The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
The document proposes a Hierarchical Intrusion Detection System (HIDS) using multiple mobile base stations to improve security and efficiency in cluster-based wireless sensor networks. The system utilizes Monitor Nodes to detect compromised cluster heads and immediately alert the nearest of three mobile base stations, which then stops receiving messages from blacklisted nodes. This addresses issues with prior systems that allowed blacklisted nodes to continue communicating until an attack threshold was reached. Using multiple mobile base stations reduces energy consumption compared to stationary bases, extending network lifetime. The proposed HIDS aims to more securely and efficiently transmit data in wireless sensor networks.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
Research on key predistribution scheme of wireless sensor networksIAEME Publication
This document summarizes a research paper on a novel key pre-distribution scheme for wireless sensor networks. It begins with an introduction to the challenges of key management in wireless sensor networks. It then describes the proposed scheme which has three phases: setup, direct key establishment, and path key establishment. The setup phase generates a large key pool and distributes keys to each sensor node. Direct key establishment allows sensor nodes to discover if they share keys directly. Path key establishment establishes keys through intermediate nodes if direct sharing fails. Performance analysis shows the scheme has higher local connectivity and stronger resilience against node capture attacks compared to previous schemes.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...paperpublications3
Abstract: A wireless sensor network (WSN) is an technology playing a vital role nowdays. One of the major challenges wireless sensor networks face today is security. Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. The power of wireless sensor networks lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. The denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced. This paper aims with power exhausting attacks and energy consumption on wireless sensor networks.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...Karthikeyan Ece venkatesan
This document summarizes a research paper that proposes a three-tier security architecture for wireless body area networks (WBANs). The architecture consists of three tiers: 1) Proxy re-encryption is used between biomedical sensors to establish the first tier; 2) Data is encrypted using DES when sent from sensors to a network controller/coordinator to form the second tier; 3) The third tier uses AODV routing to encrypt data being sent from a home access point to a hospital gateway. The goal is to securely transmit biosignals in WBANs using an efficient key management approach based on existing cryptographic algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
Data secrecy is one of the key concerns for wireless body sensor networks (WBSNs). Usually, a data
secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face
more serious limitations than general wireless networks in terms of energy supply. To address this, in this
paper, we propose an energy efficient data secrecy scheme for WBSNs. On one hand, the proposed key
establishment protocol integrates node IDs, seed value and nonce seamlessly for security, then
establishes a session key between two nodes based on one-way hash algorithm SHA-1. On the other hand,
a low-complexity threshold selective encryption technology is proposed. Also, we design a security
selection patter exchange method with low-complexity for the threshold selection encryption. Then, we
evaluate the energy consumption of the proposed scheme. Our scheme shows the great advantage over
the other existing schemes in terms of low energy consumption.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
SEECH is a secure and energy efficient centralized routing protocol for hierarchical wireless sensor networks. It utilizes a base station to efficiently form clusters based on sensor node energy levels and neighbor information. The base station selects cluster heads that have above average energy and many neighbors. Cluster heads then schedule sensor node transmissions to reduce interference and aggregate and encrypt sensor data before transmitting to the base station or other cluster heads. SEECH aims to prolong network lifetime by minimizing energy consumption through efficient clustering and routing.
Data transmitted encryption for clustering protocol in heterogeneous wireless...nooriasukmaningtyas
In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
This document summarizes and compares several energy-efficient routing cluster protocols for wireless sensor networks, including LEACH, LEACH-C, TL-LEACH, PEGASIS, ER-LEACH, and LEACH-SM. It first provides background on wireless sensor networks and the need for energy efficiency in routing protocols. It then reviews each of the protocols, describing their clustering approach and how they select cluster heads. The document analyzes and compares the performance of the protocols based on metrics like throughput, network lifetime, energy efficiency, and load balancing. It finds that PEGASIS and TL-LEACH generally perform best in terms of throughput and network lifetime, while LEACH-C and ER-LEACH also
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
This document provides a literature review of various methods proposed by researchers to improve energy efficiency and security in wireless sensor networks (WSNs). It summarizes several key energy efficient routing protocols like LEACH, PEGASIS and TEEN, as well as security threats like denial of service attacks, wormhole attacks, and Sybil attacks. The document reviews several studies that have developed algorithms and schemes to reduce energy consumption through techniques like dynamic clustering, mobile agent clustering, and randomized routing. It also discusses schemes to prevent security issues like false data injection and improve data authentication. The conclusion states that future work needs to focus on improving battery power and providing better fault tolerance and protection from severe security threats in WSNs.
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
This document surveys fuzzy logic techniques for estimating congestion in wireless sensor networks. It begins by providing background on wireless sensor networks and issues like limited battery life. It then discusses clustering as a technique to reduce energy consumption by having cluster heads aggregate and transmit data. The document reviews applications of fuzzy logic in wireless sensor networks for clustering, data fusion, and security. It defines congestion as excessive network load and discusses how fuzzy logic techniques can help estimate congestion to reduce problems like queuing delays and packet loss compared to non-fuzzy approaches. In conclusion, fuzzy logic provides a better approach for estimating congestion in wireless sensor networks.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
The document summarizes an algorithm proposed to reduce energy consumption in wireless sensor networks using duty cycling and multi-hop routing. The key aspects of the algorithm are:
1) Layering the network environment based on size and identifying the optimal number of cluster heads in each layer.
2) Selecting the first layer closest to the sink as the "gateway layer" and stopping energy usage in half of these sensors to extend the network lifespan.
3) Using multi-hop routing whereby cluster heads send data to heads in the above layer until the gateway layer, which then sends to the static or mobile sink.
4) Simulation results showed the proposed algorithm performs better than LEACH and ELEACH in terms of
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
This document provides an overview of hierarchical energy protocols in wireless sensor networks. It discusses several key protocols including LEACH, PEGASIS, TEEN, and APTEEN. LEACH is described as a clustered-based protocol that randomly selects cluster heads to help distribute the energy load. PEGASIS is presented as an improvement on LEACH that forms chains between sensor nodes to help reduce energy usage. TEEN is a reactive protocol designed for time-critical applications, using hard and soft thresholds to reduce transmissions. Finally, APTEEN is summarized as an extension of TEEN that aims to support both periodic data collection and responding to important events.
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
Similar to A secure and energy saving protocol for wireless sensor networks (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A secure and energy saving protocol for wireless sensor networks
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3353~3360
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.2796 3353
Journal homepage: http://beei.org
A secure and energy saving protocol for wireless sensor
networks
Aso Ahmed Majeed1
, Baban Ahmed Mahmood2
, Ahmed Chalak Shakir3
1
Department of Parasitology, College of Veterinary Medicine, University of Kirkuk, Iraq
2,3
Network Department, College of Computer Science and Information Technology, University of Kirkuk, Iraq
Article Info ABSTRACT
Article history:
Received Jan 10, 2021
Revised Apr 26, 2021
Accepted Oct 4, 2021
The research domain for wireless sensor networks (WSN) has been
extensively conducted due to innovative technologies and research directions
that have come up addressing the usability of WSN under various schemes.
This domain permits dependable tracking of a diversity of environments for
both military and civil applications. The key management mechanism is a
primary protocol for keeping the privacy and confidentiality of the data
transmitted among different sensor nodes in WSNs. Since node's size is small;
they are intrinsically limited by inadequate resources such as battery life-time
and memory capacity. The proposed secure and energy saving protocol
(SESP) for wireless sensor networks) has a significant impact on the overall
network life-time and energy dissipation. To encrypt sent messsages, the
SESP uses the public-key cryptography’s concept. It depends on sensor nodes'
identities (IDs) to prevent the messages repeated; making security goals-
authentication, confidentiality, integrity, availability, and freshness to be
achieved. Finally, simulation results show that the proposed approach
produced better energy consumption and network life-time compared to
LEACH protocol; sensors are dead after 900 rounds in the proposed SESP
protocol. While, in the low-energy adaptive clustering hierarchy (LEACH)
scheme, the sensors are dead after 750 rounds.
