SECURE DATA TRANSMISSION THROUGH MULTIPLE HOPS IN WIRELESS SENSOR NETWORK
1Pooja Gupta, 2Dr. Shashi Bhushan, 2Sachin Majithia, 2Harsimran Kaur
1Research Scholar, Department of Information Technology, Chandigarh Engineering College, Landran
2Department of Computer Science and Engineering, Chandigarh Engineering College, Landran
Punjab, India
E-mail: 1 guptapooja2004@gmail.com,2 shashibhushan6@gmail.com,2 sachinmajithia@gmail.com, 2 harsimrangne@gmail.com
Abstract
Wireless sensor networks (WSN) are self- governing sensors that are widely distributed in the respective environment. They are also referred as wireless sensor and actuator networks (WSAN). They are used to observe physical or environmental conditions, for example, temperature, sound, natural activities etc. They collect data from each active node and pass it to the network to the centralized location. There are many flaws occurred in wireless sensor network like user authentication as well as data travel in the network is not so much secure. We are developing a technique in which firstly we are allowing the user to pass the hard security authentication scheme and then the user can join the network. Further we are also providing a secure file transmission in network via public and private key concept. In this way we maintain the secure and authenticated transmission of data in predescribed environment.
Keywords- Data Transmission, Wireless Sensor
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Co
3) Secure data aggregation: Fine grain sensing is one of the important compensation of a wireless sensor network which is provided by the large and dense sets of nodes .So to avoid overwhelming amounts of traffic, the sensed values must be aggregated and the aggregation may take place in many places in the network depending on the architecture of the wireless sensor network. For example, the system may average the temperature of a geographic region, combine sensor values to compute the location and velocity of a moving object, or aggregate data to avoid false alarms in real-world event detection. All aggregation locations must be secured [8].
Security is always the main issue for a network, when it is a wireless system the security becomes the main concern for a user. A wireless P2P network is suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also include to use a node bandwidth and increase the Delay of Service for other host over the network. This work is basically based on such type of attack. There are some system that exists on same attack model by comparing the hop time and some other means. But in all such system the Detection system is performed on a centralized system. We are proposing and intelligent predictive system
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
A WSN is a type of wireless networks that consists of collection sensor nodes which are tiny devices. Each sensor node of the network has different processing capability. It may contain multiple types of memory (program, data and flash memories), have a RF transceiver, have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion [13, 14]. Optimum need of each sensor node is to maximize its own utility function. Also the whole network requires resource assignments balance to perform in a useful and efficient way. This chapter presents a brief survey on WSNs showing its types, characterizing features, protocols and applications.
Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.
The proposed technique is based on mutual authentication using technique of traffic monitoring algorithm in networks
Moreover, it is important to note that while cryptography is necessary for secure communications, this report is not by itself sufficient. The reader is advice then, that the topics covered in this paper only describe the first of the many steps necessary for better security in a number of situations.
Abstract—Wireless Sensor Network (WSN) is basically a wireless network in which sensor nodes are distributed in any environment condition, to collect the data or information such as temperature, pressure, wind, sea level etc. and accordingly data or information will be passed to the main location. Reliable Trust and Reputation of a node stands for the measure of trust over a certain period of time which can be useful to evaluate the risk of attack from that particular node. We have combined all these parameters in order to risk of attack from a particular node.
On Piotrowski et al\cite{Piotrowski}, the authors present a collaborative data storage (tinyDSM) middleware that addresses the common problems of store data on wireless sensor networks (WSN) using data replication on nodes of the network. However, in the proposal, the decision of the node to assume the role of data replicators is static and uses a random criterion depends only on the number of nodes and density of the network. It's created some problems if that node disappears from the network.
Abstract: Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood and safety period. On top of that, having temporal privacy is crucial to attain. We extend this work to provide a solution against global adversaries. We present a network model that is protected against passive/active and local/multi-local/global attacks. This work provides a solution for temporal privacy to attain end-to-end anonymity and location privacy.
The privacy preserving techniques also have data sanitization, cryptography techniques and access control techniques. The data sanitization techniques refer as a process, which conceals sensitive information in their data sets. Here in this method implements various techniques to offer the privacy to their dataset. The access control methods are implemented to reduce and handle the access to the host system and their applications through communication links. The cryptography techniques are implemented to offer a tough security and privacy and also offer exact and practical implementation. The cryptography protocols permits secure communications through addressing their authentication [1].
Thus, it is essential that computational techniques are performed so that the requirements of information protection are met. In this scenario are presented the two basic types of encryption, symmetric or private key and public key or asymmetric.
Abstract— Crucial methods are employed to deploy the majority networks to acquire the data. Modern improvements stores, transfer data at higher rate. Traditional methods which provide security to the information. Using single encryption algorithms are more prone to issues and these are implemented without knowing its shortcomings. This proposed algorithms provides new step to avoid shortcomings. We resemble some famous algorithms as follows. Firstly, we create a new algorithms, In order to provide security issue and time constraint of operation. Secondly, We combine AES using multiplexing of keys, Improvement of DES key size and blowfish algorithm, then we encrypt data using the proposed algorithm. This can enhance the security and complicates the Encryption. In this paper we provide both the encryption and decryption that supports in real time application and algorithm has a practical value.5