Top Banner
introducing
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hop by-hop authentication and source privacy in wireless sensor networks

www.lemenizinfotech.com

Page 2: Hop by-hop authentication and source privacy in wireless sensor networks

LeMeniz Infotech

Page 3: Hop by-hop authentication and source privacy in wireless sensor networks

LeMeniz Infotech

LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014-2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.Download From : www.ieeeprojectspondicherrry.weebly.com

Student Benefits:

=>No False Commitment

=>Real Time Implementation

->27 X 7 Online Supports

=>Individual Attention

=>100% Satisfaction

In Project Based Implementation we give maximum exposure to students in

=>Project Requirement Specification=>Software Requirement Specification=>Coding Techniques=>Project flow Diagram=>Project Documentation=>Project Testing=>PPT preparation=>Project Based viva questions=>Project Based Interview questions for Placements

Page 4: Hop by-hop authentication and source privacy in wireless sensor networks

For More IEEE Projects TitlesVisit : www.lemenizinfotech.com

Projects Technology @LeMeniz Infotech

LeMeniz Infotech

Page 5: Hop by-hop authentication and source privacy in wireless sensor networks

LeMeniz Infotech

For More IEEE Projects TitlesVisit : www.lemenizinfotech.com

Projects Domains @LeMeniz Infotech

Page 6: Hop by-hop authentication and source privacy in wireless sensor networks

Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

@LeMeniz Infotech

Page 7: Hop by-hop authentication and source privacy in wireless sensor networks

Abstract

Message authentication is one of the most effective ways to thwartunauthorized and corrupted messages from being forwarded in wirelesssensor networks (WSNs). For this reason, many message authenticationschemes have been developed, based on either symmetric-keycryptosystems or public-key cryptosystems. Most of them, however, havethe limitations of high computational and communication overhead inaddition to lack of scalability and resilience to node compromise attacks. Toaddress these issues, a polynomial-based scheme was recently introduced.However, this scheme and its extensions all have the weakness of a built-inthreshold determined by the degree of the polynomial: when the number ofmessages transmitted is larger than this threshold, the adversary can fullyrecover the polynomial.

Page 8: Hop by-hop authentication and source privacy in wireless sensor networks

EXISTING SYSTEM

Communication protocols are largely stemmed from mixnet. A mixnetprovides anonymity via packet re-shuffling through a set of mix servers(with at least one being trusted). Recently, message sender anonymitybased on ring signatures was introduced. This approach enables themessage sender to generate a source-anonymous message signature withcontent authenticity assurance. The original scheme has very limitedflexibility and very high complexity. Moreover, the original paper onlyfocuses on the cryptographic algorithm, and the relevant network issueswere left unaddressed.

Page 9: Hop by-hop authentication and source privacy in wireless sensor networks

Disadvantages

• Unconditionally secure.

• Insecure against no-message attacks

• It has the threshold problem

Page 10: Hop by-hop authentication and source privacy in wireless sensor networks

PROPOSED SYSTEM

The appropriate selection of an AS plays a key role in message source privacysince the actual message source node will be hidden in the AS. In this section,we will discuss techniques that can prevent the adversaries from tracking themessage source through the AS analysis in combination with the local trafficanalysis. Before a message is transmitted, the message source node selects anAS from the public key list in the SS as its choice.

This set should include itself, together with some other nodes. When anadversary receives a message, he can possibly find the direction of the previoushop, or even the real node of the previous hop. However, if the adversary isunable to monitor the traffic of the previous hop, then he will be unable todistinguish whether the previous node is the actual source node or simply aforwarder node. Therefore, the selection of the AS should create sufficientdiversity so that it is infeasible for the adversary to find the message sourcebased on the selection of the AS itself.

Page 11: Hop by-hop authentication and source privacy in wireless sensor networks

Advantages

• Based on elliptic curve cryptography

• Source anonymous message authentication scheme (SAMA) can be applied to any messages to provide hop-by-hop message content authenticity without the weakness of the built-in threshold of the polynomial-based scheme.

• It is more efficient than the bivariate polynomial-based.

Page 12: Hop by-hop authentication and source privacy in wireless sensor networks

Reference

M. Albrecht, C. Gentry, S. Halevi, and J. Katz, “Attackingcryptographic schemes based on ”perturbation polynomials”.”Cryptology ePrint Archive, Report 2009/098, 2009.http://eprint.iacr.org/.

Page 13: Hop by-hop authentication and source privacy in wireless sensor networks

Hardware Specification

Processor : Any Processor above 500 MHz.Ram : 128Mb.Hard Disk : 10 Gb.Compact Disk : 650 Mb.Input device : Standard Keyboard and Mouse.Output device : VGA and High Resolution Monitor.

Page 14: Hop by-hop authentication and source privacy in wireless sensor networks

Software Specification

Operating System : Windows Family.Programming Language : ASP.NET, C#.Net.Database : SQL Server 2005

Page 15: Hop by-hop authentication and source privacy in wireless sensor networks

To Get this Project with Complete DocumentReach Us :

LeMeniz Infotech36, 100 Feet Road,

Natesan Nagar,Near Indira Gandhi Statue,

Pondicherry-605 005.Call: 0413-4205444,+91 99625 88976,

95663 55386.

We Are Ready for You

For More Project Title Call Us Rafee9962588976 / 9566355386Mail : [email protected]

Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks