hop by-hop authentication and source privacy in wireless sensor networks
TRANSCRIPT
LeMeniz Infotech
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014-2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.Download From : www.ieeeprojectspondicherrry.weebly.com
Student Benefits:
=>No False Commitment
=>Real Time Implementation
->27 X 7 Online Supports
=>Individual Attention
=>100% Satisfaction
In Project Based Implementation we give maximum exposure to students in
=>Project Requirement Specification=>Software Requirement Specification=>Coding Techniques=>Project flow Diagram=>Project Documentation=>Project Testing=>PPT preparation=>Project Based viva questions=>Project Based Interview questions for Placements
For More IEEE Projects TitlesVisit : www.lemenizinfotech.com
Projects Technology @LeMeniz Infotech
LeMeniz Infotech
LeMeniz Infotech
For More IEEE Projects TitlesVisit : www.lemenizinfotech.com
Projects Domains @LeMeniz Infotech
Abstract
Message authentication is one of the most effective ways to thwartunauthorized and corrupted messages from being forwarded in wirelesssensor networks (WSNs). For this reason, many message authenticationschemes have been developed, based on either symmetric-keycryptosystems or public-key cryptosystems. Most of them, however, havethe limitations of high computational and communication overhead inaddition to lack of scalability and resilience to node compromise attacks. Toaddress these issues, a polynomial-based scheme was recently introduced.However, this scheme and its extensions all have the weakness of a built-inthreshold determined by the degree of the polynomial: when the number ofmessages transmitted is larger than this threshold, the adversary can fullyrecover the polynomial.
EXISTING SYSTEM
Communication protocols are largely stemmed from mixnet. A mixnetprovides anonymity via packet re-shuffling through a set of mix servers(with at least one being trusted). Recently, message sender anonymitybased on ring signatures was introduced. This approach enables themessage sender to generate a source-anonymous message signature withcontent authenticity assurance. The original scheme has very limitedflexibility and very high complexity. Moreover, the original paper onlyfocuses on the cryptographic algorithm, and the relevant network issueswere left unaddressed.
Disadvantages
• Unconditionally secure.
• Insecure against no-message attacks
• It has the threshold problem
PROPOSED SYSTEM
The appropriate selection of an AS plays a key role in message source privacysince the actual message source node will be hidden in the AS. In this section,we will discuss techniques that can prevent the adversaries from tracking themessage source through the AS analysis in combination with the local trafficanalysis. Before a message is transmitted, the message source node selects anAS from the public key list in the SS as its choice.
This set should include itself, together with some other nodes. When anadversary receives a message, he can possibly find the direction of the previoushop, or even the real node of the previous hop. However, if the adversary isunable to monitor the traffic of the previous hop, then he will be unable todistinguish whether the previous node is the actual source node or simply aforwarder node. Therefore, the selection of the AS should create sufficientdiversity so that it is infeasible for the adversary to find the message sourcebased on the selection of the AS itself.
Advantages
• Based on elliptic curve cryptography
• Source anonymous message authentication scheme (SAMA) can be applied to any messages to provide hop-by-hop message content authenticity without the weakness of the built-in threshold of the polynomial-based scheme.
• It is more efficient than the bivariate polynomial-based.
Reference
M. Albrecht, C. Gentry, S. Halevi, and J. Katz, “Attackingcryptographic schemes based on ”perturbation polynomials”.”Cryptology ePrint Archive, Report 2009/098, 2009.http://eprint.iacr.org/.
Hardware Specification
Processor : Any Processor above 500 MHz.Ram : 128Mb.Hard Disk : 10 Gb.Compact Disk : 650 Mb.Input device : Standard Keyboard and Mouse.Output device : VGA and High Resolution Monitor.
Software Specification
Operating System : Windows Family.Programming Language : ASP.NET, C#.Net.Database : SQL Server 2005
To Get this Project with Complete DocumentReach Us :
LeMeniz Infotech36, 100 Feet Road,
Natesan Nagar,Near Indira Gandhi Statue,
Pondicherry-605 005.Call: 0413-4205444,+91 99625 88976,
95663 55386.
We Are Ready for You
For More Project Title Call Us Rafee9962588976 / 9566355386Mail : [email protected]
Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks