e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

ISSUES

Current Issue
Archives

CALL FOR PAPERS

CFP 2021

TOPICS

IJCSE Topics

EDITORIAL BOARD

Editors

Indexed in

oa
 

ABSTRACT

Title : A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
Authors : P. Kalyani, Dr.C.Chellappan
Keywords : Pass Pattern, magic square, PPS, Pattern square, matrix encryption.
Issue Date : January 2011.
Abstract :
Recent research work in the Wireless Sensor Networks involves the homogeneous networks in which the sensor nodes in the specific cluster can get the key value from any other cluster. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead . The security implementation analysis is separated into two levels, 1. Encryption and Authentication from Sensor modes to Cluster Head. 2. Encryption and Authentication from Cluster Heads to Base Station. This Dual level Encryption standards not only blocks the malicious data from overspreading the network traffic all along the network path but also efficiently shares the dynamic keys. In this research the second level of security has considered and the dynamic keys are generated based on pass pattern or graphical picture. Here dynamic means both 1). The display and selection of characters from a 7x7 matrix called pattern square changes in every session and 2). The strength and degree of security changes dynamically. This pattern consists of a set of symbols such as special characters, alphabets, numbers, etc. by default. The character entered by the user is subjected to the first level of encryption. The encrypted string is placed in 5x5 matrix called magic square. The second level of encryption applied to the pattern value and finally stored in the database in row major. The pass pattern is selected from the pattern square characters which are randomly displayed for each session. This random change in display of characters leads to higher level of security. Also the user is allowed to select their pattern in reverse order which ensures more degree of security against the attack by crackers. This method is strong and robust against all possible attacks and works in the existing infrastructure without compromising the user’s comfort.
Page(s) : 299-306
ISSN : 0975–3397
Source : Vol. 3, Issue.01

All Rights Reserved © 2009-2024 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License