SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Secure and Efficient Data Transmission for Cluster-based Wireless 
Sensor Networks 
ABSTRACT 
Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an 
effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data 
transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. 
We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, 
by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline 
digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie- 
Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol 
security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. 
We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements 
and security analysis against various attacks. The calculations and simulations are provided to ] illustrate the 
efficiency of the proposed protocols. The results show that, the proposed protocols have better performance 
than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption. 
Existing System 
In this Existing System of wireless sensor network comprised of spatially distributed devices using 
wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion.
The individual nodes are capable of sensing their environments, processing the information data locally, and 
sending data to one or more collection points in a WSN. 
Efficient data transmission is one of the most important issues for WSNs. Meanwhile, many WSNs are 
deployed in harsh, neglected and often adversarial physical environments for certain applications, such as 
military domains and sensing tasks with trustless surroundings 
Proposed System 
In this Proposed System, Secure and efficient data transmission is thus especially necessary and is 
demanded in many such practical WSNs. So, we propose two Secure and Efficient data Transmission (SET) 
protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) 
scheme and the Identity-Based Online/O ffline digital Signature (IBOOS) scheme, respectively. 
It has been proposed in order to reduce the computation and storage costs to authenticate the encrypted 
sensed data, by applying digital signatures to message packets, which are efficient in communication and 
applying the key management for security. 
In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS 
initially. 
Modules 
1. SET Protocol 
2. Key management for security 
a. Neighborhood authentication 
b. Storage cost 
c. Network scalability 
d. Communication overhead 
e. Computational overhead 
f. Attack resilience 
Modules Description
SET Protocol 
In this module, Secure and Efficient data Transmission (SET) protocol for CWSNs. The SET-IBOOS 
protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency. The proposed 
SET-IBOOS operates similarly to the previous SETIBS, which has a protocol initialization prior to the network 
deployment and operates in rounds during communication. We first introduce the protocol initialization, then 
describe the key management of the protocol by using the IBOOS scheme, and the protocol operations 
afterwards. 
Key management for security 
In this module, security is based on the DLP in the multiplicative group. The corresponding private 
pairing parameters are preloaded in the sensor nodes during the protocol initialization. The IBOOS scheme in 
the proposed SET-IBOOS consists of following four operations, extraction, offline signing, online signing and 
verifications. 
Key management 
In this Module, the key cryptographies used in the protocol to achieve secure data transmission, which 
consist of symmetric and asymmetric key based security. • Neighborhood authentication 
In this module, used for secure access and data transmission to nearby sensor nodes, by authenticating 
with each other. Here, “limited” means the probability of neighborhood authentication, where only the nodes 
with the shared pairwise key can authenticate each other. 
Storage cost 
In this module, represents the requirement of the security keys stored in sensor node’s memory. 
Network scalability 
In this module, indicates whether a security protocol is able to scale without compromising the security 
requirements. Here, “comparative low” means that, compared with SET-IBS and SET-IBOOS, in the secure 
data transmission with a symmetric key management, the larger network scale increases, the more orphan nodes 
appear in the network. 
Communication overhead 
In this module, the security overhead in the data packets during communication. • Computational 
overhead 
In this module, the energy cost and computation efficiency on the generation and verifications of the 
certificates or signatures for security.
Attack resilience 
In this module, the types of attacks that security protocol can protect against. 
System Requirements: 
Hardware Requirements: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 15 VGA Color. 
• Mouse : Logitech. 
• Ram : 512 Mb. 
Software Requirements: 
• Operating system : - Windows 7 Ultimate (32-bit) / Windows XP 
• Coding Language : C#.Net 
• Front End : Visual Studio 2008

More Related Content

DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
DOC
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
secure and efficient data transmission for cluster-based wireless sensor netw...
PDF
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
PPTX
Ppt (secure and efficient data transmission 2)
PPTX
Wsn1 ppt
PPTX
Secure and efficient data transmission for cluster based wireless
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Secure and efficient data transmission for cluster based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
Ppt (secure and efficient data transmission 2)
Wsn1 ppt
Secure and efficient data transmission for cluster based wireless

What's hot (17)

