The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
In recent years, wireless sensor network (WSN) is used in several application areas resembling observance, tracking, and dominant in IoTs. for several applications of WSN, security is a crucial demand. However, security solutions in WSN disagree from ancient networks because of resource limitation and process constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. This paper additionally presents characteristics, security needs, attacks, cryptography algorithms, and operation modes. This paper is taken into account to be helpful for security designers in WSNs.
The document describes an intrusion detection system for cluster-based wireless sensor networks. It proposes using MAC address-based intruder tracking to detect intruders early. The system divides the network into clusters, with cluster heads monitoring members. It uses port numbers, IP addresses and MAC addresses to authenticate nodes and detect intruders pretending to be valid nodes. If intruder behavior is detected, an alarm is raised. The approach aims to securely transmit data in the network by identifying and preventing malicious intrusions and attacks.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
This document describes a proposed artificial neural network based intrusion detection system. It uses a multilayer perceptron neural network architecture trained on the KDD Cup 99 intrusion detection dataset. The system monitors network traffic in real-time, extracts features from network packets, and classifies the traffic into six categories using the neural network. It is able to detect both known and unknown attacks. The system aims to improve upon traditional signature-based intrusion detection systems.
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
This document discusses a modular approach to intrusion detection in homogeneous wireless networks. It begins by introducing wireless networks and the need for intrusion detection systems (IDS) due to security vulnerabilities. It then discusses different types of IDS, including signature-based detection that identifies known attacks, and anomaly-based detection that identifies deviations from normal behavior but can result in high false positives. The document proposes a modular approach combining advantages of signature-based and anomaly-based detection for high detection rates and low false positives. Requirements for IDS in wireless networks are also outlined.
International Journal of Computer Science and Security Volume (2) Issue (1)CSCJournals
This document discusses intrusion detection in mobile ad hoc networks (MANETs). It begins with background on intrusion detection systems (IDS) in general and why they are important for MANETs given their vulnerabilities. It then discusses three key aspects of IDS for MANETs: common attacks on MANETs, architectures for IDS in MANETs, and achievements in research on IDS for MANETs. Specifically, it reviews research on IDS architectures, detection techniques, resistance to attack types, and applicability to different routing protocols. The document provides an overview of issues and approaches regarding securing MANETs through intrusion detection.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
This document presents two key management schemes called IAMKeys and KEMESIS that aim to securely encrypt data transmitted in wireless body area networks (WBANs). IAMKeys allows the sender and receiver to independently generate encryption keys for each data frame without exchanging keys. It uses physiological data stored as reference frames as seeds for a pseudorandom number generator to generate encryption keys. KEMESIS is designed for securing communication between sensors in a WBAN and uses a similar approach with one encryption key. The schemes aim to achieve security while minimizing computational overhead for resource-constrained WBAN sensors.
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
This document proposes a secure authentication approach for wireless sensor networks using dynamic key management and zero knowledge protocols. It begins with background on wireless sensor networks and security issues. It then describes related work on key predistribution and dynamic key management schemes. A proposed algorithm is described that uses a rekeying mechanism, zero knowledge authentication without directly transmitting secret keys, and dynamic keys that change for each authentication. Simulation results on networks of up to 25 nodes show the approach is efficient and can authenticate nodes while preventing attacks like cloning.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
This document summarizes an enhanced adaptive acknowledgement protocol for securing wireless sensor network communication. It begins by describing security challenges in WSNs like the wireless medium, hostile environments, and resource constraints. It then discusses common security attacks like black hole and grey hole attacks. Existing acknowledgement schemes like Watchdog, TWOACK, and AACK are explained along with their limitations in detecting such attacks. The document proposes an Enhanced Adaptive Acknowledgement (EAACK) scheme that uses ACK, Secure ACK, and Misbehavior Report Authentication to better detect attacks while reducing overhead. EAACK aims to securely detect black hole, grey hole, and false misbehavior reporting in wireless sensor networks.
