VEBEK: Virtual Energy-Based Encryption And Keying For Wireless Sensor Networks
#1

VEBEK: Virtual Energy-Based Encryption And Keying For Wireless Sensor Networks

– – Mobile Computing – Dot Net

Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption, we introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is imperative for some military applications of WSNs where an adversary could be monitoring the wireless spectrum. VEBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific rekeying messages. VEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders. The VEBEK framework consists of two operational modes (VEBEK-I and VEBEK-II), each of which is optimal for different scenarios. In VEBEK-I, each node monitors its one-hop neighbors where VEBEK-II statistically monitors downstream nodes. We have evaluated VEBEK’s feasibility and performance analytically and through simulations. Our results show that VEBEK, without incurring transmission overhead (increasing packet size or sending control messages for rekeying), is able to eliminate malicious data from the network in an energyefficient manner. We also show that our framework performs better than other comparable schemes in the literature with an overall 60-100 percent improvement in energy savings without the assumption of a reliable medium access control layer.
Reply
#2
plz get me ppt of vebek project...
Reply
#3
hi.. i need a full project report of VEBEK
Reply
#4
Abstract
The VEBEK allows the design of a cost efficient secure network protocol for the WSN(wireless sensor networks). It reduces the number of transmissions that are needed for the purpose of rekeying. The sensed data in this system is encoded using the RC4 encryption system.
The static and dynalic are the two prominent key management schemes that are currently used in the wireless sensor networks. The key management functions are handled statically in the static key management system. Periodic or on demand keying functions are provided by the dynamic key management schemes.

Disadvantages
The main disadvantage is that the communication cost is expensive in a sensor's communication. And in a WSN deployment, the message transmission cost for rekeying is expensive.

Proposed System
The VEBEK scheme will significantly reduce the number of transmissions needed for rekeying. RC4 encryption mechanism is used by the VEBEK. It can detect and filter out the false data in the network injected by the malicious users.

http://scribddoc/50639502/1-VEBEK-Virtual-Energy-Based-Encryption-and-Keying-for-Wireless-Sensor-Networks
Reply
#5
to get information about the topic VEBEK: Virtual Energy-Based Encryption And Keying For Wireless Sensor Networks full report ppt and related topic refer the page link bellow

http://studentbank.in/report-vebek-virtu...r-networks

http://studentbank.in/report-vebek-virtu...5#pid48675
Reply
#6
Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks


.doc   Virtual Energy-Based Encryption.doc (Size: 31.5 KB / Downloads: 2)

Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption. RAPIDLY developed WSN technology is no longer nascent and will be used in a variety of application scenarios. Typical application areas include environmental, military, and commercial enterprises. For example, in a battlefield scenario, sensors may be used to detect the location of enemy sniper fire or to detect harmful chemical agents before they reach troops. In another potential scenario, sensor nodes forming a network under water could be used for oceanographic data collection, pollution monitoring, assisted navigation, military surveillance, and mine investigation operations.

Existing System:

One significant aspect of confidentiality research in WSNs entails designing efficient key management schemes. This is because regardless of the encryption mechanism chosen for WSNs, the keys must be made available to the communicating nodes (e.g., sources and sink(s)). The keys could be distributed to the sensors before the network deployment or they could be redistributed (rekeying) to nodes on demand as triggered by keying events. The former is static key management and the latter is dynamic key management. There are myriads of variations of these basic schemes in the literature.

Proposed System

We introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is very important for some military applications of WSNs where an opponent could be monitoring the wireless spectrum. VEBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism.

Module Description

Sender:-
Sender module deals with sender operations and allows sender to transmit data to the receiver. The sender needs to select the file and encrypt the file using key and send through the network to the Receiver.
Receiver:-
Receiving Module will deals with the receiving operations. It receives the encrypted file which is send by the sender and it will decrypt the file using key and show the message to the user.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: virtual energy based encryption and keying, vebek ppt, ppt vebek virtual energy based encryption and keying for wireless sensor networks 2010, use case diagram for vebek, virtual energy based encryption and keying ppt, how to vebek, logarithmic keying communication networks ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,548 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 857 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,047 15-02-2017, 03:40 PM
Last Post: jaseela123d
  LTE-ADVANCED AND 4G WIRELESS COMMUNICATIONS 1 727 15-02-2017, 12:51 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 788 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 751 15-02-2017, 11:00 AM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 740 14-02-2017, 02:13 PM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,580 25-01-2016, 02:26 PM
Last Post: seminar report asees
  Reconfigurable Virtual Keyboard seminar class 5 2,057 30-11-2015, 02:30 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,334 14-07-2015, 02:25 PM
Last Post: seminar report asees

Forum Jump: