SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International
Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2506-2509
2506 | P a g e
Implementing Agricultural Applications Using Wireless Sensor
Network and Securing Them Using Advanced Encryption
Standard
Durvesh Pilankar1
, Tanmay Sawant2
, Radhika Sule3
, Shweta
Mahadeshwar4
1, 4
(Department of Electronics and Telecommunication, Vidyavardhini College of Technology, Maharashtra,
India,
2, 3
(Department of Electronics and Telecommunication, St. Francis Institute of Technology, Maharashtra, India,
ABSTRACT
A wireless sensor network (WSN) is a
large number of sensor nodes distributed
throughout large geographical area of interest.
These sensors monitor various conditions by
measuring different parameters like temperature,
pressure, sound, light intensity, heat, movement,
etc. The sensed data is routed to the sink node via
intermediate sensor nodes. Thus we get accurate
information about the parameters present in that
area. Application design can be simplified by
providing a set of programming primitives for
sensor networks that abstract the details of low-
level communication, data sharing, and collective
operations. The focus on sensor networks for
agriculture has a main topic of low power
consumption and efficient implementation of
hardware and software for various applications.
The security threats involved in wireless
technology cannot be ignored. Although difficult
to achieve it is inevitable to secure the wireless
communication network. For effective utilization
of the WSN commercially, a security system for
the wireless network is a must. Security aspect of
network is achieved using Advanced Encryption
Standard(AES) for data and Personal Area
Network(PAN) ID for node security. Our goal is to
confront an emerging technology with a concrete
problem of world-wide dimensions, the
sustainability of farming for small land-holders.
I. INTRODUCTION
A wireless sensor network (WSN) consists
of spatially distributed autonomous sensors to
monitor physical or environmental conditions, such
as temperature, sound, vibration, pressure, motion or
pollutants and to cooperatively pass their data
through the network to a main location. The nodes
sense environmental changes and report them to other
nodes over flexible network architecture. Sensor
nodes are great for deployment in hostile
environments or over large geographical areas.
Sensors usually communicate with each other using a
multi hop approach. The flowing of data ends at
special nodes called base stations (sometimes they
are also referred to as sinks).A base station links the
sensor network to another network (like a gateway)
to disseminate the data sensed for further processing.
Base stations have enhanced capabilities over simple
sensor nodes since they must do complex data
processing; this justifies the fact that bases stations
have workstation/laptop class processors, and of
course enough memory, energy, storage and
computational power to perform their tasks well.
Usually, the communication between base stations is
initiated over high bandwidth links.
Fig-1: Typical Wireless Sensor Network [9]
The idea of automating the collection of
physical data in order to monitor environments is not
new.
But recent technological advances have allowed for
the networking of a wide variety of sensors,
independently from any preexisting infrastructure.
Whenever physical conditions change rapidly over
space and time, WSNs allow for real-time data
processing at a minimal cost. Their capacity to
organize spontaneously in a network makes them
easy to deploy, expand and maintain, and provides
resilience to the failure of individual measurement
points.
II. ZIGBEE
Zigbee basically is built from low-power
digital radios used to create personal Area Networks.
Its based on IEEE 802.15 standard. Zigbee consumes
low power for operation which ensures longer battery
life for the equipments. Thus, equipments requiring
long battery period can be installed with ease. Other
notable advantages are low cost and ease of
implementation in any area. Zigbee can also be
Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International
Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.
2507 | P a g e
implemented in cases where high data transfer rate is
not a necessity. All these factors make Zigbee highly
suitable and convenient for usage in the applications
related to agriculture.
III. SENSORS
It is a transducer which is used to measure
agricultural parameters. In this paper the agricultural
parameters discussed are „Temperature and Water
Level Indication‟ which are measured by using
Thermistor and Linear Variable Potentiometer
respectively. [1]
IV. SENSOR NODE
The sensors which we discussed above are
mounted on the node which contains microcontroller
as well as transreceiver module. The microcontroller
used here is AtMega328[2].It acts as a buffer and
also keeps a check on the frequency in which data is
passed to the transceiver module.