This document summarizes and evaluates techniques for identifying adversary attacks in wireless sensor networks. It begins by describing common types of attacks and issues with cryptographic identification methods. It then evaluates existing localization techniques like Received Signal Strength (RSS) and spatial correlation analysis. Specifically, it proposes the Generalized Model for Attack Detection (GMFAD) which uses Partitioning Around Medoids (PaM) clustering on RSS readings to detect multiple attackers. It also presents the Coherent Detection and Localization Model (CDAL-M) which integrates PaM with localization algorithms like RADAR and Bayesian networks to determine attacker locations. The document analyzes these techniques' effectiveness at detecting and localizing multiple adversary attackers in wireless sensor networks.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of
messages, battery exhausting, and nodes compromising. While most of these attacks can be
dealt with through cryptographic security protocols provided by key management schemes,
there are always a few that manage to really cause problems. One such attack that is most
common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture
and compromise some nodes and inject them into several locations throughout the network in
order to conduct other types of attacks. Moreover, if this attack is not detected early, then these
replicated injected nodes will consume a large amount of the network resources. In this paper,
we analyze several key management schemes that can be used for checking integrity and
preventing cloning attacks. After analyzing the problems associated with these schemes, we
propose a model that allows us to distinguish between legitimate nodes and cloned nodes in
such sensor networks.
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
This document proposes a security model for wireless sensor networks that addresses cloning attacks, man-in-the-middle attacks, and replay attacks. It divides sensor nodes into base stations, cluster heads, and member nodes. Each node knows its cluster head, and base stations store information on all nodes. The model uses a "social fingerprint" based on neighboring nodes and zero knowledge protocols to detect cloned nodes and verify sender authenticity without transmitting sensitive information. Screenshots demonstrate implementation and the model is analyzed for various attack scenarios, performance, and cryptographic strength.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
In this research work an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) will be implemented to detect and prevent critical networks infrastructure from cyber-attacks. To strengthen network security and improve the network's active defense intrusion detection capabilities, this project will consist of intrusion detection system using honey token based encrypted pointers and intrusion prevention system which based on the mixed interactive honeypot. The Intrusion Detection System (IDS) is based on the novel approach of Honey Token based Encrypted Pointers. This honey token inside the frame will serve as a trap for the attacker. All nodes operating within the working domain of critical infrastructure network are divided into four different pools. This division is based per their computational power and level of vulnerability. These pools are provided with different levels of security measures within the network. IDS use different number of Honey Tokens (HT) per frame for every different pool e.g. Pool-A contains 4 HT/frame, Pool-B contains 3 HT/frame, Pool-C contains 2 HT/frame and Pool-D contain 1 HT/frame. Moreover, every pool uses different types of encryption schemes (AES-128,192,256). Our critical infrastructure network of 64 nodes is under the umbrella of unified security provided by this single Network Intrusion Detection System (NIDS). After the design phase of IDS, we analyze the performance of IDS in terms of True Positives (TP) and False Negatives (FN). Finally, we test these IDS through Network Penetration Testing (NPT) phase. The detection rate depends on the number of honey tokens per frame. Our proposed IDS are a scalable solution and it can be implemented for any number of nodes in critical infrastructure network. However, in case of Intrusion Prevention System (IPS) we use Virtual honeypot technology which is the best active prevention technology among all honeypot technologies. By using the original operating system and virtual technology, the honeypot lures attackers in a pre-arranged manner, analyzes and audits various attacking behavior, tracks the attack source, obtains evidence, and finds effective solutions.
1) The document proposes an attack library based intrusion detection system and dynamic certificate authority to secure mobile ad hoc networks from malicious nodes.
2) The intrusion detection system uses an attack library containing known attack patterns to analyze node behavior and detect anomalies. It also generates unique IDs for authentic nodes.
3) The dynamic certificate authority issues certificates containing the unique ID, public key, and signature to authenticate nodes and enable secure communication. The certificates help establish trust between nodes in the infrastructure-less mobile ad hoc network.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document proposes an attack library based intrusion detection system and dynamic certificate authority to secure mobile ad hoc networks (MANETs) from malicious nodes. The intrusion detection system uses an attack library containing known attack patterns to analyze node behavior and detect anomalies. It generates unique IDs for authenticated nodes. The dynamic certificate authority then issues certificates signed with these IDs to allow secure communication. By detecting malicious nodes and authenticating connections, this approach aims to protect MANETs from various attacks like black holes, wormholes, and denial of service. The proposed system is analyzed and future work includes further exploring the attack library and implementing the security model in a simulator.
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
The document proposes a new system called PhishDect and Mitigator to detect and mitigate phishing attacks using software-defined networking (SDN). It uses deep packet inspection techniques and a convolutional neural network (CNN) to classify phishing signatures. Traffic is directed through either a "store and forward" or "forward and inspect" mode. In store and forward mode, packets are stored and inspected before forwarding. In forward and inspect mode, packets are forwarded first and then a copy is inspected. The system aims to overcome limitations of existing phishing detection methods.
