ISSN 2278-6856
Abstract
Message authentication is the one of the most effective ways
to unauthorized and corrupted messages from being
forwarded in wireless sensor networks. For this reason so
many techniques are available for authentication message in
the networks. This paper basically three concepts i.e, secret
key generation, message authentication,message encryption
and decryption. First one is used for generating secret key for
message encryption decryption. After completion of genera ting secret key,we are using digital certification technique for
message authentication. In this user1 generating signature for
that message and sent to user2.After receiving signature from
user1, user2 will verify his/her the message is authen -ticated
or not. Before sending signature user1 encrypt message by
using binary xor operation technique and send to user2. User2
can decrypt the message after successful comple -tion of
authentication process. By providing this concept we can
provide more computational and communication of proposed
system.
1.Introduction
In peer to peer networks for the security systems the
traditional approaches uses key distribution methods such
as cryptographic systems. There is increase in usage,
bandwidth and network applications is required novel
ideas. In many different key distribution methods there is
pair of users such as session keys. The general idea is
purely secure methods which consist of distributing initial
keys to users that is the possible group of users spreads a
common key. In conferences generally the users
symmetric encryption it must share common key. In the
key distribution methods the common keys of secure
communication in conference. The data is generated and
distributed by trusted server whichare mainly active at the
distributive stage.Given the high complexity of such a
distribution mechanism, a natural step is to trade
complexity for security. We may still require that keys are
perfectly secure, but only with respect to an adversary
controlling coalitions of a limited size. This novel
approach was initiated by Blomfor the case of session keys
Page 127
ISSN 2278-6856
2.Existing System
Methods for key pre-distribution provides nodes in a huge
network to achieve on pairwise secret keys. At the time of
deployment a global authority reads and loads some secret
data Sd into each node ni,for i {1, . . . , N} and N is the
network size. By taking two nodes i and j can achieve on a
shared key ski,j of size using their secret information.In
Probabilistic methods where any two nodes are capable to
calculate a shared key with more probability and also have
been assumed but will not take concern us here. The main
aim is to offer resilience as large as possible and where a
method has resilience t if an adversary who consists t
nodes I = {i1, . . . , it} is not able to define any information
about the shared key ski,j for any i, j I. The efficient
assumptions needs calculation of the shared keys to be
quick performance and thus ruling out of public key
methods, and explanation is that the storage that is the
size of the keying information si should be minimized.One
simple approach is for all nodes to share a single key k
that is the set si = k for all I that is used also as the pair
wise key for any pair of nodes. While having minimal
storage this scheme has resilience t = 0 since it is
completely broken after only one node is compromised. A
second trivial approach is for each pair of nodes to store
an independent key. This has optimal resilience t = N, but
the storage requirement of (N 1) per node is
unacceptably high.There are two main methods in
distribution of keys to reduce the complexity of the public
key distributions in authentication servers. There are so
many researches are done for secure key generation and
distribution methods for shared keys. In another method
that is pioneering the key generation methods. Which is
calculated for very seemingly negated results. In another
methods such as innovated methods is a method which
isbased on ID that is predated the formatted definition
given by several researchers. Some other authors extended
the works on symmetric and asymmetric key distribution
methods in way of explanation. Some authors show that
information theoretic resilience to t corruptions can be
achieved with (t+1) bits of secret information stored per
node; moreover, this is optimal if information-theoretic
security is desired. Let F be a field of size 2 > N. To
achieve resilience t using the scheme the authority chooses
a random symmetric, bivariate polynomial F F[x, y] of
degree t in each variable as the master secret key; a node
with identity i F is given the unvaried polynomial si(y) =
Page 128
3.Proposed System
Message authentication plays a key role in unauthorized
and corrupted messages from being forwarded in networks
to save the precious sensor energy. For this reason, many
authentication schemes have been proposed in literature to
provide message authenticity and integrity verification for
wireless sensor networks. In this paper we proposed
message authentication and privacy message in a wireless
sensor network. By performing this operation we are
proposed three concepts.
Authentication of Message
User1 Calculate the SA =rSAA modp and send values m!A,
rA, SA to User2 then
If gmA_= yrAA SA mod p authentication fails.
Otherwise, User1randomly selects vB[1, p 2]and
calculates cB= rvB A mod p and send to Alice
Calculates KA,B= csA
B mod p,KtA,B=
D(KA,B)Randomly selects vA[1, p 2]
Calculates cA= rvA
A mod p and Ack= h(KtA,B, cB_cA) and sends ack value
and CA to User2
Calculates the value KB,A= SvB A mod p KtB,A=
D(KB,A)
If Ack= h(KtB,A, cB_cA)
thenUser1is authenticated and cvA B = cvB
A mod p
is the established key.
otherwise, the authentication fails
Now both User1and User2 are in Authentication with
Each Other.
secret key generation
User1
Calculates SA = gsA
A mod n mA, SSK(hHK(m_,
s_)), SA, hHK(m_, s_)
And sends it to User2
Verifies signature S(hHK(m_, s_)) of hHK(m_s_), and
hHK(mA, SA) = hHK(m_, s_))
The program ends if the authentication fails.Otherwise, it
randomly selects vB[n 1], andcalculatescB= gvBmodn
and sends the CB to the Alice
Calculates KA,B= csA B mod n,K_ A,B = D(KA,B)
Then it randomly selects an integer vA[1, n
1]calculates cA= gvAmodn, and Ack= h(KtA,B, cB_cA)
and sends Ack and CA to User2
Computes KB,A= SvB A mod p KtB,A= D(KB,A)
If Ack= h(KtB,A, cB_cA),
thenAis authenticatedand cvA B = cvB
A mod n is the established key.Otherwise, the
authentication fails.
ISSN 2278-6856
PT=plain Text
1.Enter Some Character in the plain text in between as a
random
character
and
add
them
for
every three character as a duplicate character.
2. Change the Plain text which is added with random
character into ASCII codes.
3. Now convert into Binary format from ASCII codes.
4. Complement of the plain text.
5. Apply Exclusive OR (XOR) for both characters of plain
text and selected series
6. Convert the result after Xor into decimal values. Now
you will get the cipher text.
Decryption
1. Convert the cipher text into Binary format.
2. Apply Exclusive OR (XOR) operation between cipher
text and key.
3. Select the series and convert it into the binary format
(the series must be same in both encryption side and
decryption side).
4. Get complement of the result of step3.
5. Convert the result from binary to decimal format.
6. Now you can get the plaintext
4.Conclusion
The data transferring plays an important part in our day to
day life but the transfer may not be secure so to prevent
this we follow the technique of authentication and for the
communication key generation algorithm is used.In this
we are using another technique for generation of secret
key for the encryption and decryption of transmitted data.
For the generation key we are using binary xor operation
technique equation. By providing those technique we are
provide more security and efficiency for transferring data.
References
[1] R. Bird, I. Gopal, A. Herzberg, P. Jansen, S. Kutten,
R. Molva and M. Yung SystematicDesign of TwoParty Authentication, Advances in Cryptology:
Proceedingsof Crypto 91, Lecture Notes in Computer
Science, vol. 576, Springer-Verlag, Berlin,1991.
[2] R. Blom, An Optimal Class of Symmetric Key
Genemtion Systems, Advances inCryptology:
Proceedings of Eurocrypt 84, Lecture Notes in
Computer Science, vol.209, Springer-Verlag, Berlin,
1984, pp. 335-338.
[3] E. Brickell, P.J. Lee and Y. Yacobi, Secure Audio
Conferencing, Advances in Cryptology: Proceedings
of Crypto 87, Lecture Notes in Computer Science, vol.
239,Springer-Verlag, Berlin, 1987, pp. 418-426.
[4] I. Csiszk and J. Kcmer, Information Theory. Coding
theorems for discrete memory less systems, Academic
Press, 1981.
[5] W. Diffie and M.E. Hellman, New Direction in
Cryptography, IEEE Transactionon Information
Theory, vol. 22, no. 6, December 1976, pp. 644-654.
[6] M.J. Fischer, M.S. Paterson and C. Rackoff, Secure
Bit Transmission Using aRandom Deal of Cards, in
Distributed Computing and Cryptography, AMS,
1991,
Encryption
Page 129
ISSN 2278-6856
Page 130