [6]. The goal of this paper is to provide enhanced security in WSN. For that context based cryptographic algorithm is used in the sensor node. SN encrypts the data using context based encryption which is not only based on secret keys but it also based on contexts which is set by the sender corresponding to receiver s context [7] [8]. Here, the receiver must satisfy those contexts then only they are able to decrypt. Other encryption algorithms have the drawback of brute force attack. 2. Proposed System A. Process Description Figure 1 shows the secured data communication from sensor node to data center through mobile relay node. Initially, SN encrypts the sensed data using context based encryption 112
3 algorithm and it searches the nearby MRN using WPAN. When MRN receives the search signal, it transmits transmission command. Thereby SN transmits encrypted data to MRN. After receiving the data MRN will send acknowledgement to SN and transmits encrypted data to data center. Finally, data center decrypts using context based decryption algorithm, and then it stores in the memory and monitors the received data [11]. B. Context Based Encryption Algorithm Initially, secret key (K1) and contexts (constraints or rules) are selected and two files are created. In file 1, Rules and facts are concatenated and stored. Where, the rule specifies the contexts and fact specifies the key generation algorithm. In file 2, original information (sensed data) is stored. XOR operation is performed between both files to create cipher text(c*). File 1 is encrypted with secret key (K1) to create cipher text C1 then it is encrypted with secret key (K2) using DES encryption to create cipher text C2. Final cipher text C is formed by concatenating C1 and C2. Cipher text C is transmitted to MRN and it is forwarded to data center. This algorithm overcomes the problem of brute force attack by providing some threshold for the number of failed decryptions [11]. SN Sensor Node, MRN Mobile Relay Node Fig. 1. Proposed Wireless Sensor Network C. Context Based Decryption Algorithm 113
4 The data center receives the encrypted data from MRN and decrypts the data using context based decryption algorithm. From the received cipher text C, first cipher text C1 is extracted and decrypted with secret key (K1). From this file 1 is obtained and then the rules and facts are extracted. Afterward rules and facts make a decision whether receiver satisfies the context or not. If the receiver satisfies the context, then second key is generated by specified key generation algorithm. Using the second key cipher text C2 is decrypted to provide original information. If the receiver does not satisfy the context, then error message is displayed [11]. 3. Hardware implementation The proposed system consists of three nodes namely sensor node, mobile relay node and data center. Here, sensor node is used to sense the environment and encrypt the data. MRN is used to collect the data from sensor nodes. Data Center is used to decrypt the encrypted data and monitoring. A. Sensor Node Sensor Node consists of ARM LPC2148 processor, zigbee, temperature sensor, amplifier, LCD display, buzzer and RS232. Here the sensor (temperature sensor) is connected to ARM through amplifier and zigbee is connected to UART of ARM through RS232. Initially temperature sensor senses the environment, then amplifies the sensed signal and gives it to processor. The processor converts the received analog signal into the digital signal then encrypts the information using context based encryption algorithm and displays the encrypted information in the LCD display connected to it. The encrypted information is transmitted through zigbee. Buzzer is provided for failed 114
5 decryption notification. The block diagram of sensor node is represented in figure 5. Hardware setup for this node is shown in figure 6. Fig. 2. Block diagram of Sensor Node. Fig. 3. Sensor Node with encrypted information B. Mobile Relay Node MRN consists of PIC16F877A Microcontroller, Moving robot, zigbee, LCD display and RS232. Here zigbee is connected to USART of PIC microcontroller through RS232. The MRN receives the encrypted information from sensor node through zigbee. Moving robot allows the relay node to roam throughout the network. The data received and transmitted notifications are indicated in the LCD Display. The MRN forwards the received information to data center through zigbee. The diagrammatic representation of MRN is shown in figure 7. Hardware setup for this node is shown in figure
6 Fig. 4. Mobile Relay Node Fig. 5. C. Data Center Hardware setup for Mobile Relay Node Data center consists of ARM processor, zigbee, LCD display, keypad and RS232. Here, data are received through zigbee which is connected to ARM processor through RS232. Decryption is performed in the ARM processor using context based decryption algorithm where decryption key is entered through keypad connected to ARM. The decrypted information is stored in the database and displayed in LCD display. The block diagram of data center is shown in figure 9. Hardware setup for this node is shown in figure 10. Fig. 6. Block diagram of Data center 116