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
To improve network security different steps has been taken as size and importance of the network has
increases day by day. Then chances of a network attacks increases Network is mainly attacked by some
intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data
packets and each packet has to scan for its detection. This paper works to develop a intrusion detection system
which utilizes the identity and signature of the intrusion for identifying different kinds of intrusions. As network
intrusion detection system need to be efficient enough that chance of false alarm generation should be less,
which means identifying as a intrusion but actually it is not an intrusion. Result obtained after analyzing this
system is quite good enough that nearly 90% of true alarms are generated. It detect intrusion for various
services like Dos, SSH, etc by neural network
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
A method and a system for the detection of an intrusion in a computer network compare the network traffic of the computer network at multiple different points in the network. In an uncompromised network the network traffic monitored at these two different points in the network should be identical. A network intrusion detection system is mostly place at strategic points in a network, so that it can monitor the traffic traveling to or from different devices on that network. The existing Software Defined Network SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. Machine learning is an artificial intelligence approach that focuses on acquiring knowledge from raw data and, based at least in part on the identified flow, selectively causing the packet, or a packet descriptor associated with the packet. The performance is evaluated using the network analysis metrics such as key generation delay, key sharing delay and the hash code generation time for both SDN and the proposed machine learning SDN. Prof P. Damodharan | K. Veena | Dr N. Suguna "Optimized Intrusion Detection System using Deep Learning Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21447.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/21447/optimized-intrusion-detection-system-using-deep-learning-algorithm/prof-p-damodharan
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document proposes a signature-based intrusion detection system using multithreading. It captures network packets and analyzes them for intrusions by comparing signatures to databases of known attacks. A multithreaded design is suggested to improve performance by processing packets in parallel threads. Agents would be deployed on the network with detection modules that use caching of frequent signatures to speed up analysis. An update module would transfer new frequent signatures to the caches.
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
This document discusses using public-key cryptography for data security in wireless sensor networks. It begins with an abstract that introduces public-key infrastructure for sensor networks to allow services like digital signatures. It then provides background on wireless sensor networks and discusses their limitations, including limited resources and vulnerability of nodes. It reviews different techniques for distributing public keys, including public announcement, publicly available directories, using a public-key authority, and public-key certificates. It analyzes whether a public-key infrastructure is feasible for sensor networks given their constraints. The document concludes by discussing potential public-key schemes that could work for wireless sensor networks.
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
This document proposes a key exchange mechanism for wireless sensor networks that reduces the number of keys each sensor node must store. It presents a protocol where each sensor node stores (n+1)/2 keys, rather than the n-1 keys required in the original protocol, where n is the number of sensor nodes. The protocol uses a "key sender" that distributes keys to sensor nodes. It proves this approach is optimal by showing any secure keying protocol must store at least (n-1)/2 keys per node. The protocol provides mutual authentication and secure data exchange between neighboring sensor nodes using these shared keys.
This document proposes methods for generating electricity from speed breakers. It discusses 5 classifications of speed breaker power generators that use different mechanisms: 1) a chain drive mechanism, 2) a rack and pinion system, 3) direct use of the load through a reciprocating device, 4) a translator and stator topology, and 5) a pressure lever mechanism. The document also outlines the advantages of using speed breakers for power generation such as low cost and maintenance and being a renewable source. Some challenges are also noted such as selecting a suitable generator and dealing with rain damage.
Cassava waste water was used as an admixture to replace distilled water in ratios of 5%, 10%, 15%, and 20% for producing sandcrete blocks. 60 sandcrete blocks of size 450mm x 150mm x 225mm were produced with different admixture ratios and a control with 0% admixture. The blocks were cured for 7, 14, 21, and 28 days and then tested for moisture content, specific gravity, water absorption, and compressive strength. Test results showed that blocks with 20% cassava waste water admixture met the minimum compressive strength requirement of 3.30 N/mm2 set by Nigerian standards, indicating the potential of cassava waste water to improve sandcrete block quality and
The document presents a theorem on random fixed points in metric spaces. It begins with introductions to fixed point theory, random fixed point theory, and relevant definitions. The main result is Theorem 3.1, which proves that if a self-mapping E on a complete metric space X satisfies certain contraction conditions involving parameters between 0 and 1, then E has a unique fixed point. The proof constructs a Cauchy sequence that converges to the unique fixed point. The document contributes to the study of random equations and random fixed point theory, which has applications in nonlinear analysis, probability theory, and other fields.
