K.Vijay , M.Pradip.
Page No : 1-6
WIRELESS SENSOR NETWORKS TO TRANSMIT DATA ACROSS VARIOUS INTERMEDIARIES
Secure data transmission is a critical issue for wireless sensor networks (WSNs).
Clustering is an effective and practical way to enhance the system performance of WSNs. In this
paper, we study a secure data transmission for cluster-based WSNs (Wireless sensor network), where
the clusters are formed dynamically and periodically.
We propose two secure and efficient data transmission (SET) protocols for Wireless sensor network,
called SET IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the
identity-based online/offline digital signature (IBOOS) scheme, respectively. In SET-IBS, security
relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further
reduces the computational overhead for protocol security, which is crucial for WSNs, while its
security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SETIBS
and SET-IBOOS protocols with respect to the security requirements and security analysis against
T.M.Saluja , J. Vidhyabharthi.
Page No : 7-12
Accurate Energy Consumption based Routing Mechanism for Wireless Adhoc Networks
Energy Efficiency and sensing coverage distance, Life time has increased for
essential metrics for enhancing the wireless sensor networks. Its growth is expeditiously
increasing an immense field for research in this area. Sensors has depends entirely on the trust of
their battery of power, which can’t be revitalized or substituted. So the design of energy aware
protocol is essential in respect to enhance the lifetime network. LEACH is an energy efficient
hierarchical based protocol that balances the energy expenses, saves the node energy and hence to
prolongs the lifetime of the network. So the design of energy aware protocol is essential in respect
to enhance the lifetime network. LEACH is an energy efficient hierarchical based protocol that
balances the energy expenses, saves the node energy and hence to prolongs the lifetime of the
network. The cluster-based technique is one of the approaches to reduce energy consumption in
wireless sensor networks. The simulation of the work has been carried out by using own set of
parameters and in the last of the paper conclusions is drawn.
M.K Sharma , Jainami Vyas.
Page No : 13-18
PRIVACY PROTECTION USING HYBRID CRYPTOGRAPHY FOR MANET
Exploitation of rateless codes in MANET for dissemination of data packet node is
determined. A node is created for coded block of payloads which gives solution to the problems of
malicious node identification which implies pollution attack intentionally. Usually when vulnerable
data packets intrude networks with malicious coded node which prohibits decoding of the message
data appropriately in a network can be termed as pollution attacks. Normally a node creates check for
decoding the chunk autonomously. As the pollution attack described in the existing system would not
handle rateless codes which is not that much efficient to protect data while transmission. In this paper
we proposed a technique that HYBRID CRYPTOGRAPHY that overcomes every existing
disadvantage and provides security without any performance loss.AES can be used to encrypted the
data and ECC can be used to encrypted the key . In our new technique we achieve high security so
that there is no performance loss during data transmission.
Page No : 19-24
SECURITY STRUCTURE OF VPN : A SURVEY
This paper examines virtual private network (VPN) operation and how the network
security concerns are implemented. We describe what VPN is, the different protocols used to
address security concerns, and finally we look at point to point of protocol as used in Microsoft
Windows family operating systems. In this, a virtual local area network (LAN) is connected to a
LAN emulation server and LAN emulation clients, and a router is connected between the internet
and the virtual LAN. Also, a public mobile data network is connected to a location register and
mobile data subscriber processing units, and a data gateway is connected between the internet and
the public mobile data networks Further, a virtual private network gateway is connected between
the virtual LAN and the public mobile data network. A mobile data terminal having one IP
address and one public network address and can be connected to either one of the LAN emulation
clients or one of the mobile data subscriber processing units .