Keywords:
Attack
Cryptography
Heterogenous WSN
Key management
Security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Baban Ahmed Mahmood
Department of Network
University of Kirkuk, Kirkuk, Iraq
Email: baban.mahmoodjaf@gmail.com
1. INTRODUCTION
Recently, the wireless sensor network (WSN) has been considered as a new processing technology.
The WSN consists of hundreds of compact and tiny sensor nodes and has a wide range of applications such
as home automation, traffic control, flood, tsunami, or earthquake detection, microclimates and monitoring
for hazardous gases, and structural health monitoring. Also in terrain scanning, intelligent guiding, imaging,
and battlefield surveillance, which are mean to enable monitoring and tracking of movements of vehicles and
the presence of enemy forces. Commercial applications include inventory control, vehicle tracking and
detection, and monitoring congestion and prevention of road accidents. Health applications include medical
monitoring, behavior monitoring, elderly assistance, measurement of blood parameters, remote monitoring of
physiological data, and wearable computing. Agriculture applications encompass humidity and temperature
measurement, automatic control over water sprinklers, and precision agriculture. Also applications in smart
furniture and space exploration, sound, and vibration [1], [2].
Since sensor nodes' sizes are small, the nodes are constraint with resources like energy, storage,
processing capabilities, and available bandwidth [3], [4]. These nodes are distributed in environments which
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3354
cannot be monitored or controlled with traditional networks especially, in military application. Moreover, the
link in the network should be secure and strongly by encryption to put hacker's and intruders at bay [5]-[7].
Also, the encryption and decryption are done by the mathematics equation which is acceptable for the tiny
nodes [8]. In WSN a data gathering causing high conservation of energy. In general, saving energy is done by
eliminating redundant data in transmission which leads to reducing the number of exchanged messages
among the nodes in the network [9].
Encryption is an effective method to protect data. While its techniques convert plaintext content into
unreadable ciphertext [10], [11]. Here, In the network, a sent message is encrypted by the sender’s private
key and receiver’s public-key. On the receiver side, a message is decrypted by the receiver's private key. On
the other hand, in symmetric key cryptography, senders and receivers use the same shared key to encrypt and
to decrypt messages. This means that both sender and receiver need a secure channel to exchange the shared
or secret key between them. Furthermore, the hash function is another type of encryption that produces a
fixed number of bits and this process is known as a message digest [5].
This paper proposes an efficient protocol called SESP which uses the public-key cryptography’s
concept by depending on IDs to ensure a secure link between nodes. This leads to an increase in battery and
network life-time. The sensors are vulnerable to various attacks because of their tiny and resource constraint
which can not be uploaded by complex encryption methods. Consequently, the securing link between
participating nodes and their energy conservation are challenging issues.
The rest of the paper is organized in the following order; section 2, we sum up several different
algorithms given recently in the literature, section 3, the radio energy dissipation model is presented and its
merits and demerits are shown, section 4, a comprehensive explanation of the proposed SESP protocol is
presented, sections 5 and 6, security goal analysis and attacks' analysis are described respectively, section 7
concludes the paper.
2. RELATED WORK
WSNs comprise many sensor nodes (l) that can gather data and communicate wirelessly.
Additionally, most WSNs include two other components, which are the cluster head (CH) and the base
station (BS) [12]. The key management plays an essential role to solve issues such as authentication and
authorization which are critical [1].
