Search or add a thesis

Advanced Search (Beta)
Home > A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks

A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks

Thesis Info

Access Option

External Link

Author

Khan, Muhammad Saud

Program

PhD

Institute

Capital University of Science & Technology

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10387/1/M%20Saud%20Khan_Computer_Sci_2019_CUST_ISD_30.04.2019.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727689433

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

فصل اول: قرآن حکیم میں آیات استفہام کی ضرورت واہمیت

قرآن مجید فصاحت و بلاغت کےاعتبار سے ایک مثالی کتاب ہے۔علم معانی ہو یا علمِ بیان یا علم بلاغت کے ماہرین نے اس کی لسانی وادبی خصوصیات کو نگارشات کا موضوع بنایا ہے۔ فصاحت و بلا غت کی انہی خوبیوں کی بنا پر قرآن مجید کو کلام مبین بھی کہا گیا ہے۔ قرآن مجید میں جہاں ایجاز و اطناب اور ربط و مساوات کے اسالیب نظر آتے ہیں، وہیں تقدیم و تاخیر اور حذف کے اسلوب بھی نمایاں ہیں۔ قرآن مجید کے مختلف و منفرد اسالیب میں سے ایک اہم اسلوب ِ استفہام ہے۔
استفہام عربی زبان کا لفظ ہے جس کے معنی سوال کرنے، جاننے،فہم حاصل کرنے اور استفسار کرنے کے معنوں میں استعمال ہوتا ہے۔ ادب میں استفہام کسی حقیقت سے مخاطب کو آگاہ کرنے ، مخاطب کو غورو فکر کی دعوت دینا، اور اپنی بات کا ثبات کرنا وغیرہ کے معنوں میں مستعمل ہے۔چنانچہ قرآن مجید میں بھی استفہام کا اسلوب بکثرت استعمال کیا گیا ہے۔
قرآن میں استفہامیہ اسلوب کے مقاصد
قرآن حکیم میں استفہام کا اسلوب کثرت سے استعمال کیا گیا ہے ۔ مخاطب میں آمادگی پیدا کرنے، غور وفکر کی دعوت دینے، مخاطب کو جواب سننے کےلیے آمادہ کرنے ، اور مخاطب سے کسی حقیقت کا اقرار کرانے کے لیے یہ اسلوب استعمال کیا گیا ہے ۔ استفہام ،اثبات کے ذریعے بھی کیا گیاہے اور منفی اندازِ استفہام بھی نظر آتاہے ۔علاوہ ازیں تاکید، ترغیب ،توبیخ،تحقیر، عبرت اندوزی، شان و شوکت کے اظہار اور التفات و نوازش کے لیے بھی اسے استعمال کیا گیاہے ۔ یہ اقرار و امر کےمعنی میں بھی آیاہے اوراظہار تعجب کے لیے بھی۔ حسرت کے انداز میں بھی اور بانداز استعجاب و استہزاء بھی۔ مسلسل استفہام بھی قرآن میں استعمال کیا گیا ہے ۔ مذکورہ بالا مقاصد وحکمتوں اور اس کے منفرد استعمال پر ذیل...

حقِ انتفاع و انتفاعی ملکیت: ایک فقہی تحقیقی جائزہ

There is quite difference between ownership and right of use in other words usufruct, at present this term is widely used in Islamic financial institutions for beneficial ownership. But the use of this term is entirely changed from western law and Islamic law. Particularly in Islamic law, legality of a product or things depends on its objectives. In this article it has been discussed in detail in the light of different school of thoughts of Islamic jurisprudence.  

Molecular Diagnosis and Prevalence of Brucellosis in N. W. F. P Pakistan

Brucellosis is a disease with major social and financial implications in many countries, particularly in the developing world. In Pakistan, although there are systems for the detection of brucellosis based on serum agglutination testing, more sophisticated methods such as Polymerase Chain Reaction (PCR), Real-Time PCR, Enzyme Linked Immunosorbent Assay (ELISA) and Fluorescence Polarization Assay (FPA) are not applied routinely. Similarly, the classical and particularly molecular characterization approaches to understand the epidemiological features of Brucella are in infancy. In the present study, serum was used as clinical specimen for serological and molecular diagnosis of brucellosis whereas field culture isolates were used for conventional and molecular characterization purposes. Milk samples were also tested where possible. In total, 277 serum samples of both human and animal origin were collected from 6 districts of Khyber Pakhtunkhwa Province of Pakistan. These samples were then tested at the Animal Health and Veterinary Laboratories Agency, United Kingdom for further validation. From 167 animal sera, 4%, 6%, 13%, 21% and 31% animals were positive by RBPT, cELISA, PCR BCSP31, PCR IS711 and Real-Time PCR, respectively. Out of total 110 human sera belonging to various occupational groups, 5%, 9%, 31%, 38%, 53% and 60% were detected positive by RBPT, cELISA, FPA, PCR BCSP31, PCR IS711 and Real-Time PCR, respectively. A total of 51 milk samples were tested which revealed the prevalence of brucellosis as 12% with Indirect ELISA and none of the sample produced positive results by Milk Ring Test (MRT). In human, positive male showed clinical complaints of arthritis and hepatitis while in female abortion in 4-5 month of pregnancy, headache and arthritis were the main clinical signs. Amongst the positive detected animals, abortion in last trimester, retention of placenta and mastitis were the key clinical features. Cultured field isolates when subjected to phenotypic and molecular characterization techniques found to be in resemblance with Brucella melitensis biovar1. These results give an indication of the prevalence of brucellosis in Pakistan and show that the disease is not only confined to livestock but is also present in the human population. In Pakistan, where there are few centres for brucellosis testing and large areas to cover, serum might provide the best specimen for the determination of infection, based on its stability over time.