Virtual Energy Based Encryption & Keying on Wireless Sensor Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 3
Abstract
: Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introduce an energy-efficient Virtual Energy-Based Encryption and Keying(VEBEK) scheme for WSNs that reduces the number of transmission needed for rekeying the packets. VEBEK is a secure communication framework where sensed data is encoded by a RC4 encryption mechanism based on a permutation code generator. In the RC4 encryption mechanism keys changes dynamically as a function of the residual virtual energy of the sensor. Thus, one-time dynamic key is employed for one packet only and different keys for different packets. VEBEK unbundles key generation from other security services, namely authentication, integrity, non-repudiation. VEBEK is able to efficiently detect & filter false data injected by malicious outsiders. The VEBEK framework consists of two operational modes (VEBEK-1 and VEBEK-2).Our results show that VEBEK, without incurring transmission overhead is able to eliminate malicious data from the network in an energy efficient manner
Authors and Affiliations
Aditya Shukla
Modulo Search Trees (Plain and Z-Overlapped)
Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed...
Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgment Secure in MANET
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attack...
Correlation Preserving Indexing Based Text Clustering
In Document clustering previously they presented new document clustering method based on correlation preserving indexing. It simultaneously maximizes the correlation between the documents in the local patc...
Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey
Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can acce...
Quantum communication and quantum computing
The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This review aims to summarize not just quantum computing, but the whole subje...