Zhu et al. [13] reckon that a scalable and distributed protocol is described that allows a shared key
to be established by each pair of nodes. Moreover, two different protocol s, namely, threshold secret sharing
and probabilistic key sharing are the basis of a protocol designed. The shared key is used for authentication
between the two nodes. Furthermore, each node in this protocol should obtain its neighbors' identity (ID) to
calculate the shared key. The node is loaded with a small fraction of the keys from the pool before
deployment. Also, after distribution by using a probabilistic protocol (public and deterministic) that allows
each pair of nodes, with a certain probability, to share one or more keys. Finally, every pair of nodes
connected directly via one or more keys in their key sets, and in case of no shared key, the nodes connect
indirectly through an intermediate node. The protocol guarantees connectivity, and because the message is
repeated, the adversary can get the key and attacks the network by exhausting the energy of the sensor.
Finally, the network will be hacked.
Huang et al. [12] improve the low-energy adaptive clustering hierarchy (LEACH) protocol by using
hybrid nodes. The network encompasses of WSNs and a distributed fiber sensor link, which is positioned at the
middle of the sensor field. The last one needs a steady and comparatively higher power supply. The authors
isolate the network into two areas wherein the sensors have restricted energy. Moreover, there is no
communication between the two areas. The node's life-time in this protocol is better than the LEACH protocol,
but they did not talk about message encryption which makes the network insecure and vulnerable to attacks.
Heinzelman et al. [14] produce LEACH protocol, the nodes in the network are homogenous and
each node can gather data and send it to the base station. After distribution, the sensors select themselves to
become cluster head at a threshold, after which they distribute their status to the other nodes inside the
network. The other nodes choose the CH sensor depending on minimal communication energy. Eventually,
in LEACH, periodically, a group of nodes is selected as a cluster-based to guarantee that energy load is
distributed evenly among the nodes of the different groups. This protocol needs message authentication to
prevent the network from malicious nodes.
Rasul et al. [15] propose a key distribution scheme wherein random key pre-distribution is used
such that better security and performance are achieved for a heterogeneous sensor network (HSN). On the
other hand, a homogeneous network produces both high computation and communication overhead in
addition to higher storage. The authors use a key pool, a small number of keys, to generate random keys. Key
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3355
chains, that are made using a one way hash function, make a key pool. For each sensor node, a small number
of generation keys that are randomly selected is assigned.
3. RADIO ENERGY DISSIPATION MODEL
The model in Figure 1 for the radio hardware energy distraction where the energy is dissipated by
the transmitter to operate the power amplifier and the radio electronics [16]. Also, the energy is dissipated by
the receiver to run the radio electronics as depicted in Figure 1.
Figure 1. Radio energy dissipation model
In this scheme, based on the distance between the transmitter and receiver, the channel models
multipath fading (d4 power loss) and free space (d2 power loss) were used. Sensors spend energy to transmit
and receive k bits packet (length of message) to a distance d as described as shown in:
ET = ETx-elec (l)+ETx-amp (l, d)
= lEelec+lϵfs kd2 d<Do (1)
= lEelec+lϵmp kd4 d≥Do
This loss can be inverted using power control when the power amplifier is properly configured.
When the distance is lower than a predefined threshold, the free space model is considered; otherwise, the
multipath model is utilized [16]. The energy of the electronics, Eelec, depends on different factors such as
modulation, filtering, digital coding, and spreading of the signal. On the other hand, the energy of the
amplifier, 𝜖fs*d2
or 𝜖mp*d4
, depends on a sufficient bit-error-rate and the distance between the transmitter and
receiver. The parameters for the energy of the communication are Eelec=50 nJ/bit,∈fs=10 pJ/bit/m2
,
∈mp=0.0013pJ/bit/m4. However, the data aggregation energy is EDA=5 nJ/bit/signal and the threshold
distance value Do is given as shown in [16]:
𝐷𝑜 = √
𝐸𝑓𝑠
𝐸𝑎𝑚𝑝
(2)
The proposed SESP protocol uses the radio energy dissipation model because it uses less energy
than the LEACH protocol.
4. PROPOSED SESP PROTOCOL
This paper proposes a MAC formula for key management that is designed for hierarchical WSNs.
each cluster head (CH) and sensor (L) has their IDs in hierarchical WSN. Besides, only the CH can
communicate with base station (BS), the L sensors can communicate with CH, and L sensors cannot
communicate with each other’s [17].
In the network, the CHs have high power, large memory capacity, and great process capability.
However, the L sensors are normal (restricted energy and memory size) [5], [18]. The distribution area is
(100 x 100) m2
, number of CHs are two with 100 L sensors which are scattered randomly in the uncontrolled
area [19], [20], the circles are L sensors, pink rectangles are CHs sensors and the green star is BS as shown in
Figure 2. There are no power restrictions for the BS, high storage capacity, and larger communication [5],
[18], while the power consumption has to be highly reserved for the scattered nodes to keep the life-time of
the network as long as possible and position in a safe area. The L sensors' costs are cheaper than CH and that
is due we use two CHs, and in case of increases in the CHs, the cost will increase. Moreover, when using
large areas, we can increase the number of CHs and BS.
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3356
Figure 2. CHs send hello message
4.1. Network setup
4.1.1. Pre-distribution phase
In this part, the initialization and authentication start including the equations needed for
communication taking into consideration the following assumptions:
- The network area is 100 x 100 m2
.
- CH directly links with BS and it has the IDs of all Ls and BS.
- L sensors have the CHs IDs which are two and L nodes are 100.
- BS exchanges the messages with L sensors via CH and vice versa.
- L sensors’ initial energy is 0.5J.
4.1.2. Distribution phase
After random deployment, each CH broadcasts a hello message as shown in Figure 2 and Figure 3
where IDCH is the identification of the cluster head, || is an append operation, ⨁ is an XOR operation, K∈G is
an integer number that starts with one and increased by one in each round to prevent message redundancy,
and i is the sensor number.
Figure 3. The SESP protocol
In step 2, each L receives more than one message from different CHs and chooses the strongest
CH’s signal after decrypting the message according to Figure 4 [21]. Moreover, the L sensor sends an
encrypted message to selected CH consists of its ID as shown in Figure 4. The dotted green line represents
near Ls to CH spends energy according to (1) when d<D0 and the dotted orange line considers the far Ls
from CH which spends energy according to (1) when d>=D0.Figure 4. The SESP protocol.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3357
Figure 4. L sensors select the near CH
In step 3, each CH decrypts the Ls message and identifies the legal node via preloaded ID, then
creates its cluster and joins the BS as shown Figure 5. In step 4, the BS sends an acknowledgment to each CH
according to Figure 6 and leads to complete the network. Moreover, the message is encrypted and decrypted
using a protocol shown in Figure 7. In the proposed SESP protocol, nodes select their respective CHs
according to the signal ratio from the node that announces itself as CH. Data aggregation is executed by CH,
thus CH nodes consume relatively much more energy than member nodes. Calculation of energy dissipated is
performed based on distance.
Figure 5. CHs send a message to BS Figure 6. The proposed network
Figure 7. Message encryption and decryption
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3358
5. SECURITY GOALS ANALYSIS
The security goals’ analysis is the main part of the proposed SESP protocol as given as shown in:
- Authentication: each node in the proposed SESP protocol has a unique key (ID). The sender encrypts its message
by its ID in a formula. Besides, the receiver authenticates the received message by the ID of the sender.
- Confidentiality: messages in the proposed protocol is encrypted via an equation: the ID of each sensor
remains secret from the enemy by embedding it in the formula. Moreover, it is not repeated.
- Integrity: the proposed SESP protocol protects the received messages from alteration and modification by
using an embedded ID in the formula described above in the proposed protocol.
- Availability: the network in the proposed SESP protocol is survived until the nodes spend their energy.
Further, the messages are updated in each round.
- Freshness: this goal is achieved because first, the messages exchanged are fresh, and second, the
resending of old data is avoided using a counter in the formula.
- Resilience: if an attacker compromises the CHs, then he/she can hack the network. Besides, if the attacker
compromises Ls, he/she can hack only this cluster.
Besides, Table 1 shows the comparison between the proposed SESP protocol and the protocols
presented in the literature in terms of security goals according to reference [22].
Table 1. Comparison according to security goal
Requirements Proposed SESP Protocol Protocol [23] Protocol [24] Protocol [25]
Authentication ✓ ✓ ✓ ✓
Confidentiality ✓
Integrity ✓ ✓
Scalability ✓ ✓ ✓
Resilience
Cryptographic mechanism ✓ ✓ ✓ ✓
6. ATTACKS ANALYSIS
The proposed SESP method is effective versus different attacks as explained as shown in:
- Eavesdrops attack: the proposed SESP protocol is resistant to this attack because the attacker catches the
signals. However, he/she cannot determine what the message includes because the message’s contents are
a stream bit of numbers, which makes the message non-understandable.
- Sybil attack: this does not influence the network of the proposed SESP protocol because the nodes’ IDs
are embedded in a formula.
- Sinkhole attack: the nodes in the proposed SESP protocol decrypt the messages according to the formula
supplied in pre-distribution. Therefore, the attacker’s messages will be canceled.
- Wormhole attack: the attacker work to make a tunnel and change the network route. The attacker doesn’t
affect our network unless he/she gains the formula.
- Hello flood attack: the proposed SESP protocol is resistant to this attack because the nodes in the proposed
SESP protocol have the BS’s ID which is embedded in a formula, and recognize the illegitimate BS.
- Clone attack: the intruder can attack and hack the network of the proposed SESP protocol.
Table 2 shows the comparison between the proposed SESP protocol and other protocols presented in
the related work in terms of security goals according to this reference [15]. Furthermore, Figure 8 shows the
life-time of the sensors. We can see that the proposed SESP protocol is satisfied in terms of the death and life
of sensors. The sensor is dead after 750 rounds in the LEACH protocol. while, in the proposed SESP
protocol, the sensors are dead after 900 rounds; due to the use of the model in section (3 radio energy
dissipation model). Further, Figure 9 shows the total dissipated energy for all the sensors to propose SESP
protocol is better than LEACH protocol. due to the use of the model in section (3 radio energy dissipation
model). Finally, the simulation of the proposed SESP protocol that was done by MATLAB R2015a shows
that the proposed SESP protocol is better than LEACH.
Table 2. Comparison according to attack in WSN.
Protocol
Attack
Protocol [26] Protocol [27] Proposed SESP protocol
Eavesdropping ✓
Hello flood ✓ ✓
Worm-hole ✓ ✓ ✓
Sinkhole ✓ ✓ ✓
Sybil ✓ ✓
Clone attack
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A secure and energy saving protocol for wireless sensor networks (Aso Ahmed Majeed)
3359
Figure 8. Number of nodes alive in proposed SESP
protocol vs LEACH in round
Figure 9. Total dissipated energy of proposed SESP
protocol vs LEACH in round
7. CONCLUSION
The proposed SESP protocol is based on a hierarchical network. Nodes in the network establish a
secure link through a protocol constructed based on public-key cryptography principles wherein, the ID is
considered as a public-key and the formula as a private key. The message in the proposed SESP protocol is
encrypted and never repeated in the network (i.e., no other sensor sends a message that was sent by other
sensors). İn each round, there are new messages different from the messages either in the previous and/or the
next round. That makes the proposed SESP protocol attain security goals like authentication, confidentiality,
integrity, availability, and freshness. Moreover, the proposed SESP protocol is resistant to various attacks
mentioned above in the attack analysis. Finally, the simulation produced better energy consumption,
dissipated energy, network life-time, and better security goals compared to the leach.
REFERENCES
[1] R. Priyadarshi, B. Gupta and A. Anurag, "Deployment techniques in wireless sensor networks: a survey,
classification, challenges and future research issues," The Journal of Supercomputing, Springer, vol. 76, pp. 1-41,
2020, doi: 10.1007/s11227-020-03166-5.
[2] B. A. Mahmood and D. Manivannan, "Position based and hybrid routing protocols for mobile ad hoc networks: a
survey," Wireless personal communications, vol. 83, no. 2, pp. 1009-1033, 2015, doi: 10.1007/s11277-015-2437-8.
[3] L. Tawalbeh, S. Hashish and H. Tawalbeh, "Quality of service requirements and challenges in generic WSN
infrastructures," Procedia Computer Science, vol. 109, pp. 1116-1121, 2017, doi: 10.1016/j.procs.2017.05.441.
[4] E. H. Putra, R. Hidayat, Widyawan and I. W. Mustika, "Energy-Efficient Routing Based on Dynamic Programming
for Wireless Multimedia Sensor Networks (WMSNs)," International Journal of Electronics and
Telecommunications, vol. 63, no. 3, pp. 279-283, 2017, doi: 10.1515/eletel-2017-0037.
[5] A. A. Majeed, "Cluster forming based on spatial information using HMAC in WSN," Tikrit Journal of Pure
Science, vol. 22, no. 6, pp. 131-139, 2017.
[6] B. A. Mahmood and D. Manivannan, "GRB: Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc
Networks," in IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, 2015.
[7] B. Mahmood, A. Ibrahim and D. Manivannan, "Sariadne: A secure source routing protocol to prevent hidden-
channel attacks," in IEEE 12th International Conference on Wireless and Mobile Computing, Networking and
Communications (WiMob), 2016, doi: 10.1109/WiMOB.2016.7763267.
[8] A. A. Majeed, K. A. Ameen, A. C. Shakir and Y. Alyeksyeyenkov, "The Enhanced Data Sequence Method for
ECC Cryptosystem," Applied Mathematical Sciences, vol. 8, no. 112, pp. 5553-5564, 2014.
[9] K. N. S. Kumar and Shivashankar, "A review on security and privacy issues in wireless sensor networks," in 2nd
IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
(RTEICT), 2017, doi: 10.1109/RTEICT.2017.8256945 .
[10] H. R. Zagi and A. T. Maolood, "A Novel Serpent Algorithm Improvement By The Key Schedule Increase
Security," Tikrit Journal of Pure Science, vol. 6, pp. 114-125, 2020, doi: 10.25130/j.v25i6.1078.
[11] B. A. Mahmood and D. Manivanann, "Hybrid on-demand greedy routing protocol with backtracking for mobile ad-
hoc networks," International Journal of Pervasive Computing and Communications, vol. 16, no. 1, pp. 24-52,
2020.
[12] J-Y Huang, I-E Liao and H-W Tang, "A forward authentication key management scheme for heterogeneous sensor
networks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, no. 1, p. 296704, 2011.
[13] S. Zhu, S. Xu, S. Setia and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: a
probabilistic approach," 11th IEEE International Conference on Network Protocols, 2003. Proceedings., 2003, pp.
326-335, doi: 10.1109/ICNP.2003.1249782.
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3353 – 3360
3360
[14] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for wireless
microsensor networks," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,
2000, doi: 10.1109/HICSS.2000.926982.
[15] K. Rasul, N. Nuerie and A. K. Pathan, "An Enhanced Tree-Based Key Management Scheme for Secure
Communication in Wireless Sensor Network," in IEEE 12th International Conference on High Performance
Computing and Communications (HPCC), 2010, doi: 10.1109/HPCC.2010.14.
[16] W. B. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, "An application-specific protocol architecture for
wireless microsensor networks," in IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670,
Oct. 2002, doi: 10.1109/TWC.2002.804190.
[17] D. N. Ravikiran and C. G. Dethe, "Improvements In Routing Algorithms to Enhance Lifetime of Wireless Sensor
Networks," International Journal of Computer Networks & Communications (IJCNC), vol. 10, no. 2, pp. 23-32,
2018, doi: 10.5121/ijcnc.2018.10203.
[18] J. Sumathi and R. L. Velusamy, "A review on distributed cluster based routing approaches in mobile wireless
sensor networks," J Ambient Intell Human Comput., vol. 12, pp. 835-849, 2021, doi: 10.1007/s12652-020-02088-7.
[19] J. Shen, A. Wang, C. Wang, P. C. K. Hung and C. Lai, "An Efficient Centroid-Based Routing Protocol for Energy
Management in WSN-Assisted IoT," in IEEE Access, vol. 5, pp. 18469-18479, 2017,
doi:10.1109/ACCESS.2017.2749606.
[20] S. G. Susila and J. Arputhavijayaselvi, "Innovative Energy Resourceful Merged Layer Technique (MLT) of Node
Deployment to Enhance the Lifetime of Wireless Sensor Networks," Egyptian Informatics Journal, vol. 16, no. 1,
pp. 23-28, 2015, doi: 10.1016/j.eij.2014.11.002.
[21] K. Haseeb, I. Ud Din, A. Almogren and N. Islam, "An Energy Efficient and Secure IoT-Based WSN Framework:
An Application to Smart Agriculture," Sensors, vol. 20, no. 7, pp. 1-14, 2020, doi: 10.3390/s20072081.
[22] O. Cheikhrouhou, A. Koubâa, M. Boujelben and M. Abid, "A lightweight user authentication scheme for Wireless
Sensor Networks," in ACS/IEEE International Conference on Computer Systems and Applications-AICCSA, 2010.
[23] Z. Benenson, F. Gärtner and D. Kesdogan, "User Authentication in Sensor Networks," Computer Science Connects,
vol. 2, pp. 385-389, 2004.
[24] C. Jiang, B. Li and H. Xu, "An Efficient Scheme for User Authentication in Wireless Sensor Networks," in 21st
International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.
[25] H. Tseng, R. Jan and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor
Networks," in IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 2007.
[26] S. Hussain, F. Kausar and A. Massood, "An efficient key distribution scheme for heterogeneous sensor networks,"
in international conference on Wireless communications and mobile computing, ACM, August 2007.
[27] B. Maala, H. Bettahar and A. Bouabdallah, "TLA: A Tow Level Architecture for Key Management in Wireless
Sensor Networks," in Second International Conference on Sensor Technologies and Applications, 2008.
BIOGRAPHIES OF AUTHORS
Aso Ahmed Majeed is currently an instructor at University of Kirkuk Kirkuk, Iraq. He received a
B.Sc. in software engineering from Technical College, Kirkuk, Iraq in 2004 and M.Sc. in Computer
Engineering from Cankaya University, Ankara, Turkey in 2015. He published his research in the
following areas: computer networks, security in wireless sensors network, and AI.
Baban Ahmed Mahmood is currently the chairman of Networks Department at University of
Kirkuk, Kirkuk, Iraq. He received a B.Sc., degree in Computer and Software engineering from
University of Al-Mustansryah, Iraq, in 2003 and a M.Sc., degree in Computer Science from
University of Sulaimaniya, Iraq, in 2009. He received a PhD degree in Computer Science from
University of Kentucky, Lexington, Kentucky, USA 2016. He worked in the program of some
international conferences. He reviewed many papers for several prestigious journals and conferences.
He published his research work in the following areas: routing in ad hoc networks, security of source
routing protocols in MANET, and security of health records via cloud.
Ahmed Chalak Shakir is currently the dean of the College of computer science and information
technology, University of Kirkuk, Iraq. He received a B.Sc, degree in Computer and Software
Engineering from University of Al-Mustansryah, Iraq, in 2001. In 2002 he got a High Diploma
degree in software engineering from Iraqi commission for computers & informatics/ Institute for
post graduate studies in informatics, Bagdad, Iraq, and a M.Sc., degree in Computer Science from
University of Sulaimaniya, Iraq, in 2007. He also received a PhD degree in Computer Engineering,
Harbin institude of technology, china in 2013. He published his research work in the following areas:
information and network security.