SPINS-SPINS: Security Protocols for Sensor Networks
#1

Wireless Sensor Networks

A wireless sensor network consists of large Number Of Nodes.Large number of heterogeneous Sensor devices spread over a large field.They perform Wireless sensing and Data Networking. Group of sensors linked by wireless media to perform distributed sensing tasks
Each node has three components: sensing, processing, and communication. Networked sensors can continue to operate accurately in face of failure of individual sensors.Each sensor node operates autonomously with no central point of control in the network. Each node bases its decision on its mission.

SPIN: Sensor Protocols for Information Negotiation

It is one of the most dominant form of routing in the wireless sensor networks.The SPIN protocol names the data using data descriptors or meta data.The nodes use meta data negotiations to eliminate transmission of redundant data in the network. SPIN nodes can base their communication decisions on knowledge of data and resources allowing them to distribute data given limited energy supply.

Advantages of SPIN
negotiation
-SPIN nodes negotiate with each other before transmitting data. This ensures that only the useful information is transferred.
-SPIN uses descriptors called meta data
-Redundant data messages are not sent
-Nodes are able to name the portion of data they are interested in obtaining.

Resource adaptation
-The wireless sensor network nodes poll their resources before data transmission
-Each sensor node had its own resource manager that keeps track of resource consumption
-Nodes are aware of their local energy resources and this enables them to reduce their activities when their energy resources are low
-Nodes monitor and adapt to changes in their own energy resources and thus extend the operating lifetime of the system

SPINS: Security Protocols for Sensor Networks
With thousands to millions of small sensors form self-organizing wireless networks in the future, providing security for these sensor networks is a big issue.
SPINS has two secure building blocks: SNEP(Secure Network Encryption
Protocol) and microTESLA((the micro version of the Timed, Efficient, Streaming, Loss-tolerant Authentication Protocol). SNEP provides the following : Data confidentiality, two-party data authentication, and data freshness. microTESLA provides authenticated broadcast for severely resource-constrained environments.

SPINS SECURITY BUILDING BLOCKS
SNEP:
This provides Data Confidentiality, Authentication, Integrity, and Freshness.
- it has low communication overhead as it adds only 8 bytes per message.The counter state is kept at each end point and does not need to be sent in each message.
-it uses a counter, but avoids transmitting the counter value by keeping state at both
end points.
- It achieves semantic security which prevents eavesdroppers from inferring the
message content from the encrypted message.
- This protocol also provides data authentication, replay protection, and weak message freshness.
To achieve two-party authentication and data integrity, a message authentication code (MAC) is used.
Data authentication: If the MAC(message authentication code) verifies correctly, a receiver
can be assured that the message originated from the claimed sender.

Replay protection: The counter value in the MAC prevents replaying old messages.

Semantic security: the same message is encrypted differently each time.

Weak freshness: If the message verified correctly, a receiver
knows that the message must have been sent after the previous
message it received correctly. Thus it achieves weak freshness.

microTESLA
microTESLA overcomes introduces asymmetry through a delayed disclosure of symmetric
keys, which results in an efficient broadcast authentication
scheme. It requires that the base station and nodes are loosely
time synchronized, and each node knows an upper bound on the
maximum synchronization error. To send an authenticated packet of data,
the base station computes a MAC on the packet with a key
that is secret at that particular point in time. When a node gets a packet, it can
verify that the corresponding MAC key was not yet disclosed by
the base station. Since a receiving node is assured that the MAC key
is known only by the base station, the receiving node is assured that the data was not modified during the sending process. If the key is correct, the node can
now use it to authenticate the packet stored in its buffer.

Full seminar report download:
[attachment=900]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: fat man spooky spins, ppt for spins protocol, what planet spins clockwise, spooky spins free download, mobile ip security protocols, security in large networks using mediator protocols docu, wireless security protocols,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
SPINS-SPINS: Security Protocols for Sensor Networks - by ajukrishnan - 29-12-2009, 06:45 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,935 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,438 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 31,288 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,185 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,858 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,593 26-02-2015, 08:03 PM
Last Post: Guest
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,475 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,151 30-03-2014, 04:40 AM
Last Post: Guest
  Hardware for image processing - Basics Eye – Human vision sensor ppt computer topic 0 7,770 25-03-2014, 11:12 PM
Last Post: computer topic
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,875 24-03-2014, 10:10 PM
Last Post: seminar report asees

Forum Jump: