Professional Documents
Culture Documents
ARCHITECTURE:
EXISTING SYSTEM:
The Existing Systems used various techniques such as:
o Asymmetric key technique for the key exchange technique.
o Probabilistic key predistribution scheme
o Two key predistribution schemes
Although the above security approach makes the network more
resilient to mobile sink replication attacks compared to the single
polynomial pool-based key predistribution scheme, it is still
vulnerable to stationary access node replication attacks. In these types
of attacks, the attacker is able to launch a replication attack similar to
the mobile sink replication attack. After a fraction of sensor nodes
have been compromised by an adversary, captured static polynomials
can be loaded into a replicated stationary access node that transmits
PROPOSED SYSTEM:
To address the above-mentioned problem, we have developed a general
framework that permits the use of any pairwise key predistribution scheme
as its basic component, to provide authentication and pairwise key
establishment between sensor nodes and MSs.
To facilitate the study of a new security technique, we first cultivated a
general three-tier security framework for authentication and pairwise key
establishment, based on the polynomial pool-based key predistribution
scheme
MODULES:
Sensor Module
Access Point Module
Mobile Sink Module
Pair-wise Key Establishment Scheme Module
Key Distribution scheme Module
MODULE DESCRIPTION:
Sensor Module
We know that Wireless Sensor Networks (WSN) are sensing, computing
and communication infrastructure that are able to observe and respond to
phenomena in the natural environment and in our physical and cyber
infrastructure. The sensors themselves can range from small passive micro
sensors to larger scale, controllable weather-sensing platforms.
This protocol uses two separate key management schemes; one for
group-wide and individual keys and another for sub-network key
management.
System Requirements:
Hardware Requirements:
System
Hard Disk
: 40 GB.
Floppy Drive
: 1.44 Mb.
Monitor
: 15 VGA Colour.
Mouse
: Logitech.
Ram
: 512 Mb.
Software Requirements:
Operating system : Windows XP.
Coding Language : Java
Technology
: J2SE
Tool
: Netbeans 7.0
Front End
: Swings
REFERENCE:
Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior
Member, The Three-Tier Security Scheme in Wireless Sensor Networks
with Mobile Sinks, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012.