A wireless sensor network is comprised of a base station (BS) and numerous sensor nodes. The sensor nodes lack security because they function in an open environment, such as the military. In particular, a false statement injection attack seizures and compromises sensor nodes. The attack then causes the compromised nodes to create forward false reports. Due to the false report injection attack, not only does the sensor network have a false alarm, but its limited energy is also emptied. In order to preserve the false report injection attack, over the past few years, several studies have been made looking for a resolution to the attack. Ye et al. studied statistical en-route filtering (SEF). SEF is a method of randomly verifying event reports in the en-route filtering phase. SEF can filter many false reports early using proof of intermediate nodes. However, because the number of keys in a sensor node is fixed by the system, the sensor network cannot control the event report proof probability depending on the conditions of the network. Therefore, it is tough to proficiently consume energy of the sensor network. In order to resolve the problem, we suggest a technique which controls the event report verification probability by using a key sequence level of an event report. In the suggested method, when an intermediate node obtains an event report, the node authenticates the event report by relating a key sequence level of the report and its key
Design and implementation of secured scan based attacks on ic’s by using on c...
The document proposes a scan-protection scheme that provides testing facilities both during chip assembly and over the course of the circuit's life. It compares expected and actual test responses inside the circuit using an efficient principle to scan-in both input vectors and expected responses. This avoids needing to disconnect scan chains after manufacturing testing for security purposes. The proposed approach compares test responses within the chip at the vector level rather than providing the value of each individual scan bit. This ensures security while not relying on costly external test infrastructure. Simulation results show the proposed scheme occupies less area on the chip than existing approaches.
Fault Link Detection in WSN using Link Scanner Approach
This document proposes a new approach for detecting faulty links in wireless sensor networks. The approach uses the expected transmission count (ETX) metric to calculate link quality and detect links with high packet loss. It also tracks the hop count and path of packets to detect inconsistencies that indicate faulty links. When a faulty link is detected, the approach finds an alternate path to route packets around it. The key components are calculating ETX values, including hop count and node IDs in packet headers, comparing expected vs. actual hop counts, and detecting mismatches to identify faulty links. The goal is to robustly and efficiently detect link failures to maintain network connectivity and avoid packet loss.
Behavioral Malware Detection in Dtn Using Intrusion Detection System
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
This document proposes a scalable framework using SDN and machine learning techniques to detect and mitigate DDoS attacks in large-scale networks. The framework uses a lightweight detection layer implemented across multiple controllers to detect anomalies locally using entropy calculations. It also includes a heavyweight detection layer in a centralized system that employs machine learning for more accurate detection. The goal is to provide robust intrusion detection that can quickly detect network attacks efficiently in large networks.
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
The document discusses a cloud-based secure authentication and authorization protocol. It proposes using multi-factor authentication with anonymous digital certificates and a flexible access control system based on roles, attributes, and conditions to address issues with existing security mechanisms like single-factor authentication and identity leaks. The solution aims to provide anonymity while authenticating and authorizing users on cloud services.
The document summarizes various techniques for event detection and transmission in wireless sensor networks. It proposes a new protocol that uses a single node to transmit event data to improve reliability, reduce energy consumption and computation costs. The protocol uses clustering for real-time event detection based on sensor thresholds. It applies single and composite decision rules to the clustered sensor data to accurately detect events. Upon detection, a single node is selected to transmit the event data to the sink node.
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
This document provides a comparative review of reliability and fault tolerance enhancement protocols in wireless sensor networks. It first discusses key challenges for wireless sensor networks related to node failures in harsh environments. It then summarizes several existing fault detection and recovery techniques. The document compares protocols like E2SRT, GARUDA, RCRT, and ZARB that aim to improve reliability. It highlights issues around achieving fault tolerance and concludes that no single approach can provide a fully reliable solution, requiring a hybrid method using the best features of different protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A survey on evil twin detection methods for wireless local area networkIAEME Publication
This document summarizes a survey of recent methods for detecting evil twin access points in wireless local area networks (WLANs). It describes the background and challenges of evil twin attacks, where attackers create rogue access points that mimic authorized ones to steal user information. The document categorizes detection methods as network admin-side or client-side solutions. It reviews several specific detection techniques, such as those based on timing analysis, received signal strength, or separating one-hop from two-hop wireless connections. Finally, it discusses issues like the difficulty of completely detecting evil twins and challenges with wireless-only versus wired-side detection approaches.
The document describes a hybrid honeypot framework for collecting and analyzing malware. The framework uses both client honeypots and server honeypots controlled by a central honeypot controller. Client honeypots actively visit URLs to detect client-side attacks, while server honeypots passively detect server-side attacks. Collected malware is stored in a central database and analyzed on an analysis server to detect known and unknown malware types through dynamic execution and static analysis. The integrated framework was able to collect thousands of malware samples, including some not detected by antivirus software.
Design and implementation of secured scan based attacks on ic’s by using on c...eSAT Publishing House
The document proposes a scan-protection scheme that provides testing facilities both during chip assembly and over the course of the circuit's life. It compares expected and actual test responses inside the circuit using an efficient principle to scan-in both input vectors and expected responses. This avoids needing to disconnect scan chains after manufacturing testing for security purposes. The proposed approach compares test responses within the chip at the vector level rather than providing the value of each individual scan bit. This ensures security while not relying on costly external test infrastructure. Simulation results show the proposed scheme occupies less area on the chip than existing approaches.