7 4. Conclusion Fig. 7. Data Center with decrypted information Thus, the context based cryptographic algorithm and mobile data gathering functions are successfully implemented in both the software and hardware. Using NetBeans IDE simulator, context based cryptographic algorithm was simulated successfully. In this system, ARM LPC2148 is used as sensing node as well as monitoring node for providing enhanced security and PIC16F877A is used as mobile relay node for easy mobility and cost effective purposes. Using this system data sharing is secured and authentication is improved by overcoming brute force attack, man in the middle attack etc. It also reduces the memory requirement and communication delay. References [1] M.Preethi, M.Mathankumar and N.Sugandhi Elucidation of Effectual and Immune Multipath Routing With Multilevel Data Aggregation in Wireless Sensor Networks International Journal of Applied Engineering Research, Vol. 10 No.20, [2] Jorge Mena, Vana Kalogeraki Dynamic Relay Node Placement in Wireless Sensor Networks International Symposium on Applications and the Internet, [3] Weimin Wen et al. Energy Efficient Data Collection Scheme in Mobile Wireless Sensor Networks 31st International 117
8 Conference on Advanced Information Networking and Applications Workshops (WAINA), [4] Songtao Guo1, Cong Wang2, and Yuanyuan Yang2 Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks IEEE Transactions on Mobile Computing, [5] Hu Yin and Yunfei Lv A Proposal of Sensor Data Collection System Using Mobile Relay Nodes International Conference on Information Security and Intelligence Control (ISIC), [6] C. Mohanraj et al. Design and development of secret session key generation using embedded crypto device ARM- LPC2148, Journal of Artificial Intelligence, vol. 6 (2), [7] Chinmoy Mukherjee, Mehak Soni and Rajarathnam Nallusamy A context based cryptographic content sharing system International Conference on Advances in Computing, Communications and Informatics (ICACCI),
9 119
10 120
Status Monitoring and Control in Industrial Application Using Mobile Relay Node - LPC2148
Status Monitoring and Control in Industrial Application Using Mobile Relay Node - LPC2148 U.Rajkanna 1, D.Manivannan 2 School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur, Tamilnadu, India
More informationAUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2
Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar
More informationA ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN
A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN Saranya.N 1, Sharmila.S 2, Jeevanantham.C 3 1,2,3 Assistant Professor, Department of ECE, SNS College of Engineering
More informationBIOMETRIC BASED VOTING MACHINE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE
More informationA New Application of Zigbee Based Wireless Automation System for Safety of Municipal Workers
A New Application of Zigbee Based Wireless Automation System for Safety of Municipal Workers Mr. Balaji. v. phad 1, Dr. H. K. Naidu 2, Prof. Pratik Gutke 3 1,2,3 Integrated Power System Dept., Tulsiramji
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationEnhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication
Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College
More informationImplementation of Modified RC4 Algorithm for Wireless Sensor Networks on CC2431
Indian Journal of Science and Technology, Vol 8(S9), 198 206, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Implementation of Modified RC4 Algorithm for Wireless Sensor Networks on CC2431
More informationOPTIMIZED LEHE: A MODIFIED DATA GATHERING MODEL FOR WIRELESS SENSOR NETWORK
ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Arasu et al. ARTICLE OPEN ACCESS OPTIMIZED LEHE: A MODIFIED DATA GATHERING MODEL FOR WIRELESS SENSOR NETWORK S. Senthil
More informationEFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING
EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING E. PRAGANAVI 1,A. GAYATHRI 2 12 Assistant Professor, 12 Department of Computer Science, UCE OU, Hyderabad, Telangana, India. Abstract: - Mobile
More informationEMBEDDED DATA ACQUISITION SYSTEM USING M2M COMMUNICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 2 Issue 4 Dec 2012 37-42 TJPRC Pvt. Ltd., EMBEDDED DATA ACQUISITION
More informationCASER Protocol Using DCFN Mechanism in Wireless Sensor Network
Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly
More informationGPRS based SCADA implementation for multisensory security with SMS alerts.
GPRS based SCADA implementation for multisensory security with SMS alerts. Priyanka somashekhar malabagi 1, Latha shenoy 2 M.Tech Student, Microelectronics and Control Systems, NMAM Institute of Technology,
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationAutomatic Environmental Monitoring System using Wireless Sensor Network
Automatic Environmental Monitoring System using Wireless Sensor Network Soniya Sunny Department of Electronics and Communication Engineering Believers Church Caarmel Engineering College, Pathanamthitta,
More informationInternational Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN
International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, www.ijcea.com ISSN 2321-3469 DYNAMIC SELECTION OF ALGORITHM TO IMPROVE SECURITY Amit Jain 1 1 Computer Science
More informationWireless Communication Using Zigbee Module and Aurdino
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 6 Issue 4 Ver. I ǁ 2018 ǁ PP. 66-70 Wireless Communication Using Zigbee Module
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationImproved ELGAMAL Encryption for Elliptic Curve Cryptography
Volume 118 No. 17 2018, 341-353 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Improved ELGAMAL Encryption for Elliptic Curve Cryptography Dr. C.R.