Now the sensor nodes within the network are making
discrete, local measurement of the area wherein they
are set up, communicating wirelessly and the
collected data is routed back to the user via sink(base
station).[3]
The transreceiver module i.e. ZigBee (XBEE 24 S2)
[4] will do the communication between the nodes in
the wireless sensor network. For interfacing between
the microcontroller and Xbee module here „Xbee
SHEILD‟ is used. Xbee module can be programmed
as per the requirement using the „X-CTU‟ software.
Programming parameters which are of prime
importance are Baud Rate, I/O Sampling and
Addressing.
V. OPERATION
Fig-2: Flow chart of „Node Development‟
A Zigbee network can be used in 3
topologies-star, tree and mesh. Depending upon the
need of the experiment these topologies can be used.
So here we have used the star topology wherein there
is one central node and 2 minor nodes which are
connected to central node and info travels via the
central node.
Fig-3: Star Network[10]
Basically, the Sensors mounted on sensor
node will pursue the condition and give appropriate
output to the respective microcontroller. The AtMega
will gauge the conditions and it will send the
essential data to the transreceiver module .While
doing so AtMega also simultaneously acts an analog
to digital convertor (ADC).Using interfacing devices
data is passed to the Transceiver module. Xbee
module will be used for the communication purpose.
As only two nodes are used in our project, we have
considered only 2 Xbee modules for on field work i.e
for water sensing and for checking temperature of the
soil so as to provide water for irrigation. At the base
station or the sink another Xbee module is used for
data reception from on field nodes. Each Xbee
module has unique PAN ID. This helps in
determining a unique identity to a particular node.
The one connected to the server computer is the
Coordinator while the others are Subordinators. Now
at the subordinator i.e at the node on field, data will
be sensed and further the processed data is
transmitted by the transreceiver. In our case the data
is directly transmitted to the base station as we have
considered only two on field nodes but an actual
WSN network consists of hundreds of nodes spread
across a vast area. Most of the energy of the battery is
consumed while transmitting the data and not while
sensing or processing the data. So when data is
transmitted from a node which is far away from a
base station, a lot of energy of the battery is utilized
and if done on a constant basis it will drain off the
energy from the battery thus making the node
completely useless for further operations. Once the
battery dies, node wont sense or transmit the
Development Sensor Board
Programming of AtMega
using Freeduno Board
Interfacing of sensors with
AtMega
Xbee configuration setup
(Differentiating between
Coordinator and router)
Implementation of Sensor
Node by Xbee interfacing
Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International
Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.
2508 | P a g e
processed data hence special care must be taken for
this problem as energy saving is one of the most
important parameter of the WSN.Various protocols
have been mentioned over the years to save energy in
WSN eg. MECN,LEACH,SPIN etc.By using any of
these protocols energy of node can be saved thus
improving the performance in any application
Coordinator at the base station continuously accepts
inputs from the subordinators and it updates its
database accordingly. Thus the parameters are sensed
and required action will be taken.
VI. ATTACKS ON WSN
There are many small sensor nodes in a
sensor network and these are prone to various attacks.
But it is difficult to monitor each type of incoming
attacks. Physical, link, network, transportation and
application layers are basically the different types of
layers which gets affected during attacks [5].DOS
attacks (Denial Of Service Attacks)[6] are the ones
which affect the above mentioned layers.
In addition to DOS Attacks, there are several other
attacks on WSN such as Signal/radio jamming,
Device tampering Attack, Node Capturing attack,
Path Based DOS, Node Outage, Eavesdropping
which affects a lot of factors[7]
VII. SECURITY
Security in terms of protecting the
information transmitted on wireless networks is of
prime concern. The signal can be made difficult to be
intercepted or can be encrypted. This can be done by
employing easy steps such as reducing the signal
power to least possible level so that it is protected but
at the same time is able to cover the desired area,
turning off the service set identifier (SSID)
broadcasting by wireless access point, using
directional antennas which will ensure the signal is
transmitted only in the desired area.
Another technique is Encryption which is by
far the best method to secure the Wireless Sensor
Networks. Encrypting the signal increases the signal
security by a large amount.
Here the security provision is made
