In order to use our Yosnalab shopping services, you need to read carefully about our terms and conditions. If You disagree any part of terms then you cannot access our service.
I agree to pay the rental rate for the period we used the product and in transit and further agrees to promptly return the products at the end of the rental period in the same condition as received.
I will give alert to Yosnalab if my contact information changes.
I also agree to pay for any damages to, or loss of, the rented merchandise occurring during their time of possession or because of loss and or damage of the products. Upon return and inspection if any and all repairs necessary and or accessories missing that were itemized will be charged at our current rates and billed to you.
A full day rental is charged, even for a partial day use. There are absolutely no refunds for early returns.
The products can be used upto 4 weeks only, Cost will be calculated as per day of usage. We are not responsible for the damage of materials or other liability of any kind resulting from the use or malfunction of the equipment. We will not return the initial deposit of money until the product is returned back.
I am responsible for keeping track of my due dates. I understand that any notices sent out by Yosnalab are a courtesy only and failure to receive them does not excuse me from any charges.
A copy of both sides of their valid institution identification card need to be present. Depositing the money can be done only in the form of cash, not through credit/debit cards.
If you have questions or suggestions, please contact us.
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to the main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. Nowadays, such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.
The WSN is built of "nodes" – from a few to several hundred or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.
The motivation of this system is to enhance secure data transmission using Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).
For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to the lack of scalability and resilience to node compromise attacks.
Why: Problem statement
A WSN consists of hundreds to thousands of sensor nodes (SNs) performing wireless communication. WSNs not only measure environmental conditions such as temperature and sound but also gather sensitive data about people. Therefore, to prevent privacy issues, all communications should be carried out securely. Moreover, security is an important area in the study of WSNs because it uses actual data. Insider threats are also a critical security issue in WSNs because general security techniques such as authentication and authorization cannot detect insider attackers. This is a serious threat for many applications such as military surveillance systems that monitor battlefields and other critical infrastructures.
The existing system is divided into two parts, i.e., symmetric key-based and public key-based. Moreover, there are various other methods of key management, such as pairwise key management, pre-distributed random key management, and location-based key management. Because of the hardware restrictions of SNs, the main objectives of key management for WSNs are efficiency, scalability, and heterogeneity.
In WSNs, location information is important for the generation of shared keys and is highly applicable. Thus, location-based key management is a core part of the research into WSN key management. Grid-based key management in location-based key management dictates that an SN should be located in an assigned grid.
We propose a WSN model that is discussed in Figure 1. The network model is composed of a base station (BS), a cluster head (CH), anchor nodes (ANs), and SNs. An SN finds the neighbor node, senses and collects data, and sends them in a hop-by-hop form to a CH. ANs transmit different nonces to SNs according to a power level. The SN generates a pairwise key using the nonces received from the AN.
We consider a variety of insider attacks and outsider attacks. An insider attack is more critical than an outsider attack because it bypasses authentication and authorization and drops critical packets. Various types of insider attacks include modification, misrouting, eavesdropping, and packet drops. The packet drop attack is particularly difficult to detect. Packet drop attacks can also decrease network performance. Packet drop attacks consist of a black hole attack, a gray hole attack, or an on-off attack. Because of the characteristics of a gray hole and on-off attacks, they are more difficult to detect than blackhole attacks.
Extraction of the Existing system:
The disadvantages of the existing system are as follows,
High computational and communication overhead.
Lack of scalability and resilience to insider attacks.
Most of the key management schemes do not deal with insider threats.
How: Solution description
The existing energy Location-Based Key Management with security is to use Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without undergoing the threshold problem. Also, our scheme can provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.
Source Anonymous Message Authentication (SAMA)
Hop-by-hop message authentication
Sensor nodes are randomly distributed in the sensing field. In this project, we are using wireless sensor networks. In this network, the nodes are static and fixed. The sensor nodes sense the information and then send to the server. If the source node sends the packet, it will send through the intermediate node. The nodes communicate only within the communication range. So, we have to find the node’s communication range.
Source Anonymous Message Authentication (SAMA):
In this project, we propose the Source Anonymous Message Authentication scheme (SAMA) for secure message sending. The proposed scheme allows any node to transmit an unlimited number of messages without suffering from the threshold problem. We are using the ElGamal signature for message authentication. In this, the scheme enables the nodes to authenticate the message so that all corrupted messages can be detected and dropped. We develop the SAMA code on elliptic curves that can provide unconditional source anonymity. We propose an efficient key management framework to ensure isolation of the compromised nodes.
Node-by-Node Message Authentication:
In this project, we also proposed Node-by-Node message authentication scheme to protect the data. We are using the ElGamal signature for message authentication. Along with this signature, we can provide the security for data packets and also by using the signature we can detect the adversaries. The message receiver should be able to verify the message sent by the authorized node and also those modified by the adversaries. Every forwarder can verify if the message is authenticated or not. If the forwarder detects the intruder or finds the message has been modified, the forwarder will drop the packet or change the routing path. Along with this proposed scheme, we can get accurate data without modifying and also can easily detect the adversaries. If the forwarder detects the intruder or finds the message has been modified, the forwarder will drop the packet or change the routing path.
A novel and efficient SAMA based on ECC. While ensuring message sender privacy, SAMA can be applied to any message to provide message content authenticity.
To provide hop-by-hop message authentication without the weakness of the built-inn the threshold of the polynomial-based scheme, we then proposed a hop-by-hop message authentication scheme based on the SAMA.
When applied to WSNs with fixed sink nodes, we also discussed possible techniques for compromised node identification.
How is it different from competition
An algorithm based on market competition for Wireless Sensor Networks
Joint Resource and Price competition in Wireless Sensor Networks
Competition at the Network MAC layer in Wireless Sensor Networks
Who are your customers
In all types of application the sensor networks are used, specially for monitoring and detecting purpose
Forest Fire Detection
Telemonitoring of human physiological data
Managing Inventory control
Project Phases and Schedule
Project work (Phase-I)
1. Survey (completed)
2. Defined the Existing system problem
3. Defined the title and solution for the existing problem.
Project work (Phase-II)
1. Proposed system Design
2. Executed the output for the proposed system.
Processor - Pentium Dual core
RAM - 1 GB
Speed - 125 Ghz.
Operating System - Windows 7/xp
Front End - Otcl (Object Oriented Tool Command Language)