SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 412
Enhancing Data Transmission and Protection in Wireless Sensor Node-
A Review
Prajwali wamanrao Gawande 1, Prof. Vijay Bagdi 2
1 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur,
Maharashtra, India
2 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur,
Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract-A wireless sensor network (WSN) have
many different spatially distributed independent
Sensors to observe physical or environmental
conditions, such as sound, temperature, pressure, etc.
and to pass their data to a main location through the
network. Adittional Traffic is created with manegment
requests and responses and the data issuing from the
network’s actual sensing application. Sending and
processing the data together, rather than individually
can reduce the system’s energy. As the processing of
data in WSN consumes more energy. So the data is
being transmitted without processing it. By applying
various cryptographic techniques we can transmit the
data securely over WSN. In this paper we discuss the
problem with wireless sensor network and have
proposed the technique for increasing the efficiency of
a node as well as for transmitting the data securely.
Keyword: - WSN, RC-6, LEACH
1. INTRODUCTION
Each sensor node has a constraint energy capacity in
wireless sensor network, so energy-efficient mechanism is
important. Sending packets from the source node to the
destination node should be at highest priority than rather
sensing the event. A typical node (Berkeley node) in [13]
have a configuration of 8-bit CPU(4MHz), 128KB flash,4KB
RAM and Transmission range of 100 Feet. The nodes in
WSN are made of electronic devices that are able to sense,
compute and transmit data from physical environments.
These sensor nodes have limited energy resources. So, to
extend the lifetime of network, energy resources for
wireless sensor networks should be managed wisely.
1.1Efficiency of node:-
In wireless communications, energy wastage shortens the
networks lifetime.
Following are the 4 reasons of energy wastage.
1) Collisions:-
When two nodes transmit at the same time and interfere
with each other.
2) Idle listening: -
It happens when the radio is listening to the channel to
receive a possible data that is not sent.
3) Overhearing: -
When a sensor node receives packets that are not destined
to it.
This is the dominant factor of energy wastage, when traffic
load is heavy and node density is high.
4) Control: -
Packet overhead for protocols to exchange required
information.
Security: -
Basically nature of WSN is to design low power, which
forces security mechanisms to fit under very limiting
processing and bandwidth constraints, so security to data
has been the challenging issue. The security requirements
in WSN are the authentication of entity, message, data,
especially in data critical applications. It is observed in
[12] that due to Sensor Node Constraints and Networking
Constraints in WSN’s. Most of the protocols [13][14] are
based on Symmetric key cryptography.
2. OVERVIEW OF EXISTING METHODS
This section provides review of the existing techniques for
important roving energy efficiency of node and provides
security to data. Author in [1] has worked on improving
the energy efficiency of the node. By considering some
parameters.
2.1 By Reducing the Communication Costs Radio:
In most wireless sensor network platforms, one of the key
energy consumers is Communication. When the data is not
been sent or receive. There are different medium access
protocols that allow the radio chip to be put into a low
power sleep mode (eg. BMAC, XMAC, and SMAC). Avoiding
radio communication saves energy. The conclusions for
this observation for a management system were
discussed.
1) The management data was sent first, followed by the
sensing data after a gap of four seconds.
2) Sending the management data and the sensing data
together in a single packet
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 413
2.2 Different Degrees of Co-operative Behavior:
Either the management framework or the application has
to wait for the next packet to be sent, if packets are to be
shared between the sensor network application and the
management framework. As decided that there should be
no delay for messages sent by the application. In this
paper [2] Author has focused that during idle listening
energy wastage should be reduced.
Toughest task is co-coordinating the awake schedule of
both sender and receiver. They have designed
Neighborhood-based Power Management (NPM), an
energy-efficient hybrid MAC protocol that balances
synchronization and signaling overhead. In which a sender
knows exactly when a receiver is awake either through a
priori knowledge of or by synchronizing the wakeup
schedules. Thus, senders and receivers wake up at the
same time, transmit their data, and then go back to sleep.
2.3 Signaling Mechanisms:-
[2]All nodes in NPM periodically get active then they poll
the channel for activity to receive incoming data messages.
Due to the imperfect (out-of-date) synchronization
information available to the nodes, NPM must use
preambles before the actual data Messages, to signal the
receivers that they must stay active until the data
messages are received.
In this paper [3] Author has worked on Security of data in
WSN. Identity-based attacks are considered the first step
in an intruder’s attempt to launch a variety of attacks,
including denial of service (DOS), session hijacking, man-
in-the-middle, data modification, and sniffing. Following