available by allotting unique PAN ID.PAN ID stands
for personal area network identifier, basically it is a
unique name given to each node. For example,
Subordinator1 has PAN ID of 2419 while
subordinator2 has PAN ID of 2420. PAN ID can
consist of numbers, symbols, characters etc. So
cracking it by obsolete method is obstinate. Another
way of providing security is memory addressing.
Thus a twofold security is provided to the system.
This gives node security or authentication to the
node. The data transmitted in the network is not
secure so there is a need of proper encryption
technique for data security. So for that Advanced
Encryption Standard (AES) is used for encryption.
The AES used in our case increases the
confidentiality of the message signal and hence
protects the information sent over the wireless
network
Fig-4: Flow chart of „Security Management‟
7.1 Advanced Encryption Standard
AES is a symmetric-key algorithm, meaning
the same key is used for both encrypting and
decrypting the data. AES is based on a design
principle known as a substitution-permutation
network. AES has a fixed block size of 128 bits and
a key size of 128, 192, or 256 bits. AES operates on a
4×4 column-major order matrix of bytes. The AES
cipher is specified as a number of repetitions of
transformation rounds that convert the input plaintext
into the final output of cipher text. Each round
consists of several processing steps, including one
that depends on the encryption key. A set of reverse
rounds are applied to transform cipher text back into
the original plaintext using the same encryption key.
Here while setting the configuration of Xbee we can
enable the AES i.e. data encryption by using a secret
key which is used at receiving end for decryption.
Hence data security is carried out.
VIII. EXPERIMENTAL RESULTS
8.1 LEVEL INDICATOR
Graph-1: Graphical Analysis of Water Level
Indicator
Development Of
Program
Maintain security using
AES with a private key
Communication between
nodes in secured way
Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International
Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.
2509 | P a g e
The graph shown above indicates the level of water
in a reservoir. When the reading is maximum value it
indicates that the water in the reservoir is at its peak
and required action should be taken (for e.g. the
pumping can be continued).Now if the reading drops
to a low value then pumping should be stopped so as
to save water.
8.2 THERMISTOR
Graph-2: Graphical Analysis of „Thermistor‟
The graph explained above is that of cooling
thermistor .Here two sensors are used .One of which
is buried in the soil and the other one is exposed to
sunlight .The graph shows that when the outer
temperature is high compared to soil temperature
max reading is displayed and it shows the need of
irrigation.
IX. CONCLUSION
Wireless sensor networks have many
applications in our day to day life and it can be used
to play an important role for a number of agricultural
purposes such as soil moisture, water level and flow
detection for irrigational purposes. The results
obtained in the project are in accordance with the
facts .The prototype of two sensor nodes used in our
project can be modified and applied on a large scale
in farms .The temperature variations, flow control
and a variety of other parameters can be explored.
Security achieved by using AES encryption and PAN
ID paved way for the data transmitted to remain
secure. Power consumption and cost efficiency is
another aspect that is taken under consideration as the
nodes even operate in a power saver mode .Thus the
project helps a modern day farmer to combine
technology and agricultural expertise to yield large
profits and better product quality.
REFERENCES
[1]. Chee-Yee Chong, Srikanta P. Kumar, “
Sensor Networks: Evolution, Opportunities,
and Challenges”, pp.1247-1254,
Proceedings of the IEEE, Vol. 91, No. 8,
August 2003.
[2]. http://www.atmel.in/devices/ATMEGA328.
aspx?
[3]. Yazeed Al-Obaisat, Robin Braun,”On
Wireless Sensor Networks: Architectures,
Protocols, Applications, and Management”,
University of Technology, Sydney,
Australia.
[4]. Shahin Farahani ,”ZigBee Wireless
Networks and Transceivers”, Newnes
publications www.books.elsevier.com
[5]. Xiaojiang Du, Hsiao-Hwa Chen, „Security
in Wireless Sensor Networks, Proceedings
Of IEEE, Vol.15, No. 4, Aug. 2008
[6]. A. D. Wood , J. A. Stankovic, “Denial of
Service in Sensor Networks”, Computer,
vol. 35, no. 10, Oct.2002, pp. 54–62
[7]. Rina Bhattacharya,”A Comparative Study
Of Physical Attacks On Wireless Sensor
Networks”, International Journal Of
Research in Engineering And Technology,
Vol.2,No.1,Jan 2013
[8]. Xing Zhang, Jingsha He and Qian,”Security
Considerations on Node Mobility in
Wireless Sensor Networks”, 2009 Fourth
International Conference on Computer
Sciences and Convergence Information
Technology, pp. 1143-1146.
[9]. http://en.wikipedia.org/wiki/Wireless_sensor
_network
[10] Steven Kosmerchock,” Wireless Sensor
Network Topologies”