Fault Link Detection in WSN using Link Scanner ApproachIRJET Journal
This document proposes a new approach for detecting faulty links in wireless sensor networks. The approach uses the expected transmission count (ETX) metric to calculate link quality and detect links with high packet loss. It also tracks the hop count and path of packets to detect inconsistencies that indicate faulty links. When a faulty link is detected, the approach finds an alternate path to route packets around it. The key components are calculating ETX values, including hop count and node IDs in packet headers, comparing expected vs. actual hop counts, and detecting mismatches to identify faulty links. The goal is to robustly and efficiently detect link failures to maintain network connectivity and avoid packet loss.
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET Journal
This document proposes a scalable framework using SDN and machine learning techniques to detect and mitigate DDoS attacks in large-scale networks. The framework uses a lightweight detection layer implemented across multiple controllers to detect anomalies locally using entropy calculations. It also includes a heavyweight detection layer in a centralized system that employs machine learning for more accurate detection. The goal is to provide robust intrusion detection that can quickly detect network attacks efficiently in large networks.
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudUmer Khalid
The document discusses a cloud-based secure authentication and authorization protocol. It proposes using multi-factor authentication with anonymous digital certificates and a flexible access control system based on roles, attributes, and conditions to address issues with existing security mechanisms like single-factor authentication and identity leaks. The solution aims to provide anonymity while authenticating and authorizing users on cloud services.
The document summarizes various techniques for event detection and transmission in wireless sensor networks. It proposes a new protocol that uses a single node to transmit event data to improve reliability, reduce energy consumption and computation costs. The protocol uses clustering for real-time event detection based on sensor thresholds. It applies single and composite decision rules to the clustered sensor data to accurately detect events. Upon detection, a single node is selected to transmit the event data to the sink node.
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
This document provides a comparative review of reliability and fault tolerance enhancement protocols in wireless sensor networks. It first discusses key challenges for wireless sensor networks related to node failures in harsh environments. It then summarizes several existing fault detection and recovery techniques. The document compares protocols like E2SRT, GARUDA, RCRT, and ZARB that aim to improve reliability. It highlights issues around achieving fault tolerance and concludes that no single approach can provide a fully reliable solution, requiring a hybrid method using the best features of different protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET Journal
This document discusses detecting spoofing and jamming attacks in wireless smart grid networks using RSS (Received Signal Strength) algorithms. It proposes a traffic analysis method using RSS to infer contextual information from jamming and spoofing attacks. The method relies only on packet transmission times and eavesdropper locations. It is intended as a baseline for evaluating protection mechanisms with different assumptions. RSS values are correlated with physical location and widely used in localization algorithms. The proposed system aims to reduce communication overhead and delay compared to existing approaches by limiting injected dummy traffic through constructing minimum connected dominating sets and shortest path trees.
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
This document proposes a secure authentication approach for wireless sensor networks using dynamic key management and zero knowledge protocols. It begins with background on wireless sensor networks and security issues. It then describes related work on key predistribution and dynamic key management schemes. A proposed algorithm is described that uses a rekeying mechanism, zero knowledge authentication without directly transmitting secret keys, and dynamic keys that change for each authentication. Simulation results on networks of up to 25 nodes show the approach is efficient and can authenticate nodes while preventing attacks like cloning.
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...IJECEIAES
This research demonstrates the revealing of an advanced encryption standard (AES) encryption device key. The encryption device is applied to an ATMEGA328P microcontroller. The said microcontroller is a device commonly used in the internet of things (IoT). We measured power consumption when the encryption process is taking place. The message sent to the encryption device is randomly generated, but the key used has a fixed value. The novelty of this research is the creation of a systematic and optimal circuit in carrying the differential power analysis or difference of means (DPA/DoM) technique, so the technique can be applied in key revealing on a microcontroller device by using 500 traces in 120 seconds.
False positive reduction by combining svm and knn algoeSAT Journals
Abstract
With the growth of information technology. There emerges many intrusion detection problem such as cyber security. Intrusion detection system provides basic infrastructure to detect a number of attacks. This research work focuses on intrusion detection problem of network security. The main goal is to detect network behaviour as normal or abnormal. In this research work, two different machine learning algorithm have been combined together to reduce its weakness and takes positive feature of both algorithm. Its experimental results generates better result than other algorithm in terms of performance, accuracy and false positive rate. These combined algorithm has been applied on KDDCUP99 dataset to find better result by improving its performance, accuracy and reducing its false positive rate.
Keywords: Intrusion detection system, KDDCUP99 dataset, False positive rate.
WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSSAM Publications
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less
secure than wired connections (such as Ethernet) because an intruder does not need a physical connection. By any
chance if the wireless device attacked by intruder it is hard to locate the device. Locating a wireless device in a Wi-Fi
network by calculating the distance of each node and localize the wireless accurately. A common measure to deter
unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the
casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID
query. Another method is to only allow computers with known MAC addresses to join the network. The robust location
estimation assumes the reference location in the target environment, the proposed location system maps the input to the
physical location using RSS algorithm. In SSID is the application software used to list the set of wireless device available
in the surrounding and it used to create a gpx file. Converting gpx file in a table format for further distance estimation.
IRJET- Machine Learning Techniques to Seek Out Malicious WebsitesIRJET Journal
This document presents a study on using an ensemble machine learning model to detect phishing websites. The study collected features from URLs to train random forest, logistic regression, and support vector machine classifiers. It then used an ensemble approach that combines the results of these classifiers to provide more accurate phishing detection than any single model. The ensemble model analyzed lexical and URL-based features. The study found that the ensemble approach achieved higher accuracy for phishing website detection compared to existing methods. It aims to develop an intelligent system for detecting phishing websites in real-time using machine learning algorithms.
A secure routing process to simultaneously defend against false report and wo...ieijjournal
This document proposes a new secure routing scheme to simultaneously detect and defend against wormhole attacks and false report attacks in wireless sensor networks. Existing security schemes focus on defending against single attacks but their performance degrades when multiple attacks occur simultaneously. The proposed scheme uses a key partition-based routing protocol to mitigate the detection probability reduction caused by wormholes. It also defines a new event report format containing verification counts and wormhole detection mechanisms. The scheme aims to detect attacks with few hops and low overhead even if the sender or receiver is compromised.
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes (MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%)
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a
fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes
(MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network
energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%) against false report attacks in WSNs.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
IRJET- Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET Journal
1) The document discusses fault detection in wireless sensor networks using an LDA classifier. It analyzes different types of faults that can occur in wireless sensor networks, including network-level, hardware-level, and software-level faults.
2) The proposed method uses a linear discriminant analysis classifier for fault diagnosis to reduce optimization. It detects faults based on the rate of change of sensed data and Fourier transform parameters of time, space, and attribute data.
3) Once a fault is detected, fault compensation is introduced to stabilize the faulted data. The method analyzes sensor data characteristics and proposes a belief rule base model for fault diagnosis in wireless sensor networks.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
This document discusses using game theory techniques to safeguard the automatic generation control (AGC) in smart grids from false data injection attacks. It first provides background on AGC and how false data can affect its performance and potentially cause blackouts. It then discusses using a game theory model to represent the interactions between attackers injecting false data and defenders protecting the system. The risks of different attack events are calculated and fed into the game model. Dynamic programming is used to determine optimal defense strategies based on resource constraints. Simulation results show the approach can minimize risks to the AGC under different attack scenarios.
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
This document proposes a reliable strategy against power dissipating attacks in hierarchical wireless sensor networks. The strategy aims to develop an energy-efficient and reliable approach to counter denial-of-sleep attacks, which can rapidly reduce network lifetime. It introduces a two-tier energy-efficient reliable strategy that couples with the MAC protocol for mutual authentication in a simple way to minimize energy consumption while detecting and preventing power dissipating attacks. Simulation results show that the proposed strategy can efficiently counter replay and forgery attacks while being energy efficient to balance security and energy conservation in the network.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
A personalized Wireless Sensor Network Communication Model for computerizatio...IOSR Journals
This document proposes a personalized wireless sensor network communication model for automating electric power distribution. It involves using sensor networks to monitor parameters like voltage, current, temperature across the distribution system. Sensors would be grouped into clusters and use a virtual MIMO scheme within clusters to reduce errors from transients. Between clusters, a location-aware GEAR routing protocol would be used to route data to monitoring stations efficiently. This decentralized approach could automate operations faster than current centralized SCADA systems while reducing power consumption. It could also help detect electricity theft by strategically placing sensor nodes along transmission lines.
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
This document discusses security challenges in wireless sensor networks, specifically for wireless body area networks (WBANs). It proposes a new medium access control (MAC) protocol called SDMAC to detect and prevent selfish attacks in WBANs. The SDMAC protocol can identify rogue nodes and block abnormal activities to improve network performance. Simulation results using NS3 show that SDMAC performs better than existing protocols in terms of energy efficiency and throughput reduction.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
This document presents a case study on authentication in wireless sensor networks using virtual certificate authorities. It discusses how sensor nodes can securely transmit data when moving across different wireless sensor networks. The proposed approach uses virtual certificates issued by a virtual certificate authority to authenticate moving sensor nodes. Simulation results show that the virtual certificate scheme reduces collisions compared to previous authentication algorithms. The scheme enhances security, scalability and interoperability while supporting node mobility across wireless sensor networks.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...IRJET Journal
This document summarizes a research paper that proposes techniques to enhance the lifetime of wireless sensor networks. It discusses how sensor nodes closer to the sink node consume more energy transmitting data, creating hotspots and shortening the network's lifetime. To address this, the paper proposes using alternate shortest paths to route data and relocating the sink node when the energy of alternate paths gets low. It also uses elliptic curve cryptography and a hybrid encryption method using AES and ECC to securely transmit data and further increase the network lifetime. Evaluation results show the proposed energy-aware sink relocation technique effectively enhances the network lifetime of wireless sensor networks.
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
This document analyzes and compares several hierarchical routing protocols for virtual wireless sensor networks (VWSNs). It first provides background on VWSNs and how virtualization allows a single physical sensor network to serve multiple applications simultaneously. It then reviews several common cluster-based routing protocols for wireless sensor networks, including LEACH, ModLEACH, SEP, and ZSEP. Through simulation and analysis of network lifetime, load balancing, energy consumption, and packets received, the document aims to provide insights on how well different routing protocols can be utilized for VWSNs under various conditions.
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
This document discusses enroute filtering schemes in wireless sensor networks to prevent false data injection attacks. It provides an overview of existing statistical enroute filtering and location-based resilient security schemes that have limitations such as threshold restrictions. The document then proposes using a cluster-based compromise resilient enroute filtering scheme where sensor nodes are organized into clusters. In this scheme, cluster heads aggregate and transmit data to base stations through forwarding nodes. This is said to provide higher security than other filtering schemes by overcoming prior limitations and disadvantages related to compromised node thresholds, non-resilience to attacks, and dependency on node localization.
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
This document presents an analytical model to analyze the tradeoff between data aggregation and latency in cluster-based wireless sensor networks. The model develops equations to calculate the energy savings from data aggregation due to reduced transmissions and the latency incurred due to aggregating data at cluster heads. It then defines a cost function as a weighted sum of these two factors. The goal is to use this cost function to determine optimal design thresholds for wireless sensor network deployments based on their lifetime and latency requirements. The model is evaluated through MATLAB simulations to validate its effectiveness in analyzing the aggregation-latency tradeoff.
Similar to A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION IN WSNS (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
2. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 176 editor@iaeme.com
sequence level. Elements defining the key sequence level comprise the concentration of
neighbor nodes in the sensing range of a center of stimulus (CoS), the number of stages
from the CoS to the BS, and the average of the key sequence level of intermediate nodes
in each track. We imitated the projected technique and the SEF technique to assess the
performance in terms of energy efficiency and security. In the recreation results, the
projected technique disbursed an average of 7.9% less energy of the sensor nodes
compared to SEF method. The number of untrue reports inward at the BS of the
proposed technique was also fewer, by an average of 6.4, compared to the SEF
technique. Concluded the results, we can understand that when the number of false
report is huge in the sensor network, the proposed technique is more energy-efficient
and protected than the SEF technique.
Keywords: Wireless sensor network, False report injection attack, Statistical en-route
filtering, Energy Efficiency, Security.
Cite this Article: Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul
Sattar, Naseer Ahmed Khan and Syed Adil, A Key Level Selection within Hash Chains
for the Efficient Energy Consumption in WSNS, International Journal of Advanced
Research in Engineering and Technology, 10(2), 2019, pp. 175-188.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
1. INTRODUCTION
Wireless sensor networks comprise of a huge amount of sensor nodes, which comprise sensing,
computation, and wireless communication capabilities [1, 2]. The sensor nodes are assigned in
a specific sensor field and operate each other collaboratively [1]. When an event arises in the
sensor field, the nodes sense and calculate data of the event. The nodes also headfirst the data
of the event to a BS [2]. The BS forward the data to a user through the prevailing communication
infrastructure. Because the sensor networks function in exposed situations such as a military
atmosphere, the scopes of the nodes are minor and unmanned [3, 4]. Therefore, the nodes are
seized and conceded effortlessly by an invader from the external [2]. A false report injection
attack particularly grounds a conceded node to create a false report. Fig. 1 shows the action of
a false report injection attack. In Fig. 1, because of the false report generation of the conceded
node in the sensor networks, the outbreaks lead to not only to false alarms, but also to the
diminution of the limited energy of the sensor nodes, thus reducing the lifespan of the networks
[4]. In order to protect the false report injection attack, a lot of resolutions have been projected
by many scientists [4-14]. Ye et al. projected a resolution which is called SEF [4]. In SEF, each
intermediate node confirms an event report using verification keys stochastically. The nodes
headfirst the event report to the following node or drop it conditional on the verification
outcomes. When the event report is untrue, the report is released. Thus, the false report is
speckled initially by SEF. Though, the number of authentication keys comprised in a node has
3. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 177 editor@iaeme.com
to be big for advanced verification of false report possibility. If the numeral of keys of the node
is additional, then the energy consumption of the node is higher. The quantity of keys is not
attuned depending on the condition of the networks because it is static by the system. This
means that it is problematic for the networks to be functioned proficiently. In order to resolve
the problem, we projected a technique which regulates the confirmation chance of the node
using a scheme of a key sequence level. The key sequence level is an index in a hash chain of
a key, which types a message authentication code (MAC) in the event report. In the projected
technique, the BS selects the key sequence level of an event report. Intermediate nodes getting
the event report confirm it by equating the key sequence level of the node’s key with the level
of a MAC in the event report. The key sequence level is established by a fuzzy system in the
BS. The fuzzy inputs defining the level are the regular of the level of nodes in each path
furthering an event report, the compactness of neighbor nodes of a CoS, and the amount of hop
from the CoS to the BS. The projected technique comprises security and competent energy
consumption of sensor nodes by defining the suitable key sequence level. The rest of this paper
is ordered as follows. Section 2 defines the SEF. Section 3 describes the problem statements.
Section 4 presents a system model of the projected technique and the operation process of the
proposed method. Section 5 shows the simulation results to estimate the performance of the
projected technique. Finally section 6 accomplishes this paper.