are the two proposed techniques:
Software-based fingerprinting:-Off-the-shelf wireless
Devices and existing software ca be used for
recording and extracting Software-based fingerprinting.
Specifically, by putting the wireless card in monitor mode
and using TCP dump or wire shark, all frames sent over
the air can be sniffed. Therefore, the frame/beacon
interval, frame size, and source and destination addresses
of a frame can be easily obtained.
Hardware-based fingerprinting:- It is the reflection of
defects/unique design of the hardware on the transmitted
wave forms. This signature scheme uses the inherent
hardware imperfections and characteristics. It is hard to
spoof the signature by using off-the shelf wireless devices.
In this paper [4] DES algorithm has been used to encrypt
and decrypt data.
Fig1:-The symmetric data encryption/decryption
algorithm has been widely used in networks.
In fig 1:- Alice sends an encrypted message to Bob with a
secret key. Bob may use the secret key to decipher the
message. Because this message has been encrypted, even if
the message is intercepted, the eavesdropper between
Alice and Bob will not have the secret key to decipher the
message [4].
In paper [5], author has introduced a scheme that could be
used to achieve physical layer security against different
attacks. They have classified the existing physical layer
security methods into five major Categories: theoretical
secure capacity, channel, coding, power, and signal
detection approach.
The security services in a WSN should protect the
information transmitted over the public channels and the
resources from attacks and misbehavior of nodes. They
have proposed a protocol based on RSA.
Tiny PK: Watro et al [11] has proposed Tiny PK security
scheme. It is used to authenticate the user (external
agent). It allows the sensor to share a session key with
external agent. The infrastructure requirement for Tiny PK
is CA, EA and WSN. CA is a trusted Certification Authority.
It is an entity with public and private keys. CA is a trusted
entity by all friendly units. EA is an External agent is an
entity who tries to communicate with a sensor of WSN.
Every node is loaded with CA public key while deploying
into the network.
3. PROPOSED METHODOLOGY
Hera we have proposed a methodology to increase
efficiency of node and a technique to provide data security.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 414
LEACH Protocol has been used for increasing the
Efficiency of node we are using a protocol ie.. LEACH is the
earliest proposed single-hop clustering routing protocol in
WSN; it can save network energy greatly compared with
the non-cluster routing algorithm. In LEACH protocol, all
clusters are self-organized, each cluster contains a cluster-
head and several non-cluster head nodes, and cluster-head
node consumes more energy than non-cluster head nodes.
With the purpose of balancing network energy
consumption and prolonging the network life cycle, it
selects cluster head randomly and each node has an equal
chance to be cluster-head [9]. Many other clustering
algorithm are proposed based on LEACH, such as TEEN
(Threshold Sensitive Energy Efficient Sensor Network
Protocol)[6] ,PEGASIS(Power Efficient Gathering in Sensor
Information Systems)[7] ,HEED(Hybrid Energy-Efficient
Distributed Clustering)[8]. The cluster structure update
constantly and a single updating process are called a
round. Each round cycle consist two stages: set-up phase
and steady-state phase,
 Set-up phase is the establishment phase of the
cluster:- Each node generates a random number
between 0 to 1, and compares this number with
the threshold value T(n). If the number < T(n), the
node is selected as a cluster-head,
 The threshold T(n0) is set as follow;
Where n refers the node identification in the current
sensor network; p is the percentage of cluster-heads; r is
the current round number; G is the set of nodes that have
not been elected as cluster-head in the last 1/p rounds.
Steady-state phase is the stable data transfer phase,
members of the cluster send data to the cluster-head in
the way of single-hop during the allocated slot according
to the TDMA table, the cluster-head receives all the data
from each node in the cluster, fuses all the data into a
single signal, then the fusion signal is transmitted to the
base station by cluster-head. Data transmission lasts a
certain time, and then the entire network comes into the
next round.
For Security of data in WSN:-We are using a symmetric
key algorithm ie. RC6 (Rivest Cipher 6)[15] for security of
data. RC6 is a symmetric key block cipher derived from
RC5.RC6 has a block size of 128 bits and supports key
sizes of 128, 192, and 256 bits.
Encryption and Decryption Operation.:- RC6 works with
four w-bit registers A,B,C,D which contain the initial input
plaintext as well as the output cipher text at the end of
encryption. The first byte of plaintext or cipher text is
placed in the least-significant byte of A; the last byte of
plaintext or cipher text is placed into the most-significant
byte of D.
We use (A;B;C;D) = (B;C;D;A) to mean the parallel
assignment of values on the right to registers on the left.
4. CONCLUSION
Hence we have studied various energy efficiency
techniques and have also proposed the protocol which is
used to improve efficiency of node. We have proposed an
algorithm ie. RC6 (Rivest Cipher 6) to transmit the data
securely over WSN, which has a key size of 128 bits. Thus
the proposed technique is an effective and secure
approach to improve efficiency of node.

Contenu connexe

Tendances

Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor networkShiwangi Thakur
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 

Tendances (20)

Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
I018135565
I018135565I018135565
I018135565
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
A044060107
A044060107A044060107
A044060107
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 

Similaire à Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...IRJET Journal
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 

Similaire à Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Dernier (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 412 Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review Prajwali wamanrao Gawande 1, Prof. Vijay Bagdi 2 1 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India 2 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract-A wireless sensor network (WSN) have many different spatially distributed independent Sensors to observe physical or environmental conditions, such as sound, temperature, pressure, etc. and to pass their data to a main location through the network. Adittional Traffic is created with manegment requests and responses and the data issuing from the network’s actual sensing application. Sending and processing the data together, rather than individually can reduce the system’s energy. As the processing of data in WSN consumes more energy. So the data is being transmitted without processing it. By applying various cryptographic techniques we can transmit the data securely over WSN. In this paper we discuss the problem with wireless sensor network and have proposed the technique for increasing the efficiency of a node as well as for transmitting the data securely. Keyword: - WSN, RC-6, LEACH 1. INTRODUCTION Each sensor node has a constraint energy capacity in wireless sensor network, so energy-efficient mechanism is important. Sending packets from the source node to the destination node should be at highest priority than rather sensing the event. A typical node (Berkeley node) in [13] have a configuration of 8-bit CPU(4MHz), 128KB flash,4KB RAM and Transmission range of 100 Feet. The nodes in WSN are made of electronic devices that are able to sense, compute and transmit data from physical environments. These sensor nodes have limited energy resources. So, to extend the lifetime of network, energy resources for wireless sensor networks should be managed wisely. 1.1Efficiency of node:- In wireless communications, energy wastage shortens the networks lifetime. Following are the 4 reasons of energy wastage. 1) Collisions:- When two nodes transmit at the same time and interfere with each other. 2) Idle listening: - It happens when the radio is listening to the channel to receive a possible data that is not sent. 3) Overhearing: - When a sensor node receives packets that are not destined to it. This is the dominant factor of energy wastage, when traffic load is heavy and node density is high. 4) Control: - Packet overhead for protocols to exchange required information. Security: - Basically nature of WSN is to design low power, which forces security mechanisms to fit under very limiting processing and bandwidth constraints, so security to data has been the challenging issue. The security requirements in WSN are the authentication of entity, message, data, especially in data critical applications. It is observed in [12] that due to Sensor Node Constraints and Networking Constraints in WSN’s. Most of the protocols [13][14] are based on Symmetric key cryptography. 2. OVERVIEW OF EXISTING METHODS This section provides review of the existing techniques for important roving energy efficiency of node and provides security to data. Author in [1] has worked on improving the energy efficiency of the node. By considering some parameters. 2.1 By Reducing the Communication Costs Radio: In most wireless sensor network platforms, one of the key energy consumers is Communication. When the data is not been sent or receive. There are different medium access protocols that allow the radio chip to be put into a low power sleep mode (eg. BMAC, XMAC, and SMAC). Avoiding radio communication saves energy. The conclusions for this observation for a management system were discussed. 1) The management data was sent first, followed by the sensing data after a gap of four seconds. 2) Sending the management data and the sensing data together in a single packet
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 413 2.2 Different Degrees of Co-operative Behavior: Either the management framework or the application has to wait for the next packet to be sent, if packets are to be shared between the sensor network application and the management framework. As decided that there should be no delay for messages sent by the application. In this paper [2] Author has focused that during idle listening energy wastage should be reduced. Toughest task is co-coordinating the awake schedule of both sender and receiver. They have designed Neighborhood-based Power Management (NPM), an energy-efficient hybrid MAC protocol that balances synchronization and signaling overhead. In which a sender knows exactly when a receiver is awake either through a priori knowledge of or by synchronizing the wakeup schedules. Thus, senders and receivers wake up at the same time, transmit their data, and then go back to sleep. 2.3 Signaling Mechanisms:- [2]All nodes in NPM periodically get active then they poll the channel for activity to receive incoming data messages. Due to the imperfect (out-of-date) synchronization information available to the nodes, NPM must use preambles before the actual data Messages, to signal the receivers that they must stay active until the data messages are received. In this paper [3] Author has worked on Security of data in WSN. Identity-based attacks are considered the first step in an intruder’s attempt to launch a variety of attacks, including denial of service (DOS), session hijacking, man- in-the-middle, data modification, and sniffing. Following are the two proposed techniques: Software-based fingerprinting:-Off-the-shelf wireless Devices and existing software ca be used for recording and extracting Software-based fingerprinting. Specifically, by putting the wireless card in monitor mode and using TCP dump or wire shark, all frames sent over the air can be sniffed. Therefore, the frame/beacon interval, frame size, and source and destination addresses of a frame can be easily obtained. Hardware-based fingerprinting:- It is the reflection of defects/unique design of the hardware on the transmitted wave forms. This signature scheme uses the inherent hardware imperfections and characteristics. It is hard to spoof the signature by using off-the shelf wireless devices. In this paper [4] DES algorithm has been used to encrypt and decrypt data. Fig1:-The symmetric data encryption/decryption algorithm has been widely used in networks. In fig 1:- Alice sends an encrypted message to Bob with a secret key. Bob may use the secret key to decipher the message. Because this message has been encrypted, even if the message is intercepted, the eavesdropper between Alice and Bob will not have the secret key to decipher the message [4]. In paper [5], author has introduced a scheme that could be used to achieve physical layer security against different attacks. They have classified the existing physical layer security methods into five major Categories: theoretical secure capacity, channel, coding, power, and signal detection approach. The security services in a WSN should protect the information transmitted over the public channels and the resources from attacks and misbehavior of nodes. They have proposed a protocol based on RSA. Tiny PK: Watro et al [11] has proposed Tiny PK security scheme. It is used to authenticate the user (external agent). It allows the sensor to share a session key with external agent. The infrastructure requirement for Tiny PK is CA, EA and WSN. CA is a trusted Certification Authority. It is an entity with public and private keys. CA is a trusted entity by all friendly units. EA is an External agent is an entity who tries to communicate with a sensor of WSN. Every node is loaded with CA public key while deploying into the network. 3. PROPOSED METHODOLOGY Hera we have proposed a methodology to increase efficiency of node and a technique to provide data security.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 414 LEACH Protocol has been used for increasing the Efficiency of node we are using a protocol ie.. LEACH is the earliest proposed single-hop clustering routing protocol in WSN; it can save network energy greatly compared with the non-cluster routing algorithm. In LEACH protocol, all clusters are self-organized, each cluster contains a cluster- head and several non-cluster head nodes, and cluster-head node consumes more energy than non-cluster head nodes. With the purpose of balancing network energy consumption and prolonging the network life cycle, it selects cluster head randomly and each node has an equal chance to be cluster-head [9]. Many other clustering algorithm are proposed based on LEACH, such as TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol)[6] ,PEGASIS(Power Efficient Gathering in Sensor Information Systems)[7] ,HEED(Hybrid Energy-Efficient Distributed Clustering)[8]. The cluster structure update constantly and a single updating process are called a round. Each round cycle consist two stages: set-up phase and steady-state phase,  Set-up phase is the establishment phase of the cluster:- Each node generates a random number between 0 to 1, and compares this number with the threshold value T(n). If the number < T(n), the node is selected as a cluster-head,  The threshold T(n0) is set as follow; Where n refers the node identification in the current sensor network; p is the percentage of cluster-heads; r is the current round number; G is the set of nodes that have not been elected as cluster-head in the last 1/p rounds. Steady-state phase is the stable data transfer phase, members of the cluster send data to the cluster-head in the way of single-hop during the allocated slot according to the TDMA table, the cluster-head receives all the data from each node in the cluster, fuses all the data into a single signal, then the fusion signal is transmitted to the base station by cluster-head. Data transmission lasts a certain time, and then the entire network comes into the next round. For Security of data in WSN:-We are using a symmetric key algorithm ie. RC6 (Rivest Cipher 6)[15] for security of data. RC6 is a symmetric key block cipher derived from RC5.RC6 has a block size of 128 bits and supports key sizes of 128, 192, and 256 bits. Encryption and Decryption Operation.:- RC6 works with four w-bit registers A,B,C,D which contain the initial input plaintext as well as the output cipher text at the end of encryption. The first byte of plaintext or cipher text is placed in the least-significant byte of A; the last byte of plaintext or cipher text is placed into the most-significant byte of D. We use (A;B;C;D) = (B;C;D;A) to mean the parallel assignment of values on the right to registers on the left. 4. CONCLUSION Hence we have studied various energy efficiency techniques and have also proposed the protocol which is used to improve efficiency of node. We have proposed an algorithm ie. RC6 (Rivest Cipher 6) to transmit the data securely over WSN, which has a key size of 128 bits. Thus the proposed technique is an effective and secure approach to improve efficiency of node.