You are on page 1of 28

ADITHYA INSTITUE OF TECHNOLOGY VEBEK: Virtual Energy Value-Based Encryption and Keying for Wireless Sensor Networks

BATCH NO: 16

GUIDED BY Ms.G.SANTHIYA M.E ASST. PROFESSOR Dept. of ECE

BATCH MEMBERS M.DHANABAL T.NIRANJAN GOPAL R.PRATHAP A.SHANMUGAVEL

REVIEW - 1 DATE - 04-02-2012

CONTENTS
ABSTRACT INTRODUCTION RC4 ALGORITHM BASIC PROGRAM MODEL DIAGRAM RESULT AND DISCUSSION CONCLUSION REFERENCE WEBSITE, BOOKS

VIRTUAL ENERGY VALUE


Each sensor node has given certain virtual energy value when it is first deployed in the network. Virtual energy is a value given to the device when it is manufactured. It may be varied at the time of deployment. It varies for each and every device.

ABSTRACT
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of transmissions needed for rekeying. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream.

INTRODUCTION
Wireless Sensor Technology has become the technology that can be applied in more and more fields of applications. Apart from the typical Areas like Environmental, Military and Commercial Enterprise. Where we can see them in surveillance, Oceanographic data collection, pollution monitoring, navigation assistance etc.

ALGORITHM
RC4 uses a variable length key from 1 to 256 bytes to initialize a 256-byte state table. The state table is used for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is XORed with the plaintext to give the cipher text. Each element in the state table is swapped at least once.

OUTLINE


Description

Algorithm Example key setup Ciphering

ALGORITHM
Two phase key setup 1.f=(f+Si+Kg)mod4 2.swapping Si and Sf ciphering(XOR) 1.i=(i+1)mod4,and f=(f+Si)mod4 2. swapping Si and Sf 3.t=(Si+Sf)mod4 Random byte St

EXAMPLE (KEY SETUP)


We use 4 byte state and 2 bit key. Iteration 1: i=0,f=0,g=0 s=[S0, S1, S2, S3]=[0, 1, 2, 3] k=[K0, K1] =[2, 5] Because f=(f+S0+K0)mod4=2,then swap S0 and S2 New array becomes s[]=[S0, S1, S2, S3]=[2, 1 ,0 ,3] i=i+1=1 g=(g+1)mod2=1

Iteration 2: i=1, f=2, g=1 S[ ]=[ S0, S1, S2, S3 ] = [ 2, 1, 0, 3 ] K[ ]=[ K0, K1 ] = [ 2, 5 ] Because f=(f + S1 + K1)mod 4=0, then swap S1 with S0 New array S[ ]=[ S0, S1, S2, S3 ]=[ 1, 2, 0, 3 ] i=i +1=2 g=(g+1)mod 2= 0

Example [Ciphering]
For this example we use plaintext HI H : i=0, f=0 S[ ]=[ S0, S1, S2, S3 ] = [ 1, 2, 3, 0 ] Because i = ( i + 1 )mod 4 = 1 f =( f + S1)mod 4 = 2, then swap S1 with S2 New array S[ ]=[ S0, S1, S2, S3 ] = [ 1, 3, 2, 0]

t = ( S1 + S2 )mod 4 = 1 S1 = 3 ( 0000 0011 ) H 0100 1000 XOR 0000 0011 0100 1011

I :

i=1, f=2 S[ ]=[ S0, S1, S2, S3 ] = [ 1, 3, 2, 0 ] Because i = ( i + 1 )mod 4 = 2 f =( f + S2)mod 4 = 0, then swap S2 with S0 New array S[ ]=[ S0, S1, S2, S3 ] = [ 2, 3, 1, 0 ]

t = ( S2 + S0 )mod 4 = 3 S3 = 0 ( 0000 0000 ) I 0100 1001 XOR 0000 0000 0100 1001 Result Plaintext : 0100 1000 0100 1001 Cipher : 0100 1011 0100 1001

BASIC PROGRAM
using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace ConsoleApplication1 {

class Program { static void Main(string[] args) { int a, b,x; string s;

Console.Write("enter a value"); a = Convert.ToInt16(Console.ReadLine()); Console.Write("enter b value"); b = Convert.ToInt16(Console.ReadLine()); do { Console.Write("enter your choice"); x = Convert.ToInt16(Console.ReadLine()); switch (x) {

case 1: Console.WriteLine(a + b); break; case 2: Console.WriteLine(a - b); break; case 3: Console.WriteLine(a * b); break;

case 4: Console.WriteLine(a / b); break; default: Console.WriteLine("pls enter correct choice"); break; } Console.WriteLine("Do you want to continue"); s = Console.ReadLine(); } while (s == "y");

OVERVIEW OF ALGORITHM
STEP 1:-The encrypting variable is produced from the key setup, it enters the ciphering phase. STEP 2:-where it is XORed with the plain text message to create an encrypted message. STEP 3:-XOR is the logical operation of comparing two binary bits. If the bits are different, the result is 1.If the bits are the same, the result is 0. STEP 4:-Once the receiver gets the encrypted message, it decrypts the message by XORing the encrypted message with the same encrypting variable.

MODEL DIAGRAM

MODEL DIAGRAM EXPLANATION


The original data is sent from the source to the RC4 module In RC4 module the data is spitted and sent to the VEBEK module In VEBEK module data is encrypted and key is assigned and forwarded to the destination

BENEFITS OF VEBEK
It is less Chatty so it saves energy and is harder to detect by attackers. It uses Dynamic Way To generate key thus making it more efficient against various attacks (eg. Replay attacks, brute force attacks and masquerade attacks) It Provides A flexible Architecture to vary the level of security from high to low as per the requirement of the task. The energy and the cost saving by the VEBEK also Decrease by around 60 to 90 percent improvement.

REFERENCES
[1] C. Vu, R. Beyah, and Y. Li, A Composite Event Detection inWireless Sensor Networks, Proc. IEEE Intl Performance, Computing,and Comm. Conf. (IPCCC 07), Apr. 2007. [2] M. Eltoweissy, M. Moharrum, and R. Mukkamala, Dynamic Key Management in Sensor Networks, IEEE Comm. Magazine, vol. 44,no. 4, pp. 122-130, Apr. 2006. [3] J. Hyun and S. Kim, Low Energy Consumption Security Method for Protecting Information of Wireless Sensor Networks, Advanced Web and Network Technologies, and Applications, vol. 3842, pp. 397-404, Springer, 2006.

SCREEN SHOTS

TRANSMITTING

CONCLUSION
Communication is the Process that requires high level of security, integrity and authenticity of data and especially when this is talking place in WSN in really becomes expensive and difficult to implement. To keep these things in check we presented a secure communication framework called VEBEK for Wireless Sensor Networks.

THANK YOU

You might also like