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networksAlexander Decker
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)M.k. Praveen
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGodspowerAgbulu
 
WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSDeepak Kumar Mohapatra
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbeeeSAT Journals
 

Was ist angesagt? (20)

FINAL
FINALFINAL
FINAL
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networks
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Intro to wsn
Intro to wsnIntro to wsn
Intro to wsn
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
E010424043
E010424043E010424043
E010424043
 
WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORS
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 

Andere mochten auch (20)

Os3425622565
Os3425622565Os3425622565
Os3425622565
 
I353951
I353951I353951
I353951
 
Ow3426032607
Ow3426032607Ow3426032607
Ow3426032607
 
Cu35540546
Cu35540546Cu35540546
Cu35540546
 
El33827831
El33827831El33827831
El33827831
 
Dm32711716
Dm32711716Dm32711716
Dm32711716
 
Eg33794797
Eg33794797Eg33794797
Eg33794797
 
En33838844
En33838844En33838844
En33838844
 
Gg3112001206
Gg3112001206Gg3112001206
Gg3112001206
 
Gk3112241234
Gk3112241234Gk3112241234
Gk3112241234
 
Alguien piensa en ti
Alguien piensa en tiAlguien piensa en ti
Alguien piensa en ti
 
Borangic c. armuri de zale, meșteri și ateliere în dacia preromană, amp, xx...
Borangic c.   armuri de zale, meșteri și ateliere în dacia preromană, amp, xx...Borangic c.   armuri de zale, meșteri și ateliere în dacia preromană, amp, xx...
Borangic c. armuri de zale, meșteri și ateliere în dacia preromană, amp, xx...
 
Recursos audiovisuales
Recursos audiovisualesRecursos audiovisuales
Recursos audiovisuales
 
Accesschk
AccesschkAccesschk
Accesschk
 
Me ama
Me amaMe ama
Me ama
 
REPOSITORIOS
REPOSITORIOSREPOSITORIOS
REPOSITORIOS
 
Evaluacion de la atmosfera 6 b
Evaluacion de la atmosfera 6 bEvaluacion de la atmosfera 6 b
Evaluacion de la atmosfera 6 b
 
Copy right
Copy rightCopy right
Copy right
 
Cilicio
CilicioCilicio
Cilicio
 
Quero te amar
Quero te amarQuero te amar
Quero te amar
 

Ähnlich wie Agricultural Sensor Data Secured by AES

Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Amy Alexander
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environmentijsrd.com
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 

Ähnlich wie Agricultural Sensor Data Secured by AES (20)

Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
S04404116120
S04404116120S04404116120
S04404116120
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Agricultural Sensor Data Secured by AES