1. The document discusses applying multi-curve reconstruction technology to seismic inversion to improve accuracy and reliability. It focuses on reconstructing SP and RMN curves from well logs that are affected by various distortions.
2. The process of reconstructing the curves involves removing baseline drift, standardizing values, applying linear filtering, and fitting the curves. This removes interference and retains valid lithological information.
3. Reconstructing high quality curves improves the resolution and credibility of seismic inversion results. The method is shown to effectively predict sand distribution with little error.
This document compares the performance of a Minimum-Mean-Square-Error (MMSE) adaptive receiver and a conventional Rake receiver for receiving Ultra-Wideband (UWB) signals over a multipath fading channel. It first describes the UWB pulse shapes and channel model used, including the 6th derivative of the Gaussian pulse and the IEEE 802.15.3a modified Saleh-Valenzuela channel model. It then discusses the Direct-Sequence and Time-Hopping transmission and multiple access schemes for UWB. The document presents the receiver structures for the MMSE adaptive receiver and Rake receiver and compares their performance using MATLAB simulations.
This document summarizes a study on establishing logging interpretation models for reservoir parameters like porosity, permeability, oil saturation, and gas saturation in the Gaotaizi Reservoir of the L Oilfield. Models were developed using core data from 4 wells and include:
1) A porosity model relating acoustic travel time to porosity with an error of 0.92%
2) A permeability model relating permeability to porosity with an error of 0.31%
3) An oil saturation model using resistivity data with empirically determined parameters
4) A method to determine original gas saturation from mercury injection data.
Application of the models improved interpretation precision and allowed recalculation of oil and gas reserves for the
This document discusses predicting spam videos on social media platforms using machine learning. It proposes using attributes like number of likes, comments, and view count to classify videos as spam or not spam. A predictive algorithm is developed that uses threshold values for attributes and natural language processing of comments to classify videos. Testing of the algorithm on a dataset achieved a spam prediction precision of 93.6%. Issues with small datasets decreasing accuracy are also discussed, along with continuing work to address this issue.
1) The study experimentally evaluated the compatibility relationship between polymer solutions and oil layers through core flooding tests with different permeability cores.
2) The results showed that injection rate decreased with increasing polymer concentration and molecular weight, and increased with permeability.
3) Based on the results, boundaries for injection capability were established and a compatibility chart was proposed to guide polymer solution selection for different sedimentary microfacies in the field based on permeability and pore size.
1. The document discusses the identification of lithologic traps in the D3 Member of the Gaonan Region using seismic attribute analysis, acoustic impedance inversion, and sedimentary microfacies analysis.
2. Several lithologic traps were identified in the I and II oil groups of the D3 Member, with the largest trap located between wells G46 and G146X1 covering an area of about 2.35 km2.
3. Impedance inversion, seismic attribute analysis, and sedimentary microfacies characterization using 3D seismic data helped determine the location and development of effective lithologic traps in the thin sandstone-shale interbeds of the target stratum.
This document examines using coal ash as a partial replacement for cement in concrete. Coal ash was substituted for cement at rates of 5%, 10%, and 15% by weight. Testing found that concrete with a 5% substitution of coal ash exhibited only a slight decrease in compressive strength of 2% at 28 days while gaining improved workability. Higher substitution rates of 10% and 15% coal ash led to greater decreases in compressive and tensile strength. The study concludes that a 5% substitution of coal ash for cement provides benefits of reduced cost and improved workability with minimal strength impacts, representing an effective use of a waste material that addresses sustainability.
Accounting professional judgment involves handling accounting events and compiling financial reports according to regulations and standards. However, professional judgment is sometimes manipulated to distort accounting information. The document discusses three ways manipulation occurs: 1) abandoning accounting principles, 2) optional changes to accounting policies, and 3) abuse of accounting estimates. The causes of manipulation include distorted motivations from corporate governance issues and catering to various stakeholder interests. Strengthening supervision and improving the accounting system are proposed to manage manipulation of professional judgment.
The document discusses research on the distribution of oil and water in the eastern block of the Chao202-2 area in China. It establishes standards for identifying oil, poor oil, dry, and water layers using well logging data. Analysis shows structural reservoirs are dominant and fault and sand body configuration control oil-water distribution. Oil-water distribution varies between fault blocks from "up oil, bottom water" to "up water, bottom oil" depending on structure and sand body development.