2. BACKGROUND
2.1. Statistical en-route filtering
SEF is a countermine technique which can filter false reports early on that are made by a
compromised node in a wireless sensor network using statistical verification during the en-route
filtering phase. SEF consists of three phases: key assignment and report generation, en-route
filtering, and sink verification. In the key assignment phase, before the sensor nodes are
organized in a sensor field, each node obtains some keys where the amount is fixed by the
system casually from a particular partition at random in the global key pool. In the report
generation phase, after the nodes are organized, sensing nodes detecting the event elect a CoS
when an event occurs in the sensor network. They frontward a partition index and a MAC to
the BS which was created by a key that each node comprises to a BS. The CoS creates an event
report with the event information and the received MACs and forward the event report to the
BS. In the en-route filtering phase, when an intermediate node obtains the event report, it
approves the report stochastically. The node checks whether there are key indices of distinct
partitions and MACs in the report. If there is also more than one key index or less than the one
in the same partition or the amount of them in the report does not resemble with the amount of
fixed MACs, the node favors the report as a false report and drops it. The node then inspects
whether there is a key index in the report consistent with the key index of the node. If there is
not a key index, the node forward the report to the next node. If not, the node generates a MAC
using its key. It then equates the MAC with the MAC in the report. If the MAC of the node is
dissimilar from the MAC in the report, the report is viewed as a untrue report and is dropped.
Else, the report is observed as a valid report and is promoted to the next node. In the sink
verification phase, all of the event reports received at the sink are substantiated, because the
sink comprises all keys in the global key pool. Thus, it can filter untrue reports out the false
reports that are not filtered in the enroute filtering phase.
3. PROBLEM STATEMENT
If a false report injection attack arises in a wireless sensor network, a compromised node will
unceasingly produce numerous false reports, furthering them to a BS. When the amount of
compromised nodes becomes higher, the amount of untrue reports becomes greater. The sensor
4. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 178 editor@iaeme.com
network which connects many false reports may easily breakdown because of the energy
reduction of the sensor nodes in the network. In SEF, a illustrative countermine technique, in
order to preserve the network against the attack, intermediate nodes authenticate event reports
using their allocated key before they are arranged in a sensor field. The key number is a very
vital element defining the verification possibility of the report. The number of key that a node
comprises becomes bigger, the possibility becomes higher. However, the node has to consume
a lot of verification energy. Also, when an attacker compromises a node, the number of keys
that the attacker can get becomes greater. On the other hand, as the number of keys becomes
lesser, the probability becomes smaller. However, the energy consumption used in the
verification becomes lower. Subsequently, the number of keys that the attacker can get becomes
smaller. Therefore, in order to proficiently operate the sensor network, it is vital to trade energy
consumption for security. Increasing the number of keys that the node includes is difficult in
SEF because the energy of the sensor nodes is limited. To solve the problem, we use a key
sequence level scheme. The scheme helps decrease the energy consumption and make up for
security. Section 4 describes the proposed method using the key sequence level.
4. PROPOSED METHOD
4.1. System model and assumption
A wireless sensor network contains of a BS and numerous sensor nodes. The BS contains a
global key pool. In the global key pool, there are all the keys which are used in the sensor
network. The BS also includes a fuzzy system that calculates a key sequence level. The BS
knows the average of the key sequence level of the intermediate nodes which forward event
reports in each path, the density of neighbour nodes of the CoS, and the number of stages from
the CoS to the BS. The concentration of sensor nodes in the network is very high, and each
node is small and each node contains simple computing capability and limited energy.
4.2. Operation
4.2.1. Key assignment and report generation
Figure 2 A global key pool which consists of j hash chains
In Figure 2, a hash chain is made up of m keys. The last sequence key in each hash chain k
m
j
is a seed key of each hash chain. The next sequence key is consequent using a hash function
with the seed key.
Figure 3 Derivation of keys using the hash function
5. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 179 editor@iaeme.com
In Figure 3, if the hash function receives a seed key as an input, the hash function outputs
the derived key km 1. If the hash function receives km 1 as an input, then it outputs a derived key km
2 . This process is repeated until the function outputs the key k1 . The derived keys are allotted to
sensor nodes before the sensor nodes are organized in the sensor network.
(a) (b)
Figure 4 Example of an operation of key assignment in a global key pool (Fraction of m = 50)
Figure 4 (a) shows that just one key is casually allotted to each sensor node v1~vn . Figure 4
describes an example of the keys which are assigned to the sensor nodes. The sensor nodes
originate other keys from the allocated key and a hash table. For example, In Fig. 4, a node v3
receives a key k19
C
in the C hash chain of the global key pool and then v3 can get the keys from
k18
C
to k1
C
using the hash function.
a b
c d
e
Figure 5 The operation of a report generation
6. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 180 editor@iaeme.com
When an event arises in the sensor field, numerous sensing nodes distinguish the event, as seen
in Fig. 5 (a). The sensing nodes elect a CoS, which is a node that strongly notices the event.
After the election of the CoS, the BS forward the key sequence level, which is determined by a
fuzzy system, to the CoS, as seen in Fig. 5 (b). The CoS forward the key sequence level to its
neighbor nodes in Fig. 5 (c). The neighbor nodes then create MACs using the equivalent keys
with material of the key sequence level from the CoS forwarding the MACs. A node which
does not include the corresponding key with the key sequence level does not forward the MAC
to the CoS, as seen in Fig. 5 (d). The CoS creates an event report using its information of the
event and acknowledged MACs from the neighbor nodes. It then forwards the event report to
the following node in Fig. 5 (e, f).
4.2.2. The scheme of key sequence level
The key sequence level is a generation index of a key, which makes a MAC in the event report
in a hash chain. The key sequence levels of MACs in the event report are the same.
4.2.2.1. Elements determining a key sequence level
Figure 6 Elements determining a key sequence level
In Fig. 6, the fuzzy system calculates three input values in order to get the key sequence
level as an output value. The three input values are the concentration of neighbor nodes, which
are situated within the sensing range of a CoS, the amount of hops from the CoS to a BS, and
the average of the key sequence levels of intermediate nodes in a path.
4.2.2.1.1. Density of neighbour nodes which are located in sensing range of a CoS
The higher the concentration of neighbor nodes in the CoS, the more the CoS collects MACs
equivalent with the key sequence level. For instance, let’s suppose the key sequence level is 6
and the number of neighbor nodes in the sensing range of the CoS is 20 or 30. In the case of
30, the CoS gathers more MACs corresponding to key sequence level 6 than in the case of
20. If the possibility of the collection of MACs is higher, although the key sequence level is
high, the CoS will assemble enough MACs corresponding to the fixed number of MACs in
the event report. Thus, the higher the density, the higher the key sequence level. On the other
hand, the lower the concentration is, the lower the key sequence level is.
4.2.2.1.2. The number of hops from a CoS to a BS
In order to reduce the energy consumption of the sensor nodes, false reports have to be
eliminated early. The more hops there are from the CoS to the BS, the more sensor nodes
forward the event report, and a great amount of energy of the sensor nodes is consumed.
Therefore, when the number of hops is big, the key sequence level has to be lower, and the
report verification probability has to be high. On the contrary, when the number of hops is
minor, the key sequence level has to be high and the probability has to be lower.
4.2.2.1.3. The average number of key sequence levels of intermediate nodes in a path
The average number of key sequence levels of the forwarding node in each path is a very
significant element defining the key sequence level of the event report, because when the
average of the key sequence level is high, the report verification possibility becomes high, and
when the average is lower, the probability becomes lower. Thus, the higher the average is, the
7. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 181 editor@iaeme.com
higher the probability is. On the other hand, the lower the average is, the lower the probability
is. Fuzzy membership function
(a) The number of hops from the CoS to the BS (b) Density of neighbor nodes in a sensing range of
the CoS
(c) The average of the key sequence level of (d) Key sequence level of an event report
intermediate nodes in each path
Figure 7 Membership functions of input and output elements
In Fig. 7, (a) is a membership function of the number of hops from a CoS to the BS, (b) is
the membership function of the concentration of neighbor nodes in the sensing range of the
CoS, and (c) is a membership function of the average of the key sequence level of intermediate
nodes in each path. In the membership function (a), fuzzy values are comprised in the fuzzy set
which contains of three levels. The three levels are Low, Medium, and Large. In the
membership functions (b) and (c), the fuzzy values are comprised in the fuzzy set. The fuzzy
set contains of Low, Medium, and High. The membership function (d) is a membership function
of a key sequence level of an event report. Its fuzzy values are comprised in a fuzzy set. The
fuzzy set is composed of KLow, KMedium, and KHigh. In all fuzzy membership functions, the
fuzzy values are in the range from 0-1.
4.2.2.2. Fuzzy rules
Table 1 Fuzzy rules of the proposed method
No.
0
INPUT OUTPUT
NUM_HOP NEIGHBOR_DENSITY AVERAGE_KEYLEVEL KEY_LEVEL
Small High High KHigh
4 Small Medium Medium KHigh
8 Small Low Low KHigh
9 Medium High High KMedium
12 Medium Medium High KMedium
15 Medium Low High KMedium
20 Large High Low KLow
22 Large Medium Medium KLow
26 Large Low Low KLow
8. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 182 editor@iaeme.com
In Table1, NUM_HOP, NEIGHBORRR_DENSITY, and AVERAGE_KEYLEVEL are
fuzzy inputs. NUM_HOP is the amount of hops that an event report has to pass from a CoS to
a BS. NEIGHBOR_DENSITY is concentration of neighbor nodes in a sensing range of the
CoS. AVERAGE_KEYLEVEL is the average of the key sequence levels for the sensor nodes
in each path. KEY_LEVEL is a fuzzy output and the key sequence level of the event report.
4.2.3. En-route filtering
Once the node obtains the event report, it checks whether the number of MACs in the event
report matches with the fixed number of MACs in the system (a). If the two number are
dissimilar, the node regards the event report as a false report and drops the it (b). Otherwise,
the node inspects whether there is a corresponding partition in the event report with its partition
of MACs (c). If there is not a partition, it forwards the event report to the next node (d). If there
is a corresponding partition, the node equates the key sequence level of its key with the key
sequence level of the MACs in the equivalent partition (e). When the key sequence level is
lower than the one in the event report, it forwards the report to the next node (f). Instead, when
the key sequence level is the same or higher than the one in the event report, it creates a MAC
using its key and equates the MAC with the MAC of the event report (g, f). If the two MACs
are the same, it regards the event report as a authentic node and forwards the report to the next
node (i). Else, it regards the report as a false report and drops it (j).
4.2.4. Base station verification
When event reports arrive at a BS, the BS will verify all the MACs in the event reports because
it includes a global key pool. If the BS receives an event report, it finds a key that matches to
the key sequence level of a MAC in the event report. If there is a key, the BS generates a MAC
9. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 183 editor@iaeme.com
using the key. It then compares the MAC with the MAC in the event report. If the two MACs
are not the same, the BS drops the event report. Thus, although there are false reports which are
not filtered in the en-route filtering phase, the BS verifies all false reports during this phase.
5. SIMULATION
In section 5, we equate the energy efficiency and security of our projected technique with that
of the SEF in order to evaluate the performance of the proposed method. We evaluate the energy
consumption of the sensor nodes versus the rate of false reports based on the number of
compromised nodes among the sensing nodes, which generate MACs included in an event
report, so as to equate the energy efficiency of the proposed method to that of the SEF. The
number of false reports means arrivals at the BS which are not filtered in the en-route filtering
phase. We also equated the number of false reports versus the rate of false reports in the
proposed method to that of the SEF, so as to estimate security.
Section 5.1 describes our simulation environment. Section 5.2 presents the simulation
results.
5.1. Simulation environment
Table 2 A simulation environment
Content Values
The number of the whole sensor nodes in a sensor network 600
The area of a sensor field 100m X 100m
A sensing range of a sensor node 10.0m
Energy consumption per 1byte when a sensor node sends an event
report
16.25 μJ
Energy consumption per 1byte when a sensor node receives an event
report
12.5 μJ
Energy consumption of an event report verification of a sensor node 75 μJ
The number of hash chains in a global key pool 10
The number of MACs in an event report 5
The number of occurring event reports in a sensor network 100
The number of keys in a hash chain 50
The number of keys included in a sensor node. 25
The packet size of an event report 24bytes
5.2. Simulation results
In the simulation results, the rate of false reports is the entire number of event reports in the
sensor field versus the number of false reports. The energy consumption is the sum total of the
energy consumption of all of the sensor nodes in the sensor field.
Fig. 9 is a graph of energy consumption versus the rate of false reports in the projected
technique and the SEF method when a sensing node which creates a MAC included in the event
report is conceded.
10. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 184 editor@iaeme.com
Figure 9 Energy consumption versus the rate of false reports (Fraction of compromised node = 1)
In Fig. 9, we found that the projected technique consumes less energy of the sensor nodes
than the SEF method. We also found that the higher the rate of false reports, the larger the gap
between the energy consumption of the proposed method and SEF method. In the simulation
result, the proposed method consumed an average of 7.89% less energy than the SEF.
Fig. 10 is a graph of the number of false reports arriving at the BS in the proposed method
and the SEF method when a sensing node which creates a MAC included in the event report
is compromised.
Figure 10 The number of false reports versus the rate of false reports (Fraction of compromised node
= 1)
In Fig. 10, we found that the amount false reports arriving at the BS in the proposed method
is less than in the SEF method. In the simulation result, the number of false reports of the
projected technique is an average of 3.64 less than in the SEF method.
Fig. 11 is a graph of energy consumption versus the rate of false reports in the projected
technique and in the SEF method when the two sensing nodes which create MACs included
in the event report are compromised.
Figure 11 Energy consumption versus the rate of false reports (Fraction of compromised nodes = 2)
11. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 185 editor@iaeme.com
In Fig. 11, the higher the rate of false reports is, the larger the gap between the energy
consumption of the projected technique and that of the SEF method. We also know that the
proposed method consumes less energy than the SEF. In the simulation result, the proposed
method consumed an average of 9.09% less energy than the SEF.
Fig. 12 is a graph of the number of false reports arriving at the BS in the projected technique
and that of the SEF method when two sensing node which generate MACs included in the event
report are compromised.
Figure 12 The number of false reports versus the rate of false reports (Fraction of compromised nodes
= 2)
In Fig. 12, we found that the amount of false reports arriving at the BS in the projected
technique is less than that of the SEF method when the two nodes are compromised. In the
simulation results, the number of false reports is 7.66 less than that of the SEF method.
Fig. 13 is a graph of the energy consumption versus the rate of false reports in the proposed
method and that of the SEF method when three sensing nodes which generate MACs
included in the three event reports are compromised.
Figure 13 Energy consumption versus the rate of false reports (Fraction of compromised nodes = 3)
In Fig. 13, the projected technique spent less energy than the SEF. The higher the rate of
false reports, the larger the gap of energy consumption is between the projected technique and
the SEF method. In the simulation result, the proposed method consumed an average of 9.26%
less energy than the SEF.
Fig. 14 is a graph of the number of false reports incoming at the BS in the proposed method
and that of the SEF method when three nodes which create MACs included in an event report
are compromised.
12. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 186 editor@iaeme.com
Figure 14 The number of false reports versus the rate of false reports (Fraction of compromised nodes
= 3)
In Fig. 14, we found that the number of false report incoming at the BS in the projected
technique is less than that of the SEF method. In the simulation result, the number of false
reports was 9.22 less than in the SEF.
Fig. 15 is a graph of the energy consumption versus the rate of false reports in the proposed
technique and in the SEF when four sensing nodes which create MACs included in the three
event reports are compromised.
Figure 15 Energy consumption versus the rate of false reports (Fraction of compromised nodes =4)
In Fig. 15, when the rate of false reports is above 50%, the proposed method had better
energy efficiency than the SEF. In the simulation result, the proposed method consumed an
average 5.63% less energy than the SEF.
Fig. 16 is a graph of the number of false reports arriving at the BS in the proposed method
and in the SEF when four nodes which create MACs included in the event report are
compromised.
13. A Key Level Selection within Hash Chains for the Efficient Energy Consumption in WSNS
http://www.iaeme.com/IJARET/index.asp 187 editor@iaeme.com
Figure 16 The number of false reports versus the rate of false reports (Fraction of compromised nodes
= 4)
In Fig. 16, we found that the number of false report incoming at the BS in the proposed
method is less than in the SEF for all of the false reports rates. In the simulation result, the
number of false reports was 10.14 less than that of the SEF method.
In the simulation results, the proposed method was an average of 7.9% better than the SEF
with respect to energy efficiency. The amount of false reports arriving at the BS in the proposed
method was an average of 6.43 less than in the SEF method. We tested that the higher the rate
of false reports in the sensor network, the better energy efficiency and security there was in the
proposed method compared to the SEF method.
6. CONCLUSION
In this paper, we proposed a resolution which regulates the key sequence level of MACs
included in an event report and verifies them by comparing the key sequence level of the MACs
in the event report with the key sequence level of a node which receives the event report. This
is done in order to preserve energy efficiency so when the possibility of a false report in the
event report is high, the event report verification probability is low, and the energy consumption
of the sensor nodes is low. On the other hand, when the key sequence level is low, the event
report verification probability is high, and energy consumption is high. Thus, it is important to
determine an appropriate key sequence level. In order to determine the appropriate key
sequence level, it is computed by a fuzzy system in a BS. Elements determining the key
sequence level are the density of neighbor nodes in a sensing range of the CoS, the number of
hops from the CoS to the BS, and an average of the key sequence level of intermediate nodes
in each path.
We estimated the energy efficiency and security of the proposed method by equating it to
the SEF method, which is a representative countermeasure method against the false report
injection attack. We measured the energy consumption of the sensor nodes versus the rate of
false reports in the sensor network to evaluate the energy efficiency of either the proposed
method or the SEF. Additionally, we also measured the number of false report received in the
BS versus the rate of false reports to evaluate the security of either the proposed method or the
SEF. In the simulation results, the proposed method consumed an average of 7.9% less energy
of the sensor network. Moreover the number of false reports arriving at the BS in the proposed
method was an average 6.4 less than in the SEF method. It was found from the result that the
projected technique has better energy efficiency and security than the SEF when the rate of
false reports is high.
14. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed
Adil
http://www.iaeme.com/IJARET/index.asp 188 editor@iaeme.com
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology
(No. 2013R1A2A2A01013971)
REFERENCES
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci: Wireless sensor networks: a
survey, Computer Networks, 38(4), 15 (2002) 393-422.
[2] Al-Karaki N., Kamal and A.E.: Routing techniques in wireless sensor networks: a survey,
Wireless Communications, IEEE , 11(6), (2004) 6-28.
[3] Chris Karlof, David Wagner: Secure routing in wireless sensor networks: attacks and
countermeasures, Ad Hoc Networks, 1, (2–3), (2003) 293-315.
[4] Fan Ye, Luo, H., Songwu Lu and Lixia Zhang: Statistical en-route filtering of injected false
data in sensor networks, Selected Areas in Communications, IEEE Journal on , 23(4),
(2005) 839- 850.
[5] Zhen Yu, Yong Guan: A dynamic en-route filtering scheme for data reporting in wireless
sensor networks, IEEE/ACM, 18(1), (2010) 150-163.
[6] J. Hao Yang, Songwu Lu: Commutative cipher based en-route filtering in wireless sensor
networks, Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th , vol.
2, (2004) 1223- 1227.
[7] Sencun Zhu, Setia, S., Jajodia, S. and Peng Ning: An interleaved hop-by-hop authentication
scheme for filtering of injected false data in sensor networks, Security and Privacy, 2004.
Proceedings. 2004 IEEE Symposium on , vol., no., (2004) 9-12, 259- 271.
[8] H.Y. Lee, T.H. Cho: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor
Networks, Lect. Notes Comput. Sc, vol. 4371, Springer, Heidelberg (2006) 116–127.
[9] Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A
Predistribution and Local Collaboration-based Approach, In: Proc. of INFORCOM, (2005)
503– 514.
[10] Perrig, A., Szewczyk, R. and Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols
for Sensor Networks. Wirel. Netw. 8(5), (2002) 512–534.
[11] B.H. Kim, T.H. Cho: Condition-based Key Dissemination Period Determining Method in
Sensor Networks, In Proc. Of ICACT, (2008).
[12] S.J. Lee, H.Y. Lee and T.H. Cho: A Threshold Determining Method for the Dynamic
Filtering in Wireless Sensor Networks Based on Fuzzy Logic, International Journal of
Computer Science and Network Security, 8(4), Apr. (2008).
[13] M.H Han, H. Y. Lee and T.H. Cho: Fuzzy-Based Verification-Probability Determination
Method for Dynamic Filtering in Sensor Networks, International Journal of computer
Science and Network Security, 8(8), Aug. (2008) 132-136.
[14] H.Y. Lee, T.H. Cho: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in
Sensor Networks, IEICE Transactions on Communications, E90-B(12), Dec. (2007) 3346-
3353.