07-02-2013, 04:55 PM
Aiming at Higher Network Security Through Extensive Penetration Tests
Abstract:
In an olden research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. This scenario is common, from payment terminals and e-passport readers to online services. We implement one application of these encod¬ing functions is PACE (Password-Authenticated Communication Establishment). But even today, many implementa¬tions rely on more or less ad hoc protocols that might be vulner¬able to replay attacks, man-in-the-middle attacks, and so on.
We propose a novel driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We can be implement¬ed PAKE protocol, DH-EKE (Diffie- Hellman encrypted key exchange) over any group, but over the group of points on an elliptic curve, it’s vulnerable to the attack. The performance evaluation and security analysis show that can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Existing System
Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities.
An Existing key management like RSA schemes require a large storage space for key pre-distribution and are not suitable for small sensor nodes
Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead.
Sensor key management schemes are designed to set up shared keys for all pairs of neighbor sensors, without considering the actual communication pattern.
Proposed System
We adopt a heterogeneous sensor network (hsn) model for better performance and security.
A public key algorithm – Elliptic Curve Cryptography (ECC) is used to further improve the key management scheme.
Using classic PAKE protocol, DH-EKE (Diffie- Hellman encrypted key exchange).
ECC shows drastic reduction in key management when compared with RSA and other existing
Several approaches for encryption and decryption using ECC have been proposed.
We propose a novel Driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other.
Hardware Requirements
Processor : Intel Pentium IV Processor
Ram : 512MB.
Hard Disk : 40 GB.
Compact Disk : 650 MB.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Software Requirements
Operating System : Windows XP.
Techniques : JDK 1.6
Front End : Java swings
Back End : Sql