Professional Documents
Culture Documents
INDEX
Objective
Existing system
Proposed system
Dataflow Diagram
Modules description
Requirements
OBJECTIVE
To obtain healthy packets by Synchronizing
events and increasing the clock precision
with energy saving for addressing the inside
threats.
EXISTING SYSTEM
Secure Synchronization.
High energy consumption.
SOBAS is better only when other similar
schemes do not employ GPS devices.
Clock precision can still be reduced.
No attackers analysis is available.
PROPOSED SYSTEM
Filter the malicious data by using Dynamic En-route
filtering mechanism.
To save energy communication in the network is
minimized.
It provides more clock precision than the existing
system.
Without explicit synchronization control messages it
synchronize the events in the network.
Addresses attackers in the network.
System Architecture
ARC4
Encryption or
Hashing
TKM Module
No-ReEnc
CRYPTO Module
Full- ReEnc
Diffuser
Selective-ReEnc
Full Path
Synchronization
Filtering and
Forwarding
Module
Partial Path
Synchronization
Packets
DATA FLOW
DIAGRAM
Packets
Time based key
management
module
Crypto
module
Malicious node
analysis
Filter data
Forward data
Loose
synchronization
No reEnc
Selective reEnc
Analysis of outsider
attackers
Addressing inside
threats
Healthy Packets
Full reEnc
MODULES
Time Based Key Management (TKM)
Module.
CRYPTO Module.
Filtering And Forwarding Synchronization
(FFS) Module.
Selective Re-Encryption Module.
Analysis of Attackers.
Stateful mode
Dynamic key
CRYPTO MODULE
Security part of STEM
algorithm.
Keys from TKM module is verified here and sent
back to TKM if the key received is wrong.
3 Operational Modes used in the algorithm.
No reEnc
Full reEnc
Selective reEnc
CRYPTO MODULE
TKM Module
Dynamic Key
Verify
RC4 Algorithm
Operational Modes
Packets with Key
Wrong key
forwarder
node,
first
synchronize
Analysis of Attackers.
The outside malicious node will be able to
inject a false packet.
Classified based on the eavesdropping of
messages
Classified attackers are
1.Sensor-class attackers
2.Middle-class attackers
3.Powerful attackers
System Requirements
Language : JAVA
Tool
: NET BEANS IDE
Database : MY SQL
Hardware : Pentium iv 2.4 GHz,
200 GB Hard disk,
1 GB RAM ,
1.44 MB floppy drive,
Monitor ,mouse
Conclusion
We relaxed the perfect synchronization
condition for WSN.
We
focused
on
minimizing
the
communication in the network.
We have been able to achieve our main goal
of synchronizing events at a sink as quickly,
accurately and surreptitiously as possible.
Future Enhancement
Studying further more opportunities for
increasing the clock precision.
Key trials usage can further be reduced.
References
S.R. Fluhrer, I. Mantin, and A. Shamir, Weaknesses
in the Key Scheduling Algorithm of RC4 Proc.
Revised Papers from the Eighth Ann. Intl Workshop
Selected Areas in Cryptography (SAC),pp. 1-24,2001.
A. Uluagac, R. Beyah, Y. Li, and J. Copeland, Vebek:
Virtual Energy-Based Encryption and Keying for
Wireless Sensor Net-worksIEEE Trans. Mobile
Computing,vol. 9, no. 7, pp. 994-1007,July 2010.
A.S. Uluagac, R.A. Beyah, and J.A. Copeland, TImeBased Dynamic Keying and En-Route Filtering
(TICK) for Wireless Sensor Networks Proc. IEEE
Global Comm. Conf. (Globecom),2010.
Node Selection
Path Selection
Key Generation
Encryption
TICK Window
Graph OUTPUT