The document describes an intelligent fault diagnosis system for reciprocating pumps that uses pressure and flow signals as inputs. It consists of hardware for data acquisition and a software system for signal processing, feature extraction, and fault diagnosis using wavelet neural networks. The system was able to accurately diagnose three main fault types - seal ring faults, valve damage, and spring faults - based on differences observed in the pressure curves. Testing on over 12 samples of each fault type achieved a correct diagnosis rate of over 94%. The system provides a fast and effective means of remotely monitoring reciprocating pumps and identifying faults.
This document discusses the application of meta-learning algorithms in banking sector data mining for fraud detection. It proposes using Classification and Regression Tree (CART), AdaBoost, LogitBoost, Bagging and Dagging algorithms for classification of banking transaction data. The experimental results show that Bagging algorithm has the best performance with the lowest misclassification rate, making it effective for banking fraud detection through data mining. Data mining can help banks detect patterns for applications like credit scoring, payment default prediction, fraud detection and risk management by analyzing customer transaction history and loan details.
This document presents a numerical solution for unsteady heat and mass transfer flow past an infinite vertical plate with variable thermal conductivity, taking into account Dufour number and heat source effects. The governing equations are non-linear and coupled, and were solved numerically using an implicit finite difference scheme. Various parameters, including Dufour number and heat source, were found to influence the velocity, temperature, and concentration profiles. Skin friction, Nusselt number, and Sherwood number were also calculated.
The document discusses methods for obtaining a background image using depth information from a depth camera to more accurately extract foreground objects. It finds that accumulating depth images and taking the median value at each pixel provides the most accurate background image. The accuracy of three methods - average, median, and mode - are evaluated using simulated depth data of a captured plane. The median method provides the best results, followed by average, while mode performs worst. More accumulated images provide a more accurate background image across all methods.
This document presents a mathematical model for determining the minimum overtaking sight distance (OSDm) required for an ascending vehicle to safely pass another slower vehicle on a single lane highway with an incline. It defines sight distance, stopping sight distance, perception-reaction time and derives equations to calculate the reaction distance (d1), overtaking distance (d2), vehicle travel distance during overtaking (d3), and total minimum OSDm based on vehicle characteristics, road geometry, and coefficients of friction. The safe overtaking zone is defined as 3 times the minimum OSDm. The model accounts for effects of slope angle and aims to satisfy laws of mechanics for overtaking maneuvers on inclined two-way single lane highways.
This document discusses a novel technique for better analysis of ice properties using Kalman filtering. It summarizes previous research on sea ice segmentation using SAR imagery and dual polarization techniques. It proposes using an automated SAR algorithm along with Kalman filtering to more accurately detect sea ice properties from RADARSAT1 and RADARSAT2 imagery data. The document reviews techniques for image segmentation, dual polarization, PMA detection, and related work on sea ice classification using statistical ice properties, edge preserving region models, and object extraction methods.
This document summarizes a study on the bioaccumulation of heavy metals in bass fish (Morone Saxatilis) caught at Rodoni Cape in the Adriatic Sea in Albania. Samples of bass fish were collected from five sites and analyzed for mercury, lead, and cadmium levels in their muscles. The concentrations of heavy metals varied between fish and sites but were below international limits for human consumption. While the fish were found to be safe for eating, the study recommends continuous monitoring of metal levels in fish from the area due to various factors that can influence metal uptake over time.
This document discusses optimal maintenance policies for repairable systems with linearly increasing hazard rates. It considers a system with a constant repair rate and predetermined availability requirement. There are two maintenance policies: corrective maintenance only, and preventive maintenance at set time intervals. The goal is to determine the preventive maintenance interval that guarantees the availability requirement at minimum cost. Equations are developed to calculate the availability under each policy and the optimal preventive maintenance interval based on both availability and cost. A numerical example is provided to demonstrate the decision process in determining the optimal policy.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 225e0-3021, ISSN (p): 2278-8719
Vol. 05, Issue 05 (May. 2015), ||V1|| PP 01-05
International organization of Scientific Research 1 | P a g e
Wireless Sensor Network Security model using Zero Knowledge
Protocol
P.Srilakshmi, RitaRoy
CSE dept. AVANTHI INSTITUTE OF ENGINEERING & TECHNOLOGY
Visakhapatnam, India
CSE dept. AVANTHI INSTITUTE OF ENGINEERING & TECHNOLOGY
Visakhapatnam, India
Abstract: - Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have
a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured
environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as
there is no user-controlling of each individual node, wireless environment, and more importantly, scarce energy
resources. In this paper, we address some of the special security threats and attacks in WSNs.
We propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol
(ZKP) for verifying the authenticity of the sender sensor nodes. The cloning attack is addressed by attaching a
unique fingerprint to each node that depends on the set of neighboring nodes and itself. The fingerprint is
attached with every message a sensor node sends. The ZKP is used to ensure non transmission of crucial
cryptographic information in the wireless network in order to avoid man-in-the middle (MITM) attack and
replay attack. The paper presents a detailed analysis for various scenarios and also analyzes the performance and
cryptographic strength.
Keywords-component; Avoid MITM, Replay attacks, Attacks in WSN, ZKP protocol
I. INTRODUCTION
Advances in technology have made it possible to develop sensor nodes which are compact and
inexpensive. They are mounted with a variety of sensors and are wireless enabled. Once sensor nodes have been
deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile
environment and there is no manual monitoring, it creates a security concern. Nodes may be subjected to various
physical attacks. The network must be able to autonomously detect, tolerate, and/or avoid these attacks. One
important physical attack is the introduction of cloned nodes into the network. When commodity hardware and
operating systems are used, it is easy for an adversary to capture legitimate nodes, make clones by copying the
cryptographic information, and deploying these clones back into the network. These clones may even be
selectively reprogrammed to subvert the network. Individual sensor node contains a light weight processor,
cheap hardware components, less memory. Because of these constraints, general-purpose security protocols are
hardly appropriate. Public key cryptography is based on RSA approach. The energy consumption and
computational latency makes RSA inappropriate for sensor network applications. Security algorithms that are
designed specifically for sensor networks are found to be more suitable. The goal of this paper is to develop a
security model for wireless sensor networks. We propose a method for identifying the compromised/cloned
nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero
knowledge protocol.
Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a
lot of interesting applications, some of which are quite sensitive in nature and require full proof secured
environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as
there is no user-controlling of each individual node, wireless environment, and more importantly, scarce energy
resources. In this paper, we address some of the special security threats and attacks in WSNs.
we propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol (zkp)
for verifying the authenticity of the sender sensor nodes. the cloning attack is addressed by attaching a unique
fingerprint to each node that depends on the set of neighboring nodes and itself. the fingerprint is attached with
every message a sensor node sends. the zkp is used to ensure non transmission of crucial cryptographic
information in the wireless network in order to avoid man-in-the middle (mitm) attack and replay attack. the
paper presents a detailed analysis for various scenarios and also analyzes the performance and cryptographic
strength.
2. Wireless Sensor Network Security model using Zero Knowledge Protocol
International organization of Scientific Research 2 | P a g e
II. IMPLEMENTATION MODULES
1. Secure Zero-knowledge protocol
Zero-knowledge protocol allow identification, key exchange and other basic cryptographic operations
to be implemented without revealing any secret information during the conversation and with smaller
computational requirements in comparison to public key protocols. Thus ZKP seems to be very attractive for
resource constrained devices. ZKP allows one party to prove its knowledge of
a secret to another party without ever revealing the secret. ZKP is an interactive proof system which involves a
prover, P and verifier, V. The role of the prover is to convince the verifier of some secret through a series of
communications.
2. Clone Attack
In clone attack, an adversary may capture a sensor node and copy the cryptographic information to another node
known as cloned node. Then this cloned sensor node can be installed to capture the information of the network.
The adversary can also inject false information, or manipulate the information passing through cloned nodes.
Continuous physical monitoring of nodes is not possible to detect potential tampering and cloning. Thus reliable
and fast schemes for detection are necessary to combat these attacks.
3. Man in the Middle Attack
The man-in-the-middle attack (MITM) is a form of active eavesdropping in which the attacker makes
independent connections with the victims and relays messages between them, making them believe that they are
talking directly to each other over a private connection. The attacker will be able to intercept all messages
exchanging between the two victims and inject new ones.
4. Replay Attack
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently
repeated or delayed. This is carried out either by the originator or by adversary who intercepts the data and
retransmits it. This type of attack can easily overrule encryption.