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014
Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,
More informationArm Microcontroller Implementation of Des Using Concept with Time-Variable Key
Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informationChaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru, India
Development of Power Line Communication System for Residential and Industry Monitoring Chaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru,
More informationA Low-Cost Energy Management System That Compares Power Consumption of Electronic Home Appliances
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 06-10 A Low-Cost Energy Management System That Compares Power Consumption of Electronic
More informationCONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSSL/TLS. How to send your credit card number securely over the internet
SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying
More informationSimulative Investigation of Zigbee Network Coordinator Failure with Different QoS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationProviding Security to the Architecture of Presence Servers
Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,
More informationSecure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks
Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Nagarajan Ravi #, Jeyanthi. P *2 # Department of Information Technology, Sathyabama University,
More informationDevelopment of Coalmine Safety System Using Wireless Sensor Network
Development of Coalmine Safety System Using Wireless Sensor Network S.Vandana, PG Scholar, Department of Electronics and Communications Engineering Sri Vasavi Engineering College, Tadepalligudem Andhra
More informationSecured Data Transfer using ZigBee
Indian Journals of Science and Technology, Vol 9(17), DOI: 10.17485/ijst/2016/v9i17/93110, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Secured Data Transfer using ZigBee A. S. R. Murty
More informationZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT
HOME SYSTEM USING ARM 7 ZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT Kajal R. Gat 1, Prof. V.G.Puranik 2 Volume 6, Issue 6, June (2015), pp. 48-56 Article Id: 40120150606007 International Journal
More informationEnhancedsecure sensor protocol with information via negotiation(sspin)
Enhancedsecure sensor protocol with information via negotiation(sspin) Asha P.N #1, S.C Lingareddy# 2, Mahalakshmi T #3, Archana S #4 1 Research Scholar, Research and development Center, Bharathiar University,
More informationKeywords Sosemanuk, VOIP, Android, Encryption, Descryption
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationWireless Network Security Architecture with Blowfish Encryption Model
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 6 (Sep. - Oct. 2013), PP 63-70 Wireless Network Security Architecture with Blowfish
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN
More informationWireless Power Transmission for Wireless Sensor Networks
International Journal of Scientific and Research Publications, Volume 4, Issue 10, October 2014 1 Wireless Power Transmission for Wireless Sensor Networks Harshil Sheth, Aishwarya Karnik, Darpan Damani
More informationAn Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1567-1574 International Research Publications House http://www. irphouse.com An Improved Gateway
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH
More informationHOURS SYLLABUS
8051 40 HOURS SYLUS Introduction of 8051 Pin configuration of 8051, Register structure of 8051. Hardware and software part of Embedded Systems, s in 8051 Assembly level programming, Embedded C programming
More informationSecuring Internet of things Infrastructure Standard and Techniques
Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards
More informationGenerating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security
Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationObstacle Avoiding Wireless Surveillance Bot
Volume 118 No. 20 2018, 4309-4314 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Obstacle Avoiding Wireless Surveillance Bot ijpam.eu Aman Aryan, Aakanksha Mishra, Raashi Pradeep Shetty Department
More informationArtificial Neural Network To Detect Know And Unknown DDOS Attack
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 56-61 www.iosrjournals.org Artificial Neural Network To Detect Know
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationSmart Home Control System by Internet of Things Based on WIFI Module
Smart Home Control System by Internet of Things Based on WIFI Module M.Sangeetha 1, C.Udhayanila 2, G.Gayathri 3, N.Rakshana 4 Assistant Professor, Dept. of ECE, Kathir College of Engineering, Coimbatore,
More informationDESIGN AND IMPLEMENTATION OF IoT GATEWAY FOR HETEROGENEOUS INDUSTRIAL CONTROL NETWORKS
Volume 116 No. 23 2017, 357-361 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu DESIGN AND IMPLEMENTATION OF IoT GATEWAY FOR HETEROGENEOUS INDUSTRIAL
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationANDROID BASED VOICE CONTROLLED SMART WHEELCHAIR
ANDROID BASED VOICE CONTROLLED SMART WHEELCHAIR S. Jaanaa Rubavathy 1, P. Bavithra 2, M. Harsha Priya 3, R. Umamageshwari 4 1Assistant Professor, Electrical and Electronics Engineering, Jeppiaar SRR Engineering
More informationPower infrastructure monitoring system on Embedded Web
Volume 1, Number 2-2013 PP-71-76 IJSE Available at www.ijse.org International Journal of Science and Engineering ISSN-2347-2200 Power infrastructure monitoring system on Embedded Web Jayant H. Gambhir
More informationXV International PhD Workshop OWD 2013, October Applications of control in intelligent house via ZigBee technology
XV International PhD Workshop OWD 2013, 19 22 October 2013 Applications of control in intelligent house via ZigBee technology Ján Ďurech, Mária Franeková, University of Žilina Abstract In the paper the
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What
More informationLecture 1 Applied Cryptography (Part 1)
Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication
More informationDYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationCS Computer Networks 1: Authentication
CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores
More informationARM7 TDMI Microcontroller
ARM7 TDMI Microcontroller Course Name: ARM7 Microcontroller Certification: By UVSoftsTechnologies Pvt. Ltd. Introduction:- Introduction of Embedded System & robotics Evolution in Microcontroller technology
More informationAnalysis of Worm-Hole Attack in MANET using AODV Routing Protocol
Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,
More informationWi-Fi Module and Wireless Sensor Network Based Automated Irrigation System
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 e-issn: 2394-5494 Wi-Fi Module and Wireless Sensor Network Based Automated
More informationZero private information leak using multi-level security and privileged access for designated authorities on demand
Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of
More informationThe Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol Abstract The TETRA system provides an authentication service which permits only the authorized terminal to access its network
More informationIMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD
[1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL
More informationCity Research Online. Permanent City Research Online URL:
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June
More informationImplementation of Enhanced AKA in LTE Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1124
More informationAn Information Framework for Creating a Smart City through Internet of Things
An Information Framework for Creating a Smart City through Internet of Things Nilesh Mali 1, Prof A. B. Kanwade 2, PG Scholar, Dept. Of VLSI & Embedded System Engg, SITS Narhe, Pune, M.S., India 1 Assistant
More informationCommunication Layer, Attacks and Security Mechanisms of Wireless Sensor Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.432
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationA Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor
More informationAgriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology
Agriculture Wireless Temperature and Humidity Sensor Network Based on ZigBee Technology Xi Wang 1 and Hui Gao 2 1 Heilongjiang Bayi Agricultural Reclamation University, Daqing 163319, China 2 Lanzhou Jiaotong
More informationSwarm Robots for Environmental Monitoring and Surveillance
Swarm Robots for Environmental Monitoring and Surveillance D Narendhar Singh Department of Electronics and Communication Engineering ANURAG Group of Institutions& JNT University Hyderabad G Ashwini Department
More informationEfficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network
ISSN (e): 2250 3005 Volume, 06 Issue, 06 June 2016 International Journal of Computational Engineering Research (IJCER) Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor
More informationCryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation
Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More informationHome Automation Using Smartphone Application
Home Automation Using Smartphone Application T.Rajesh, R.Rahul, M.Malligarjun, M.Suvathi Associate Professor, Department of EEE, Info Institute of Engineering, Kovilpalayam, Coimbatore, Tamilnadu, India.
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationIoT Based Disaster Detection and Early Warning Device
IoT Based Disaster Detection and Early Warning Device Amjath Ali J 1, B. Thangalakshmi 2, A. Vincy Beaulah 3 1 Lecturer, Department of Electrical and Electronics Engg., Ibra college of Technology, Oman
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationSECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY
SECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY Suganya #1 Nagarajan Srinivasan *2 # M.Tech, Advanced Computing, School of Computing, SASTRA University, Thanjavur, TamilNadu,India * Assistant
More informationHOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING
HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING Gagandeep Kaur, Dr. Gagandeep Abstract Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative
More informationA REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK
A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)
More informationA Theoretical Analysis of Different Hacking Techniques in Wireless Networks
A Theoretical Analysis of Different Hacking Techniques in Wireless Networks Mr.S.Manimaran Assistant Professor Department of Computer Science and Engineering M.Kumarasamy College of Engineering, Karur,
More informationA UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES
A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES The main aim of this project is to introduce a new universal remote control that gives easy-to-control interface for
More information