Designing value-efficient, secure network protocols for Wireless Sensor Networks (WSNs) could be a challenging downside as a result of sensors are resource-limited wireless devices. Since the Communication value is the most dominant issue during a sensor’s energy consumption, we tend to introduce an energy-economical Virtual Energy-Based Encryption and Keying (VEBEK) theme for WSNs that significantly reduces the amount of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is imperative for a few military applications of WSNs where an adversary could be monitoring the wireless spectrum. VEBEK is a secure Communication framework where sensed knowledge is encoded using a theme based mostly on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. So, a one-time dynamic secret's used for one packet only and completely different keys are used for the successive packets of the stream. The intermediate nodes along the trail to the sink are able to verify the authenticity and integrity of the incoming packets employing a predicted worth of the key generated by the sender’s virtual energy, thus requiring no want for specific rekeying messages. VEBEK is in a position to efficiently detect and filter false data injected into the network by malicious outsiders. The VEBEK framework consists of 2 operational modes (VEBEK-I and VEBEK-II), every of which is perfect for different scenarios. In VEBEK-I, every node monitors its one-hop neighbors where VEBEK-II statistically monitors downstream nodes. We have a tendency to have evaluated VEBEK’s feasibility and performance analytically and through simulations. Our results show that VEBEK, while not incurring transmission overhead (increasing packet size or sending management messages for rekeying), is in a position to eliminate malicious data from the network in an energy economical manner. We tend to additionally show that our framework performs better than other comparable schemes within the literature with an overall sixty-one hundred % improvement in energy savings while not the idea of a reliable medium access control layer.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Deep Generative Modelling A Comparative Review of VAEs, GANs, Normalizing Flows, Energy-Based and Autoregressive Models ABSTRACT: Deep generative models are a category of methods that train deep neural networks
PROJECT TITLE : Video Dissemination over Hybrid Cellular and Ad Hoc Networks - 2014 ABSTRACT: We study the problem of disseminating videos to mobile users by using a hybrid cellular and ad hoc network. In particular, we formulate
PROJECT TITLE : Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Network - 2014 ABSTRACT: Recently, the research focus on geographic routing, a promising routing scheme in wireless sensor networks (WSNs),
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry