SlideShare a Scribd company logo
Secure and Efficient Data Transmission for Cluster-based Wireless
Sensor Networks
ABSTRACT
Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an
effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data
transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically.
We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-
IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline
digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-
Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol
security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem.
We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements
and security analysis against various attacks. The calculations and simulations are provided to ] illustrate the
efficiency of the proposed protocols. The results show that, the proposed protocols have better performance
than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
Existing System
In this Existing System of wireless sensor network comprised of spatially distributed devices using
wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion.
The individual nodes are capable of sensing their environments, processing the information data locally, and
sending data to one or more collection points in a WSN.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Efficient data transmission is one of the most important issues for WSNs. Meanwhile, many WSNs are
deployed in harsh, neglected and often adversarial physical environments for certain applications, such as
military domains and sensing tasks with trustless surroundings
Proposed System
In this Proposed System, Secure and efficient data transmission is thus especially necessary and is
demanded in many such practical WSNs. So, we propose two Secure and Efficient data Transmission (SET)
protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS)
scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively.
It has been proposed in order to reduce the computation and storage costs to authenticate the encrypted
sensed data, by applying digital signatures to message packets, which are efficient in communication and
applying the key management for security.
In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS
initially.
Modules
1. SET Protocol
2. Key management for security
a. Neighborhood authentication
b. Storage cost
c. Network scalability
d. Communication overhead
e. Computational overhead
f. Attack resilience
Modules Description
SET Protocol
In this module, Secure and Efficient data Transmission (SET) protocol for CWSNs. The SET-IBOOS
protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency. The proposed
SET-IBOOS operates similarly to the previous SETIBS, which has a protocol initialization prior to the network
deployment and operates in rounds during communication. We first introduce the protocol initialization, then
describe the key management of the protocol by using the IBOOS scheme, and the protocol operations
afterwards.
Key management for security
In this module, security is based on the DLP in the multiplicative group. The corresponding private
pairing parameters are preloaded in the sensor nodes during the protocol initialization. The IBOOS scheme in
the proposed SET-IBOOS consists of following four operations, extraction, offline signing, online signing and
verifications.
Key management
In this Module, the key cryptographies used in the protocol to achieve secure data transmission, which
consist of symmetric and asymmetric key based security. • Neighborhood authentication
In this module, used for secure access and data transmission to nearby sensor nodes, by authenticating
with each other. Here, “limited” means the probability of neighborhood authentication, where only the nodes
with the shared pairwise key can authenticate each other.
Storage cost
In this module, represents the requirement of the security keys stored in sensor node’s memory.
Network scalability
In this module, indicates whether a security protocol is able to scale without compromising the security
requirements. Here, “comparative low” means that, compared with SET-IBS and SET-IBOOS, in the secure
data transmission with a symmetric key management, the larger network scale increases, the more orphan nodes
appear in the network.
Communication overhead
In this module, the security overhead in the data packets during communication. • Computational
overhead
In this module, the energy cost and computation efficiency on the generation and verifications of the
certificates or signatures for security.
Attack resilience
In this module, the types of attacks that security protocol can protect against.
System Requirements:
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Color.
• Mouse : Logitech.
• Ram : 512 Mb.
Software Requirements:
• Operating system : - Windows 7 Ultimate (32-bit) / Windows XP
• Coding Language : C#.Net
• Front End : Visual Studio 2008

More Related Content

PPTX
Ppt (secure and efficient data transmission 2)
PPTX
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
PPTX
Wsn1 ppt
PPTX
Secure and efficient data transmission for cluster based wireless
PPTX
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
PPTX
Secure and efficient data transmission for cluster based wireless sensor network
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
PPTX
Random key material distribution in wireless sensor networks
Ppt (secure and efficient data transmission 2)
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Wsn1 ppt
Secure and efficient data transmission for cluster based wireless
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and efficient data transmission for cluster based wireless sensor network
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
Random key material distribution in wireless sensor networks

What's hot (20)

PPTX
Security in Wireless Sensor Network
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
secure and efficient data transmission for cluster-based wireless sensor netw...
PPTX
Wireless Sensor Network Security
PPT
security in wireless sensor network
PPT
security in wireless sensor networks
PPT
Security issues
PDF
Data Transfer Security solution for Wireless Sensor Network
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
PPTX
Study of security attacks in manet
PPT
Security and privacy in Wireless Sensor Networks
PDF
Security Key Management Model for Low Rate Wireless Personal Area Networks
PDF
S04404116120
PDF
A key management approach for wireless sensor networks
PDF
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PPTX
Wireless Sensor Network
PPT
Security in wireless sensor networks
PDF
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
Security in Wireless Sensor Network
Secure data aggregation technique for wireless sensor networks in the presenc...
secure and efficient data transmission for cluster-based wireless sensor netw...
Wireless Sensor Network Security
security in wireless sensor network
security in wireless sensor networks
Security issues
Data Transfer Security solution for Wireless Sensor Network
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
Study of security attacks in manet
Security and privacy in Wireless Sensor Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
S04404116120
A key management approach for wireless sensor networks
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Wireless Sensor Network
Security in wireless sensor networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
Ad

Viewers also liked (10)

PDF
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
ZIP
TinyOS 2.1 Tutorial: TOSSIM
PDF
Intoduction to TinyOS, nesC and TOSSIM
PDF
Unit 1 basic concepts of DBMS
DOC
Dbms Lecture Notes
PPTX
C1 basic concepts of database
DOCX
Database management system
PPT
Basic DBMS ppt
PPTX
Dbms slides
PPT
Database management system presentation
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
TinyOS 2.1 Tutorial: TOSSIM
Intoduction to TinyOS, nesC and TOSSIM
Unit 1 basic concepts of DBMS
Dbms Lecture Notes
C1 basic concepts of database
Database management system
Basic DBMS ppt
Dbms slides
Database management system presentation
Ad

Similar to Secure and efficient data transmission for cluster based wireless sensor networks (20)

DOC
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
Conclusion
PDF
A secure and efficient id based aggregate signature scheme for wireless senso...
DOCX
Implementation
PDF
2.espk external agent authentication and session key establishment using publ...
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
PDF
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
DOCX
A distributed fault intrusion tolerant sensor
PDF
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
PDF
A survey on wireless sensor networks security with the integration of cluster...
PDF
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
PDF
BlockChain Enabled-Cloud Delivered For Network Secuirty
DOCX
Providing user security guarantees in public infrastructure clouds
PPTX
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
PDF
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
DOCX
Introuduction
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
Conclusion
A secure and efficient id based aggregate signature scheme for wireless senso...
Implementation
2.espk external agent authentication and session key establishment using publ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
A distributed fault intrusion tolerant sensor
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
A survey on wireless sensor networks security with the integration of cluster...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
BlockChain Enabled-Cloud Delivered For Network Secuirty
Providing user security guarantees in public infrastructure clouds
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Introuduction

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
DOCX
Spatial approximate string search
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks
Spatial approximate string search

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPT
Teaching material agriculture food technology
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Transforming Manufacturing operations through Intelligent Integrations
Sensors and Actuators in IoT Systems using pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Teaching material agriculture food technology
madgavkar20181017ppt McKinsey Presentation.pdf
NewMind AI Monthly Chronicles - July 2025
Understanding_Digital_Forensics_Presentation.pptx

Secure and efficient data transmission for cluster based wireless sensor networks

  • 1. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks ABSTRACT Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET- IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie- Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to ] illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption. Existing System In this Existing System of wireless sensor network comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. Efficient data transmission is one of the most important issues for WSNs. Meanwhile, many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings Proposed System In this Proposed System, Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. So, we propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. It has been proposed in order to reduce the computation and storage costs to authenticate the encrypted sensed data, by applying digital signatures to message packets, which are efficient in communication and applying the key management for security. In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS initially. Modules 1. SET Protocol 2. Key management for security a. Neighborhood authentication b. Storage cost c. Network scalability d. Communication overhead e. Computational overhead f. Attack resilience Modules Description SET Protocol In this module, Secure and Efficient data Transmission (SET) protocol for CWSNs. The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency. The proposed
  • 3. SET-IBOOS operates similarly to the previous SETIBS, which has a protocol initialization prior to the network deployment and operates in rounds during communication. We first introduce the protocol initialization, then describe the key management of the protocol by using the IBOOS scheme, and the protocol operations afterwards. Key management for security In this module, security is based on the DLP in the multiplicative group. The corresponding private pairing parameters are preloaded in the sensor nodes during the protocol initialization. The IBOOS scheme in the proposed SET-IBOOS consists of following four operations, extraction, offline signing, online signing and verifications. Key management In this Module, the key cryptographies used in the protocol to achieve secure data transmission, which consist of symmetric and asymmetric key based security. • Neighborhood authentication In this module, used for secure access and data transmission to nearby sensor nodes, by authenticating with each other. Here, “limited” means the probability of neighborhood authentication, where only the nodes with the shared pairwise key can authenticate each other. Storage cost In this module, represents the requirement of the security keys stored in sensor node’s memory. Network scalability In this module, indicates whether a security protocol is able to scale without compromising the security requirements. Here, “comparative low” means that, compared with SET-IBS and SET-IBOOS, in the secure data transmission with a symmetric key management, the larger network scale increases, the more orphan nodes appear in the network. Communication overhead In this module, the security overhead in the data packets during communication. • Computational overhead In this module, the energy cost and computation efficiency on the generation and verifications of the certificates or signatures for security. Attack resilience In this module, the types of attacks that security protocol can protect against.
  • 4. System Requirements: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Color. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : - Windows 7 Ultimate (32-bit) / Windows XP • Coding Language : C#.Net • Front End : Visual Studio 2008