Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two secure and efficient data transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the identitybased digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.

EXISTING SYSTEM: Adding security to LEACH-like protocols is challenging because they dynamically, randomly, and periodically rearrange the network’s clusters and data links. Therefore, providing steady long-lasting node-to-node trust relationships and common key distributions are inadequate for LEACH-like protocols. There are some secure data transmission protocols based on LEACH-like protocols, such as SecLEACH , GS-LEACH, and RLEACH. DISADVANTAGES OF EXISTING SYSTEM:  Symmetric key management suffers from a so-called orphan node problem.  It cannot participate in any cluster, and therefore, has to elect itself as a CH.  Increases the overhead of transmission and system energy consumption by raising the number of CHs.

PROPOSED SYSTEM: We propose two Secure and Efficient data transmission protocols for CWSNs, called SET-IBS and SET-IBOOS. it provide feasibility of the proposed SET-IBS and SET-IBOOS with respect to the security requirements and analysis against routing attacks. SET-IBS and SET-IBOOS are efficient in communication and applying the ID- based cryptosystem, which achieves security requirements in

CWSNs, as well as solved the orphan node problem in the secure transmission protocols with the symmetric key management.

ADVANTAGES OF PROPOSED SYSTEM:  The proposed SET-IBS and SET-IBOOS protocols have better performance than existing secure protocols for CWSNs. With respect to both computation and communication costs, we pointed out the merits that using SET-IBOOS with less auxiliary security overhead is preferred for secure data transmission in CWSNs.  Reduce the computational overhead for security using the IBOOS scheme.

SYSTEM ARCHITECTURE:

SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System

:

Pentium IV 2.4 GHz.

 Hard Disk

:

40 GB.

 Floppy Drive

:

1.44 Mb.

 Monitor

:

15 VGA Colour.

 Mouse

:

Logitech.

 Ram

:

512 Mb.

SOFTWARE REQUIREMENTS:  Operating system :

Windows XP/7/LINUX.

 Implementation

:

NS2

 NS2 Version

:

NS2.2.28

 Front End

:

OTCL

(Object

Oriented

Tool

Command

Language)  Tool

:

Cygwin (To simulate in Windows OS)

REFERENCE: Huang Lu,Jie Li and Mohsen Guizani,“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks”, IEEE TRANSACTIONS, VOL. 25, NO. 3, MARCH 2014.

Secure and Efficient Data Transmission.pdf

Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the system. performance of WSNs. In this paper, we study a secure data ...

221KB Sizes 0 Downloads 184 Views

Recommend Documents

Design of secure and energy-efficient cooperative video distribution ...
www.ijrit.com. ISSN 2001-5569. Design of secure and energy-efficient cooperative video distribution over wireless networks. 1 Divya J Alapatt, 2 Prof.Gayathri N.

Secure and Efficient Route Discovery by selecting ...
*[email protected] ** [email protected] ... networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed .... The aim of the message exchange is collect infor

Efficient Secure Primitive for Privacy Preserving ...
Department of Computer Science and Technology,. University of ... with each other to conduct computations on the union of data they each hold. ... benefits, the hospitals may be unwilling to compromise patients' privacy or vio- late any ... serving h

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
The ABE scheme can be specialised to obtain an IBBE system with constant sized ... product encryption have been omitted due to reasons explained earlier.

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

high speed and secure data transmission using ...
in the amount of digital data transmitted via the Internet, representing text .... each word with an approximate signature pattern for the word opposed to an actual.

Secure Perturbations of Data Provenance and ...
Fig.2.System Architecture. The data receiver utilizing an optimal doorstep-based mechanism, which minimizes the probability of provenance decoding errors,.

Efficient and Effective Similarity Search over Probabilistic Data ...
To define Earth Mover's Distance, a metric distance dij on object domain D must be provided ...... Management of probabilistic data: foundations and challenges.

efficient automatic verification of loop and data-flow ...
and transformations that is common in the domain of digital signal pro- cessing and ... check, it generates feedback on the possible locations of errors in the program. ...... statements and for-loops as the only available constructs to specify the.

Localized Delay-bounded and Energy-efficient Data ...
efficient Data Aggregation scheme (DEDA) for wireless sensor and actor ..... to be large with loose delay requirement and high electric unit energy consumption,.

Efficient and Effective Similarity Search over Probabilistic Data Based ...
networks have created a deluge of probabilistic data. While similarity search is an important tool to support the manipulation of probabilistic data, it raises new.