Enhanced secure data transmission using hop to hop authentication mechanism
Create New

Enhanced secure data transmission using hop to hop authentication mechanism



Enhanced secure data transmission using hop to hop authentication mechanism
Enhanced secure data transmission using hop to hop authentication mechanism

Project Rating

Overall Rating
0
0
0
0
0

The existing energy Location-Based Key Management with security to use Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to the lack of scalability and resilience to node compromise attacks. While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy. 

Why: Problem statement

To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs

How: Solution description

The existing energy Location-Based Key Management with security to use Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to the lack of scalability and resilience to node compromise attacks. While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy. 

How is it different from competition

1.we used novel and efficient SAMA based on ECC to provide message content authenticity. 

2.we provided hop-by-hop message authentication without the weakness of the builtin threshold of the polynomial-based scheme.

Who are your customers

Networking

Common people

Project Phases and Schedule

1. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed while ensuring that each output element is designed so that people will find the system can use easily and effectively. When analysis design computer output, they should Identify the specific output that is needed to meet the requirements.

2. Select methods for presenting the information.

3. Create a document, reports, or other formats that contain information produced by the system. The output form of an information system should accomplish one or more of the following objectives.

4. Convey information about past activities, current status or projections of the Future. 

Resources Required

NS2

Network Animator Window 

Comments

Leave a Comment

Post a Comment

About This Project

Project period

09/12/2019 - 10/31/2019

Views

32

Courses

Get trained in Learny Technologies and develop your own applications.

New batch starts from Nov 13th.