Security Authentication for Wireless Sensor Networks Project

Contents

  • Introduction
  • Real time scenario for security authentication implementation
  • Problem statement
  • AIM
  • Objective
  • Rationale
  • Literature
  • Security Requirements
  • Why there is need of Security Authentication is required in Wireless sensor Networks?
  • Disadvantages of the system which exists already
  • Cryptography and RSA Algorithm
  • RSA Algorithm
  • Comparing RSA with other algorithms
  • Research Methodology
  • Questionnaire method
  • Waterfall model
  • Project Plan
  • Bibliography

Problem statement:

Wireless sensor nodes made up of multi functions such as the wireless communication, WSN is not built with security mechanism, due to this wireless applications suffers various type of  attacks   such as the MINM, Dos ,identity of theft, injection of packets,malicious,etc. Because of the no security mechanism in the WSN that causes easy attacks on wireless communication applications. So in order to protect form the various threats in WSN, provide secure routing between the nodes by use of the cryptography technique which provides strong security authentication.

AIM:

The main aim of this Security Authentication for Wireless Sensor Networks Project is to provide secure routing between the sensor nodes of WSN by use of the RSA algorithm which enables the strong authentication for packet transmission in wireless sensor networks.  The design of WSN and RSA algorithm implementation was done in opnet modular.  

Objective:

The Specific Objectives of the project are:- 

1. Literature review about various types of WSN attacks, security requirements for WSN and research on cryptography algorithm such as RSA

2. Back ground approach of existing security routing protocols of WSN

3. Evolution on Implementation of RSA algorithm in Wireless Sensor Networks by use of the OPNET modular.

4. Comparison of different kind of cryptography algorithms with RSA algorithms

5.Performance evolution of  RSA algorithm  based on the various Scenarios

Rationale

Literature:

This section explains the about the wireless sensor network attacks, and specific requirements in order to provide strong authentication for wireless sensor networks. This section also deals with the why the security authentication is required for wireless sensor networks, disadvantage of the existing security protocols for wireless sensor network. This also explains about the RSA algorithm based on the public key cryptography technique and also tells about the comparison of the different cryptography algorithm with the RSA algorithms. This section also about the why did RSA algorithm is suitable    for WSN.

Due to the wireless nature WSN is prone to different kind of attacks. Various type of the attacks are define to the sensor networks, the most common type of attacks includes denial of service(Dos), Message injection,MINM or node capture ,reply attack, cipher-text collision and traffic analysis.

It detect the corrupted nodes characteristics which are exist in the network but consume resource because of the deploy of the WSN networks. This provide cryptography security authentication. 

Research Methodology 

Overview:

Here we need to the approach of quantitative method all the data is collected in theoretical way of Corse no calculations can be used and we need to evaluate the other way called the quantitative way it need to be collected in the values (numbers) so now the result can be executed

Let’s discuss about the work about t e quantitative approach .it surrounds and involves all the respondents and contact’s all the respondents it gives all the services and its consider in this situation its gathers all the data from high resources all the researchers follow they own domain these applications need’s skills like narrating the results the quantitative all the data can be collected using various resources

Questionnaire method: 

It’s a very expensive method to collect all the data from the three resources it’s a very secured way to collect all the data from the respondents its has potential to collect the data with some special components which are involved in to explain in the clear way by seeing all the graphs can be related to the various users of the WSN it has the multiple steps to being the process of the interpretation results break all the aspects of the design now let’s focus on the objective research in the next step of the execution of the all the samples need to be tested in the complex methods not to get confused here all the respondents should be quite clear about the closed format so that they easily answer your questions it the present scenario it  collects data from the rsa,WSN and the open the tools of the opnet involves of the care that need to be taken it looks as cool as that which might make a gradually change in the different aspects of emails collect all the data from that which can be counted as the displaces of the OPNET.

 Data Types:

The entire collection of the can be collected using the primary research the primary research is called first research from the resources then its collects the entitle information of the first research of the data gets all the responses by survey, research all the tasks can be involved easily in the way of the users use it in the different fields try to spend time on the to get some valuable rich of because it can’t get free for the any cost its most expensive spend time on the data money we can rely on the data don’t rely on the primary research of the entire they provide the valuable results of this method.          

Secondary data:

 All the data that’s available in the it has to been in the news papers or the journals of the news paper the internet and its valuable up to the certain level compares all the data this data can be researched in the source which are highly unimportant for the users and these sources not being used in this case of the model.

Waterfall model:

The water fall model 1970, Winston W. Royce was been designed the model is explained below in the diagram this is been specially designed for the software development the output of the of the first will be the input of the second step .They have proposed different models but this model has been the top model.

In this special research we need to analyse the project .In the OPNET we need to discuss about the DSA application because the related that has to collected from this application .This water model is like a life cycle model this is been mainly focused on my project .The water cycle model has four steps these steps are system design requirements analysis ,coding the implementation ,deployment and the maintained and need to test the integration of the analysis .This has been mainly involved in the software development its has been effective and the old model it has developed in the both hardware and the orientation (The Waterfall Development Methodology)

Requirements: All the data gathers and requires the special artefact all these are the indentified in this first stage of the cycle. Special requirements are not used in the first stage of the cycle. For this project specific requirements simulator such as the OPNET modular16, and c++objects, vm ware software operating system windows, tools used to display the graphs by use of the x-graph.

Designing: The structure of the product is designed and all the documents will give clear idea regarding the development that which are highly essentials at the each and every stage.

This project is design in the OPNET modular 16 simulators, topology of the network designed based on the star and ring topology, Node movements in the simulator random motion with speed of 2mbs.   The Nodes are placed in the topology with distance of the 8m each other. Nodes are designed such way that movement nodes within the boundaries if the node movement unboundaries which means out of the area, then that nodes breaks the communication links.

Implementation:

 All the code it is the actual stage all the simulation is used to execute the outputs as the artefact that can be obtained. This project coding is done by use of the c++ code, each node is configured with routing protocols DSDV (distance vector) and RSA algorithm is implemented by use of the public-key cryptography which means key is generated based on the large numerical number (N). Encryption of the message in RSA is done by use of the public key this converts to the cipher text.  Decryption in RSA is done by use of the private key technique. All the sensor nodes are implemented with the wireless channel communication, anteena type used Omni antenna. Nodes are implemented with two ray propagation model.

Verification:

The entire cycle model has to be tested properly without errors and the modify the document to analyse the cycle. Sensor network destination nodes received the packet by verifying of the message after decryption of cipher text the message which compares to the plain text of the original message if both are matches then the authenticated message is received. If the mismatch occurs the message dropped by the receiver at the wireless sensor networks 

Maintain: Modify the products which can be identified to test the case studies of the document that has been produced in this scenario. 

Leave a Reply

Your email address will not be published. Required fields are marked *