III. INPUT DESIGN
The input design is the link between the information system and the user. It comprises the developing
specification and procedures for data preparation and those steps are necessary to put transaction data in to a
usable form for processing can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system. The design of input focuses
on controlling the amount of input required, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. The input is designed in such a way so that it provides security and ease of use with
retaining the privacy. Input Design considered the following things:
What data should be given as input?
How the data should be arranged or coded?
The dialog to guide the operating personnel in providing input.
Methods for preparing input validations and steps to follow when error occur.
IV. OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information
clearly. In any system results of processing are communicated to the users and to other system through outputs.
In output design it is determined how the information is to be displaced for immediate need and also the hard
copy output. It is the most important and direct source information to the user. Efficient and intelligent output
design improves the system’s relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right output must be
developed while ensuring that each output element is designed so that people will find the system can use easily
and effectively. When analysis design computer output, they should Identify the specific output that is needed to
meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the system.
The output form of an information system should accomplish one or more of the following objectives.
Convey information about past activities, current status or projections of the
Future.
Signal important events, opportunities, problems, or warnings.
Trigger an action.
Confirm an action.
not as an independent document. Please do not revise any of the current designations.
3. Wireless Sensor Network Security model using Zero Knowledge Protocol
International organization of Scientific Research 3 | P a g e
V. SCREEN SHOTS
:
4. Wireless Sensor Network Security model using Zero Knowledge Protocol
International organization of Scientific Research 4 | P a g e
5. Wireless Sensor Network Security model using Zero Knowledge Protocol
International organization of Scientific Research 5 | P a g e
.
VI. CONCLUSION
In this project, we proposed a new security model to address three important active attacks namely
cloning attack, MITM attack and Replay attack. We used the concept of zero knowledge protocol which ensures
non-transmission of crucial information between the prover and verifier. The proposed model uses social finger
print based on s-disjunct code together with ZKP to detect clone attacks and avoid MITM and replay attack. We
analysed various attack scenarios, cryptographic strength and performance of the proposed model.
REFERENCES
[1] Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real- Time Detection of Clone Attacks in Wireless
Sensor Networks,Proceedings of the 28th International Conference on DistributedComputing Systems,
2008, Pages 3-10.
[2] Nikos Komninos, DimitrisVergados, Christos Douligeris, Detecting Unauthorized and Compromised
Nodes in Mobile Adhoc Networks Journal of Ad Hoc Networks, Volume 5, Issue 3, April2007, Pages:
289-298 .
[3] KlempousRyszard, Nikodem Jan, Radosz Lukasz, Raus Norbert, Adaptive Misbehavior Detection in
Wireless Sensors NetworkBased on Local Community Agreement, 14th Annual IEEE International
Conference and Workshops on the Engineering of Computer- Based systems, ECBS’2007, 2007,
Page(s):153-160.
[4] KrontirisIoannis, TassosDimitriou and Felix C. Freiling, Towards Intrusion detection In Wireless Sensor
Networks, In Proc. of the13th European Wireless Conference, 2007.
[5] Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identity for Ad Hoc Wireless Networks
An In-Depth Study, TechnicalReport, 2003. http://www.cs.rit.edu/ jsb7384/zkp-survey.pdf
[6] A. A. Taleb, Dhiraj K. Pradhan and T. KocakA Technique to Identify and Substitute Faulty Nodes in
Wireless Sensor Networks Proceedings of the 2009 Third International Conference on
SensorTechnologies and Applications, 2009, Pages: 346-351
AUTHORS PROFILE
Author 1: P. Srilakshmi Received M.Tech degree in Web Technologies from St. Mary’s College
of Engineering and Technology, Deshmukh, Hyderabad, Affliated to Jawaharlal Nehru Technological
University in 2012, B.Tech degree in Information Technology from Jagannadh Institute of
Technology and Management, Parlakhemundi, Orissa. She is working as Associate Professor in the
department of Computer Science and Engineering at Avanthi Institute of Engineering and Technology,
Visakhapatnam. Her date of birth is May 29th
1982. Her Area of expertise includes Network Security, data
mining, Mobile communications, Web Applications and Database Management Systems.
Author 2: Rita Roy received M.Tech degree in Computer Science from GITAM in 2014, B.Tech
degree in CSE from AMIETE. She is working as Assistant Professor in the department of Computer
Science and Engineering at Avanthi Institute of Engineering and Technology, Visakhapatnam. Her
current research interests include Image Processing, Data mining, Networking, Compiler Design, and
Network Security.