Professional Documents
Culture Documents
MS. G. Thilagavathy
782
Proceedings of International Conference on Electrical, Communication and Computing, ICECC 2014, 13th & 14th March 2014
Module. When a source node has data to send to the sink due to
either an external stimulation by the sink or a Self-initiated
periodic report, it uses its local clock value as the key.
However, the TKM module ensures that keys generated in
(a)
(b)
F=G (D,Re/h)
(c)
(d)
Where l denote the desired key size and the size of the
timer/counter in bits for the microcontroller employed by
the sensor node. Both the D and Re/h in F are mainly
utilized to increase the randomness of bits in the key, K;
there by reducing the attack from the malicious nodes.
B.Crypto Module
The crypto module is the security part of the
system. Here RC4 algorithm is used either for the
encryption or for decryption. This module obtains the
dynamic key from the TKM module and then it verifies the
key. if the correct key is not obtained then it receives
another key from the TKM. The process continues unless
the correct key is obtained or it is marked as malicious
which is discarded in the Filtering Forwarding Module
(FFS).this module contains mainly three modes of operation
Full-reEnc mode, the forwarder nodes refresh the key used
to encrypt the forwarded packet. The second mode
Selective-reEnc (S-ReEnc) mode, where packets are
selectively re-encrypted over some nodes along the data
delivery path while these nodes are also loosely
synchronized with the source as in Full-reEnc. Third mode
is No-reEnc mode were the packets are send as they are
received.
Network formation
Secured Communication
Protocol
implementation
Key establishment
Key scheduling
Key management
Security analysis
C.Filtering-Forwarding-Synch Module
783
Proceedings of International Conference on Electrical, Communication and Computing, ICECC 2014, 13th & 14th March 2014
IV
Local Time
III.
Diffuser
IV.
Re/h
V.
VI.
K
128 bit
VII.
RC4
VIII.
IX.
XOR
X.
XI.cCOPYRIGHTD1
FORMS
Fig 2 . Key generation and encryption
IV. PERFORMANCE EVALUATION
The effectiveness of the protocol is analyzed both via
simulations and analysis is evaluated in this module. The
simulation results are presented to examine the energy
efficiency under normal operation and under attack. Second,
the impact of the selective-reEnc operation in the network is
studied. Third, different class of outsider adversaries is
analyzed. Finally, a comparative study considering other
similar synchronization and en-route filtering schemes are
performed.
Fig 5. Comparison
time
Due to simultaneous increase of both packet size and
communication cast the efficiency of communication is
enhanced even when there is raise in packet size. Depending
on the faults available it is shown that the time required in
regaining its original form increases. These are described
with the Fig 4 and Fig5.
784
Proceedings of International Conference on Electrical, Communication and Computing, ICECC 2014, 13th & 14th March 2014
[2]
[3]
[4]
[5]
[6]
[7]
[8]
785