SKEW : Efficient self key establishment protocol for wireless sensor networks
Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
pawan_p
Active In SP
**

Posts: 5
Joined: Jan 2010
#1
11-02-2010, 03:04 PM


Can sombody please post report on this topic... its very urgent...
Reply
seminarbuddy
Active In SP
**

Posts: 261
Joined: Feb 2010
#2
14-02-2010, 08:22 PM

SKEW: An Efficient Self Key Establishment Protocol for
Wireless Sensor Networks


INTRODUCTION:
Wireless Sensor Networks architectures can generally be organized in two
ways: distributed and hierarchal. A hierarchical WSN has a network hierarchy based on factors like power and memory among the sensor nodes. The Cluster heads collect local or received data and send them to base stations. Cryptography keys in the protocols used in WSNs are transmitted within nodes via messages and thus incur heavy overheads. A sender node has 2 options :either send 2
messages to a receiver node, one for transmitting its
symmetric key and another for the message text itself,and the second option is
just send 1 message containing the text of its message if it
knows (has stored) the symmetric keys of all its neighbors.

THE SKEW APPROACH
The approach is described for hierarchical
WSNs and distributed WSNs.
a)in case of hierarchical WSN:
Here, each sensor node has A unique ID, A pseudo-random function, for generating the next key in sequence, A unique cluster number for each cluster member, and A group key as shared key between all nodes. The node memory is divided into three logical parts:1) RAM memory section, 2) executive code memory section, and
3) non volatile memory section. If an attacker desires to access RAM information, the node detects this and will reset and thus the RAM information will be secure. It is assumed that the data in executive code can be changed.Each node in the hierarchical approach sends an encrypted message by a cluster key. The version in each cluster acts as a sequence number for the next key generation in sequence.The base station node sends a message containing the initial cluster key (Kv1) and the cluster number, encrypted by the group key, to all nodes in each cluster.every key refreshing message has a header(containing informtion about cluster key version and cluster number.) and trailer(containing the message text body) parts. A node on recieving the key refreshing message,
decrypts the message header by the group key and reads the message key version.If the tailor is successfully decrypted, it continues Otherwise, it ignores the message on ground of being insecure or tampered with.

b)case of distributed WSN:
Here each sensor node has: A unique ID, A private key known to the base station too, A pseudo-random function for generating the next key in sequence, A group keyas a shared key between all sensor nodes.all nodes encrypt messages with
group key and the group key can be refreshing
periodically.each individual node which generates new version
group key, broadcasts the group key to all nodes that can receive key refreshing message.

report:
nslab.kaist.ac.kr/courses/2009/cs712/paperlist/2-4.pdf
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
pawan_p
Active In SP
**

Posts: 5
Joined: Jan 2010
#3
21-02-2010, 07:14 PM

Can i get the report on this.... n can ny 1 post the ppt presentation on this plz....
can i get the report and ppt presentation plzz...
Hey thank you....can i get the report this please... does any 1 have the ppt presentation....?
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  automatic self torque adjusting vehicle research paper pdf Guest 1 78 31-10-2016, 02:46 PM
Last Post: amrutha735
  piano key spillways for dams seminar report ppt Guest 1 80 31-10-2016, 02:27 PM
Last Post: jaseela123
  ppt on high sensitive alcohol sensor with auto car ignition disable function Guest 1 76 31-10-2016, 12:27 PM
Last Post: anusree
  matlab codes for dsdv routing protocol Guest 1 50 31-10-2016, 11:26 AM
Last Post: amrutha735
  ieee seminar paper on wireless tachometer pdf Guest 1 76 31-10-2016, 11:14 AM
Last Post: amrutha735
Wink details of solar based high efficient vacuum cleaner pdf file Guest 1 97 29-10-2016, 04:18 PM
Last Post: Dhanabhagya
  wireless fingerprint attendance system based on zigbee technology seminar ppts Guest 1 56 29-10-2016, 03:39 PM
Last Post: amrutha735
  download pdf for automaticintelligent plantwateringsystem microcontroller rain sensor Guest 1 8 29-10-2016, 03:14 PM
Last Post: amrutha735
  documentation on intelligent wireless video cameras Guest 1 72 29-10-2016, 02:56 PM
Last Post: amrutha735
  self induction download pdf investigotry project Guest 1 66 29-10-2016, 12:20 PM
Last Post: jaseela123