VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks - 2010 ABSTRACT: Designing value-efficient, secure network protocols for Wireless Sensor Networks (WSNs) could be a challenging downside as a result of sensors are resource-limited wireless devices. Since the Communication value is the most dominant issue during a sensor’s energy consumption, we tend to introduce an energy-economical Virtual Energy-Based Encryption and Keying (VEBEK) theme for WSNs that significantly reduces the amount of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is imperative for a few military applications of WSNs where an adversary could be monitoring the wireless spectrum. VEBEK is a secure Communication framework where sensed knowledge is encoded using a theme based mostly on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. So, a one-time dynamic secret's used for one packet only and completely different keys are used for the successive packets of the stream. The intermediate nodes along the trail to the sink are able to verify the authenticity and integrity of the incoming packets employing a predicted worth of the key generated by the sender’s virtual energy, thus requiring no want for specific rekeying messages. VEBEK is in a position to efficiently detect and filter false data injected into the network by malicious outsiders. The VEBEK framework consists of 2 operational modes (VEBEK-I and VEBEK-II), every of which is perfect for different scenarios. In VEBEK-I, every node monitors its one-hop neighbors where VEBEK-II statistically monitors downstream nodes. We have a tendency to have evaluated VEBEK’s feasibility and performance analytically and through simulations. Our results show that VEBEK, while not incurring transmission overhead (increasing packet size or sending management messages for rekeying), is in a position to eliminate malicious data from the network in an energy economical manner. We tend to additionally show that our framework performs better than other comparable schemes within the literature with an overall sixty-one hundred % improvement in energy savings while not the idea of a reliable medium access control layer. Did you like this research project? To get this research project Guidelines, Training and Code... Click Here facebook twitter google+ linkedin stumble pinterest On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability - 2010 Anonymous Query Processing in Road Networks - 2010