PDF
A New Trust Model for 5G Networks
PDF
Virtual security gateways at network edge are key to protecting ultra broadba...
PPTX
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
PPTX
Using distributed firewalls in securing LANs
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
PDF
Tinysec
PDF
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
PDF
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
PPTX
Network security ppt
PDF
Ipsn08 tiny ecc-ieee
PDF
D0371028039
PDF
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
PPTX
Random key material distribution in wireless sensor networks
PDF
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
PDF
S04404116120
A New Trust Model for 5G Networks
Virtual security gateways at network edge are key to protecting ultra broadba...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Using distributed firewalls in securing LANs
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
Tinysec
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
Network security ppt
Ipsn08 tiny ecc-ieee
D0371028039
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Random key material distribution in wireless sensor networks
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
S04404116120
Ad

Similar to 2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for cluster based wireless sensor networks (20)

DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
PDF
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
PPTX
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
PPTX
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
PDF
International Journal of Engineering Research and Development
PDF
I1086066
PDF
I1086066
PDF
G0933443
DOCX
Conclusion
PDF
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
PDF
Data Transfer Security solution for Wireless Sensor Network
PDF
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
DOCX
Implementation
PDF
Security in Wireless Sensor Networks Using Broadcasting
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
PDF
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
International Journal of Engineering Research and Development
I1086066
I1086066
G0933443
Conclusion
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
Data Transfer Security solution for Wireless Sensor Network
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
Implementation
Security in Wireless Sensor Networks Using Broadcasting
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Ad

More from IEEEFINALSEMSTUDENTSPROJECTS (20)

DOCX
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
DOCX
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
web development for engineering and engineering
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Digital Logic Computer Design lecture notes
DOCX
573137875-Attendance-Management-System-original
PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CH1 Production IntroductoryConcepts.pptx
Foundation to blockchain - A guide to Blockchain Tech
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
web development for engineering and engineering
Internet of Things (IOT) - A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Sustainable Sites - Green Building Construction
Geodesy 1.pptx...............................................
composite construction of structures.pdf
PPT on Performance Review to get promotions
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
OOP with Java - Java Introduction (Basics)
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Digital Logic Computer Design lecture notes
573137875-Attendance-Management-System-original
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for cluster based wireless sensor networks

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks ABSTRACT Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie- Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to ] illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption. Existing System In this Existing System of wireless sensor network comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion.
  • 2. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. Efficient data transmission is one of the most important issues for WSNs. Meanwhile, many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings Proposed System In this Proposed System, Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. So, we propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/O ffline digital Signature (IBOOS) scheme, respectively. It has been proposed in order to reduce the computation and storage costs to authenticate the encrypted sensed data, by applying digital signatures to message packets, which are efficient in communication and applying the key management for security. In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS initially. Modules 1. SET Protocol 2. Key management for security a. Neighborhood authentication b. Storage cost c. Network scalability d. Communication overhead e. Computational overhead f. Attack resilience Modules Description
  • 3. SET Protocol In this module, Secure and Efficient data Transmission (SET) protocol for CWSNs. The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency. The proposed SET-IBOOS operates similarly to the previous SETIBS, which has a protocol initialization prior to the network deployment and operates in rounds during communication. We first introduce the protocol initialization, then describe the key management of the protocol by using the IBOOS scheme, and the protocol operations afterwards. Key management for security In this module, security is based on the DLP in the multiplicative group. The corresponding private pairing parameters are preloaded in the sensor nodes during the protocol initialization. The IBOOS scheme in the proposed SET-IBOOS consists of following four operations, extraction, offline signing, online signing and verifications. Key management In this Module, the key cryptographies used in the protocol to achieve secure data transmission, which consist of symmetric and asymmetric key based security. • Neighborhood authentication In this module, used for secure access and data transmission to nearby sensor nodes, by authenticating with each other. Here, “limited” means the probability of neighborhood authentication, where only the nodes with the shared pairwise key can authenticate each other. Storage cost In this module, represents the requirement of the security keys stored in sensor node’s memory. Network scalability In this module, indicates whether a security protocol is able to scale without compromising the security requirements. Here, “comparative low” means that, compared with SET-IBS and SET-IBOOS, in the secure data transmission with a symmetric key management, the larger network scale increases, the more orphan nodes appear in the network. Communication overhead In this module, the security overhead in the data packets during communication. • Computational overhead In this module, the energy cost and computation efficiency on the generation and verifications of the certificates or signatures for security.
  • 4. Attack resilience In this module, the types of attacks that security protocol can protect against. System Requirements: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Color. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : - Windows 7 Ultimate (32-bit) / Windows XP • Coding Language : C#.Net • Front End : Visual Studio 2008