  • 1. Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2506-2509 2506 | P a g e Implementing Agricultural Applications Using Wireless Sensor Network and Securing Them Using Advanced Encryption Standard Durvesh Pilankar1 , Tanmay Sawant2 , Radhika Sule3 , Shweta Mahadeshwar4 1, 4 (Department of Electronics and Telecommunication, Vidyavardhini College of Technology, Maharashtra, India, 2, 3 (Department of Electronics and Telecommunication, St. Francis Institute of Technology, Maharashtra, India, ABSTRACT A wireless sensor network (WSN) is a large number of sensor nodes distributed throughout large geographical area of interest. These sensors monitor various conditions by measuring different parameters like temperature, pressure, sound, light intensity, heat, movement, etc. The sensed data is routed to the sink node via intermediate sensor nodes. Thus we get accurate information about the parameters present in that area. Application design can be simplified by providing a set of programming primitives for sensor networks that abstract the details of low- level communication, data sharing, and collective operations. The focus on sensor networks for agriculture has a main topic of low power consumption and efficient implementation of hardware and software for various applications. The security threats involved in wireless technology cannot be ignored. Although difficult to achieve it is inevitable to secure the wireless communication network. For effective utilization of the WSN commercially, a security system for the wireless network is a must. Security aspect of network is achieved using Advanced Encryption Standard(AES) for data and Personal Area Network(PAN) ID for node security. Our goal is to confront an emerging technology with a concrete problem of world-wide dimensions, the sustainability of farming for small land-holders. I. INTRODUCTION A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The nodes sense environmental changes and report them to other nodes over flexible network architecture. Sensor nodes are great for deployment in hostile environments or over large geographical areas. Sensors usually communicate with each other using a multi hop approach. The flowing of data ends at special nodes called base stations (sometimes they are also referred to as sinks).A base station links the sensor network to another network (like a gateway) to disseminate the data sensed for further processing. Base stations have enhanced capabilities over simple sensor nodes since they must do complex data processing; this justifies the fact that bases stations have workstation/laptop class processors, and of course enough memory, energy, storage and computational power to perform their tasks well. Usually, the communication between base stations is initiated over high bandwidth links. Fig-1: Typical Wireless Sensor Network [9] The idea of automating the collection of physical data in order to monitor environments is not new. But recent technological advances have allowed for the networking of a wide variety of sensors, independently from any preexisting infrastructure. Whenever physical conditions change rapidly over space and time, WSNs allow for real-time data processing at a minimal cost. Their capacity to organize spontaneously in a network makes them easy to deploy, expand and maintain, and provides resilience to the failure of individual measurement points. II. ZIGBEE Zigbee basically is built from low-power digital radios used to create personal Area Networks. Its based on IEEE 802.15 standard. Zigbee consumes low power for operation which ensures longer battery life for the equipments. Thus, equipments requiring long battery period can be installed with ease. Other notable advantages are low cost and ease of implementation in any area. Zigbee can also be
  • 2. Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 2507 | P a g e implemented in cases where high data transfer rate is not a necessity. All these factors make Zigbee highly suitable and convenient for usage in the applications related to agriculture. III. SENSORS It is a transducer which is used to measure agricultural parameters. In this paper the agricultural parameters discussed are „Temperature and Water Level Indication‟ which are measured by using Thermistor and Linear Variable Potentiometer respectively. [1] IV. SENSOR NODE The sensors which we discussed above are mounted on the node which contains microcontroller as well as transreceiver module. The microcontroller used here is AtMega328[2].It acts as a buffer and also keeps a check on the frequency in which data is passed to the transceiver module. Now the sensor nodes within the network are making discrete, local measurement of the area wherein they are set up, communicating wirelessly and the collected data is routed back to the user via sink(base station).[3] The transreceiver module i.e. ZigBee (XBEE 24 S2) [4] will do the communication between the nodes in the wireless sensor network. For interfacing between the microcontroller and Xbee module here „Xbee SHEILD‟ is used. Xbee module can be programmed as per the requirement using the „X-CTU‟ software. Programming parameters which are of prime importance are Baud Rate, I/O Sampling and Addressing. V. OPERATION Fig-2: Flow chart of „Node Development‟ A Zigbee network can be used in 3 topologies-star, tree and mesh. Depending upon the need of the experiment these topologies can be used. So here we have used the star topology wherein there is one central node and 2 minor nodes which are connected to central node and info travels via the central node. Fig-3: Star Network[10] Basically, the Sensors mounted on sensor node will pursue the condition and give appropriate output to the respective microcontroller. The AtMega will gauge the conditions and it will send the essential data to the transreceiver module .While doing so AtMega also simultaneously acts an analog to digital convertor (ADC).Using interfacing devices data is passed to the Transceiver module. Xbee module will be used for the communication purpose. As only two nodes are used in our project, we have considered only 2 Xbee modules for on field work i.e for water sensing and for checking temperature of the soil so as to provide water for irrigation. At the base station or the sink another Xbee module is used for data reception from on field nodes. Each Xbee module has unique PAN ID. This helps in determining a unique identity to a particular node. The one connected to the server computer is the Coordinator while the others are Subordinators. Now at the subordinator i.e at the node on field, data will be sensed and further the processed data is transmitted by the transreceiver. In our case the data is directly transmitted to the base station as we have considered only two on field nodes but an actual WSN network consists of hundreds of nodes spread across a vast area. Most of the energy of the battery is consumed while transmitting the data and not while sensing or processing the data. So when data is transmitted from a node which is far away from a base station, a lot of energy of the battery is utilized and if done on a constant basis it will drain off the energy from the battery thus making the node completely useless for further operations. Once the battery dies, node wont sense or transmit the Development Sensor Board Programming of AtMega using Freeduno Board Interfacing of sensors with AtMega Xbee configuration setup (Differentiating between Coordinator and router) Implementation of Sensor Node by Xbee interfacing
  • 3. Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 2508 | P a g e processed data hence special care must be taken for this problem as energy saving is one of the most important parameter of the WSN.Various protocols have been mentioned over the years to save energy in WSN eg. MECN,LEACH,SPIN etc.By using any of these protocols energy of node can be saved thus improving the performance in any application Coordinator at the base station continuously accepts inputs from the subordinators and it updates its database accordingly. Thus the parameters are sensed and required action will be taken. VI. ATTACKS ON WSN There are many small sensor nodes in a sensor network and these are prone to various attacks. But it is difficult to monitor each type of incoming attacks. Physical, link, network, transportation and application layers are basically the different types of layers which gets affected during attacks [5].DOS attacks (Denial Of Service Attacks)[6] are the ones which affect the above mentioned layers. In addition to DOS Attacks, there are several other attacks on WSN such as Signal/radio jamming, Device tampering Attack, Node Capturing attack, Path Based DOS, Node Outage, Eavesdropping which affects a lot of factors[7] VII. SECURITY Security in terms of protecting the information transmitted on wireless networks is of prime concern. The signal can be made difficult to be intercepted or can be encrypted. This can be done by employing easy steps such as reducing the signal power to least possible level so that it is protected but at the same time is able to cover the desired area, turning off the service set identifier (SSID) broadcasting by wireless access point, using directional antennas which will ensure the signal is transmitted only in the desired area. Another technique is Encryption which is by far the best method to secure the Wireless Sensor Networks. Encrypting the signal increases the signal security by a large amount. Here