Académique Documents
Professionnel Documents
Culture Documents
Assistant professor, Dept. of Computer Science and Engineering BKIT, Bhalki Karnataka, India
Associate &HOD CSE Dept Govt Engineering College, Raichur, India
Abstract Wireless Sensor Networks (WSN) plays vital role The first one is identity based signature (IBS) for verification
in research field. Due to its rapidly increasing application in of user generated by the verifier and second one is a key is
monitoring various kinds of environment by sensing physical xor operated with the data and get the cipher and then binary
phenomenon. Clustering is an efficient and effective method level technique for encryption and decryption of the original
to enhance performance of the WSNs system. In this project message.
work, we study a secure transmission of data for cluster- The binary level technique converts the plain text into binary
based WSNs (CWSNs), where the clusters are formed form and then splits the data into blocks and assign values to
dynamically and randomly. We propose two Secure and it based on identification mark (IM) technique which
Efficient data Transmission (SET) protocols for CWSNs, depends upon the length of the binary digits, then these are
called SET-IBS and SET-IBOOS, by using the Identity-Based divided into two level, 1st level is 2 bit and 2nd level is 4 bit .
digital Signature (IBS) scheme and the Identity-Based Then at the receiver user the Cipher text will be decrypted by
Online/Offline digital Signature (IBOOS) scheme, using the reverse technique and the destination us er will get
respectively. The cluster routing protocol LEACH (Low- the original message. By providing those techniques we can
Energy Adaptive Clustering Hierarchy) is considered and improve efficiency, security overhead and energy
improved. In SET-IBS, security relies on the hardness of the consumption.
Diffie-Hellman problem in the pairing area. SET-IBOOS A wireless sensor network is a group of specialized
additionally decreases the computational operating cost for transducers with a communication infrastructure that uses
protocol security, which is critical for WSNs, while its radio to monitor and record physical or environmental
defense depends on the stability of the problem of discrete conditions and also used in the variety of application such as
logarithm. We propose a clustering routing protocol named military sensing and tracking, environmental monitoring,
Enhanced LEACH, which extends LEACH protocol by disaster management etc.
balancing the energy consumption in the network. The The individual nodes are capable of sensing their
simulation results show that Enhanced LEACH outperforms environments, processing the information locally, and
LEACH in terms of network system lifetime and reduce the sending data to one or more collection points in a WSN.
energy consumption. Secure data transmission is one of the most important issues
KeywordsCWSN, LEACH, SET-IBS, SET-IBOOS. for WSNs.
At the same time, many WSNs are deployed in rough,
I. INTRODUCTION disregarded, and often adversarial physical environments for
Secure and efficient data transmission is a critical issue for certain applications, such as military domains and sensing
cluster-based wireless Sensor Networks (WSNs). tasks with trustless surroundings. Secure data transmission is
In Clusterbased WSNs authentication of users is a very especially necessary and is demanded in many such practical
Important issue .So, by authenticating the sent user and the WSNs.
destination user , we can achieve the security and efficiency Their own dynamic attributes for soldiers in their deployed
of data over CWSNs. To provide security of data and regions or echelons, which could be frequently changed. To
authentication of user we proposed a technique where we are refer to this DTN architecture where multiple authorities
implementing two concepts for performing those operations. issue and manage their own attribute keys independently as a
Server Authentication
After receiving the signature the server authenticated the user and sends a shared key to all the clients who has send
the signature to enhance further communication.
Transferring the Massage two bit representation of a ,b, c & d is aa, ab, ac, ad, bb, bc,
After receiving the shared key sent by the server, the user bd,cc, cd, dd, ba, ca, da,cb, db, dc. Now we put aa=e, ab=f,
will enter the id of receiving user and then enters the ac=g, ad=h, bb=i, bc=j,bd=k, cc=l, cd=m, dd=n, ba=o,
message which will be encrypted using encryption ca=p,da=q, cb=r, db=s,dc=t. As level of generation of
techniques and message send to the particular user. Here we identification marks for each block and length of
areusing 2 level of encryption techniques, Here we have 4 decomposed block are chosen at run time as randomly, for
distinct blocks, according to the order they are 01, 00, 10, it key is differed from each encryption to another. Not only
11. So we put according to key generation technique 01=a, that we are taken decomposed blocks in its sequence
00=b, 10=c, 11=d that is 1st level identification marks. For appearing for generating the identification marks for each
the generation of 2nd level identification marks, again the block.
Receiving the message Identification marks against each distinct block .Now we
The receiver will decrypt the message by decryption repeat finding identification marks up to D level in inverse
method and will get the actual message sent by the Manner. Repeat the same procedure to identification marks
sender.Collecting all distinct blocks, identification marks up to Dang will get the data back .Replace the all
for each block is assigned. This identification mark is same Identification marks into its binary form with the help of
as First level of identification mark. From the beginning of key. Now we collected the entire bit-stream-blocks are
the encrypted text, unchanged block (ML) is collected, merge together. After this merging, UB is attached at last of
length of which is defined in to the key. the recently generated decrypted bit of stream.
Then every identification marks is replaced into
identification marks. In that process we find two different
REFERENCES
[1] S. Sharma and S. K. Jena, A survey on secure
hierarchical routing protocols in wireless sensor
networks, in Proc. ICCCS, 2011.
[2] Heinzelman W. B., Chandrakasan A. P., Balakrishnan
H., An applicationspecific protocol architecture for
wireless microsensor networks, IEEE Trans on
Wireless Communications, Vol. 1, No. 4, 2002, pp.
660-670, doi: 10.1109/TWC.2002.804190.
[3] X. H. Wu, S. Wang, Performance comparison of
LEACH and LEACHC protocols by NS2,
Proceedings of 9th International Symposium on
Distributed Computing and Applications to Business,
Engineering and Science. Hong Kong, China, pp. 254-
258, 2010
[4] P.T.V.Bhuvaneswari and V.Vaidehi Enhancement
techniques incorporated in LEACH- a
surveyDepartment of Electronics Engineering,
Madras Institute Technology, Anna University
Chennai, India, 2009
[5] Wu Xinhua and Huang Li Research and
Improvement of the LEACH Protocol to Reduce the
Marginalization of Cluster HeadJournal of Wuhan
University of Technology Vol. 35, No. 1, Feb. 2011,
pp. 79-82, doi:10.3963/j.issn.1006-2823.2011.01.019
(in Chinese).