4

Click here to load reader

Three tier security scheme zebros ieee projects

Embed Size (px)

DESCRIPTION

Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component.

Citation preview

Page 1: Three tier security scheme zebros ieee projects

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

WAY TO YOUR GOAL

NETWORKING PROJECT

FINAL YEAR PROJECTS

IEEE PROJECTS 2013-2014

CONTACT: 9940098300, 9500075001

E-Mail:[email protected]

Page 2: Three tier security scheme zebros ieee projects

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

The Three-Tier Security Scheme in Wireless

Sensor Networks with Mobile Sinks

ABSTRACT

Mobile sinks (MSs) are vital in many wireless sensor network (WSN)

applications for efficient data accumulation, localized sensor reprogramming, and for

distinguishing and revoking compromised sensors. However, in sensor networks that

make use of the existing key predistribution schemes for pairwise key establishment

and authentication between sensor nodes and mobile sinks, the employment of mobile

sinks for data collection elevates a new security challenge: in the basic probabilistic and

q-composite key predistribution schemes, an attacker can easily obtain a large number

of keys by capturing a small fraction of nodes, and hence, can gain control of the

network by deploying a replicated mobile sink preloaded with some compromised

keys. This article describes a three-tier general framework that permits the use of any

pairwise key predistribution scheme as its basic component. The new framework

requires two separate key pools, one for the mobile sink to access the network, and one

for pairwise key establishment between the sensors. To further reduce the damages

caused by stationary access node replication attacks, we have strengthened the

authentication mechanism between the sensor and the stationary access node in the

proposed framework. Through detailed analysis, we show that our security framework

has a higher network resilience to a mobile sink replication attack as compared to the

polynomial pool based schemes.

Page 3: Three tier security scheme zebros ieee projects

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

ZEBROS PROJECTS

SOFTWARE BASED HARDWARE BASED

Networking VLSI

Data Mining Mat lab

Grid Computing Robotics

Network Security Embedded

Image Processing Bio Medical

Web Applications Power Systems

Mobile Computing Power Electronics

Software Engineering Java with Embedded

Cloud Computing Android

What is IEEE?

The Institute of Electrical and Electronics Engineers or IEEE (read eye-triple-e) is Incorporated in the State of New York, United States. It was formed in 1963 by the merger of the Institute of Radio Engineers (IRE, founded 1912) and the American Institute of Electrical Engineers (AIEE, founded 1884). A membership organization comprised of engineers, scientists and students that sets standards for computers and communications. It is a nonprofit organization with more than 365,000 members in around 150 countries.

The IEEE describes itself as "the world's largest technical professional society -- promoting the development and application of electro technology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."

Why IEEE based projects?

It grantees for standard

It assured latest solution for problems

It delivers new patented technologies at an ever-increasing pace

It access world-class technical information provided by the IEEE and cut down your

research time.

OUR FEATURES

Page 4: Three tier security scheme zebros ieee projects

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

24*7 Call Support

Project Execution through Remote System

20 Days Technical classes taken by Corporate Trainer

Unlimited Project & Technical Support through your academic

Project software Installation support

PROJECT SUPPORT

0th Review 1st Review

Abstract Existing System Disadvantages Proposed System Advantages Objective System Requirements System Architecture

Literature Survey Module List Module Description Data Flow Diagram Level DFD Module Wise DFD Problem Definition Review Document Explanation

2nd Review 3rd Review

Use case Diagram Class Diagram Collaboration Diagram Sequence Diagram Activity Diagram Testing & test cases Partial Code Screenshot for First two

module Review Document Explanation

Conclusion References Future Enhancement 65% code (Executable Format) Required Software Review Document Explanation

Final Review

Complete Code with Enhancement

Final Document (University Standard Format)

Complete Explanation for Project Concept & Code