the security provision is made available by allotting unique PAN ID.PAN ID stands for personal area network identifier, basically it is a unique name given to each node. For example, Subordinator1 has PAN ID of 2419 while subordinator2 has PAN ID of 2420. PAN ID can consist of numbers, symbols, characters etc. So cracking it by obsolete method is obstinate. Another way of providing security is memory addressing. Thus a twofold security is provided to the system. This gives node security or authentication to the node. The data transmitted in the network is not secure so there is a need of proper encryption technique for data security. So for that Advanced Encryption Standard (AES) is used for encryption. The AES used in our case increases the confidentiality of the message signal and hence protects the information sent over the wireless network Fig-4: Flow chart of „Security Management‟ 7.1 Advanced Encryption Standard AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is based on a design principle known as a substitution-permutation network. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits. AES operates on a 4×4 column-major order matrix of bytes. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of cipher text. Each round consists of several processing steps, including one that depends on the encryption key. A set of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key. Here while setting the configuration of Xbee we can enable the AES i.e. data encryption by using a secret key which is used at receiving end for decryption. Hence data security is carried out. VIII. EXPERIMENTAL RESULTS 8.1 LEVEL INDICATOR Graph-1: Graphical Analysis of Water Level Indicator Development Of Program Maintain security using AES with a private key Communication between nodes in secured way
  • 4. Durvesh Pilankar, Tanmay Sawant, Radhika Sule, Shweta Mahadeshwar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 2509 | P a g e The graph shown above indicates the level of water in a reservoir. When the reading is maximum value it indicates that the water in the reservoir is at its peak and required action should be taken (for e.g. the pumping can be continued).Now if the reading drops to a low value then pumping should be stopped so as to save water. 8.2 THERMISTOR Graph-2: Graphical Analysis of „Thermistor‟ The graph explained above is that of cooling thermistor .Here two sensors are used .One of which is buried in the soil and the other one is exposed to sunlight .The graph shows that when the outer temperature is high compared to soil temperature max reading is displayed and it shows the need of irrigation. IX. CONCLUSION Wireless sensor networks have many applications in our day to day life and it can be used to play an important role for a number of agricultural purposes such as soil moisture, water level and flow detection for irrigational purposes. The results obtained in the project are in accordance with the facts .The prototype of two sensor nodes used in our project can be modified and applied on a large scale in farms .The temperature variations, flow control and a variety of other parameters can be explored. Security achieved by using AES encryption and PAN ID paved way for the data transmitted to remain secure. Power consumption and cost efficiency is another aspect that is taken under consideration as the nodes even operate in a power saver mode .Thus the project helps a modern day farmer to combine technology and agricultural expertise to yield large profits and better product quality. REFERENCES [1]. Chee-Yee Chong, Srikanta P. Kumar, “ Sensor Networks: Evolution, Opportunities, and Challenges”, pp.1247-1254, Proceedings of the IEEE, Vol. 91, No. 8, August 2003. [2]. http://www.atmel.in/devices/ATMEGA328. aspx? [3]. Yazeed Al-Obaisat, Robin Braun,”On Wireless Sensor Networks: Architectures, Protocols, Applications, and Management”, University of Technology, Sydney, Australia. [4]. Shahin Farahani ,”ZigBee Wireless Networks and Transceivers”, Newnes publications www.books.elsevier.com [5]. Xiaojiang Du, Hsiao-Hwa Chen, „Security in Wireless Sensor Networks, Proceedings Of IEEE, Vol.15, No. 4, Aug. 2008 [6]. A. D. Wood , J. A. Stankovic, “Denial of Service in Sensor Networks”, Computer, vol. 35, no. 10, Oct.2002, pp. 54–62 [7]. Rina Bhattacharya,”A Comparative Study Of Physical Attacks On Wireless Sensor Networks”, International Journal Of Research in Engineering And Technology, Vol.2,No.1,Jan 2013 [8]. Xing Zhang, Jingsha He and Qian,”Security Considerations on Node Mobility in Wireless Sensor Networks”, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 1143-1146. [9]. http://en.wikipedia.org/wiki/Wireless_sensor _network [10] Steven Kosmerchock,” Wireless Sensor Network Topologies”