SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies.

International Transaction Journal of Engineering,
Management, & Applied Sciences & Technologies
http://TuEngr.com

A Security Approach for Wireless Sensor Network in
Agriculture Industry
Piya Techateerawat

a*

a

Department of Electrical and Computer Engineering, Faculty of Engineering, Thammasat University
Khlong-Luang, Pathumthani, THAILAND
ARTICLEINFO

ABSTRACT

Article history:
Received 24 April 2013
Received in revised form
20 August 2013
Accepted 26 August 2013
Available online
26 August 2013

An overview of agriculture industry is involved with large area,
farmers and agriculture products. A large scale of area requires time
consuming for collecting data to make decision on agriculture (e.g.
watering, pruning and harvesting.). From these requirements,
wireless sensor network can be a supported technology because it can
deploy distributed and construct network sharing among their group.
In general, security solution needs an experienced and skilled
specialist to set up, maintain and troubleshoot. This is a challenge for
wireless sensor network to implement in agriculture industry.

Keywords:
Security Framework;
Key Distribution;
Intrusion Detection
System

Our security approach is presented related factors and
customized configuration for the process of deployment,
maintenance, information feedback. This paper presents the security
mechanism to support the needs of self-setup and minimum
operation for wireless sensor network in agriculture industry. The
security module has automated initiate key by HKD protocol and has
Adaptive IDS to alert when threat is detected via speaker. This
system is also simplified the configuration, deployment and
maintenance by only powering on and system will then initiate the
key among the agents. As a result, this security module is proposed
to balance between the moderate security with the limited resource
and technician.
2013 INT TRANS J ENG MANAG SCI TECH.

*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

269
Nomenclature and Symbols
We use the following notation to describe a protocol and operation in this paper:
M1 | M2

the concatenation of message M1 and M2

H[D]

the hash function which digests data D

F1[D]

the first one-way function which covert data D

F2[D]

the second one-way function which covert data D

KC

the common key to use when secret key is not set up

KM

the master key to generate keys for the 1 time.

K0

the storing key to save previous key session

K[M]

encryption of message M with key K

S1

the signature of key from F1

S2

the signature of key from F2

L, N

the random numbers in the key generating

st

1. Introduction
A wireless sensor network is developed for self-established network infrastructure with
data sensor technology. In addition, it can reduce the complexity of device deployment on
small and large area. The sensor data can monitor different types of data e.g. monitoring
water, humidity, temperature and etc. These could be the keys to support various industries
including the agriculture industry [1-3].

A security approach for wireless sensor network is required to consider three main
factors: area, farmers and agriculture products. A large area of agriculture field requires a
technology that has a low cost of technology devices to cover large area of farm. A farmer is
skilled person for specific agriculture but requires the simplified technology for less time
learning as well as less human-error for the user. For the last factor, agriculture product is the
main objective for agriculture industry, therefore selected technology needs to support the
growing process and improve the agriculture product in the final result.

As SensorScope [4] presents the benefit of wireless sensor network could be operated as
a simple management system. The end-user can minimize the learning curve by let the
self-operated algorithm to manage the technical task such as power management, sensor data,

270

Piya Techateerawat
network infrastructure and ad-hoc management. In addition, it is expected that the network is
flexible and adaptable to the additional of new nodes. It also manages routing changes in the
event of node failure. These features also need to consider the energy efficiency which is the
most critical aspect of sensor network application [5-8].

However, security in sensor network needs to consider variety of factors for a completed
approach. This paper shows the suggested factors and customization solution for agriculture
industry by demonstration in ordered as 1) A security approach for wireless sensor network,
and 2) A mechanism for security in wireless sensor network.

2. A Security Approach for Wireless Sensor Network
A security approach for wireless sensor network is covered: agriculture industry
challenge, user approach and technology implementation. These approaches are the support
factors for successive in security implementation. Although difference agriculture needs a
difference solution, a main structure and framework can be prepared for agriculture field [9].

The agriculture industry challenge is taking part on the location, device handling,
activities and personas. The location of agriculture can be differentiated for each place. In the
case of rural area, the infrastructure and technology platform cannot be expected to be
installed. The set up configuration of wireless sensor network relies on data transfer as well as
security establishing. For device handling scheme, a farmer and equipment can be changed
and cannot rely on the exact procedure or timeline. The activities are also difference from
types of agriculture and time but the main time during seeding and harvesting need to be rush.
Therefore, only a compulsory activity for security in wireless sensor network is needed to
involve with agriculture user. In the last, special needs or personas needs special equipment
and simplified interaction [10].

The user approach is the second challenge for security implementation. As part of
operation people is in rural area, communication can be more effective by customized
interaction as a local culture. Also, survey and training should have communicate in person
can gain more attraction and cooperative with the system. The final solution also should fill
the gap between core technology and user familiarity [11].
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

271
3. Security Out-of-the-Box
The following part presents the core technology that can be used as security mechanism
in wireless sensor network. The main benefit is self-constructed, use limited energy and
maintain the sufficient security for agriculture application. The system is based on the
SensorScope [4] but adds the solution module on top of the system. The security module is
consisted with two main functions: HKD and Adaptive IDS.

3.1 Hint Key Distribution (HKD)
HKD [12] is inspired by using of hint messages in ELK [13].

It uses symmetric

encryption to secure transmissions. The confidentiality and simplicity are provided from
encryption and decryption. When every sensor node has the secret key, it can establish
secured communication without altering the routing (or tree hierarchy).

To construct a key, we describe two sides of operations.

Sender and receiver have

common key KC which is used as a secret key when the key is not distributed. Master key, KM
is also installed asa part of key computation.

Two one-way functions F1 and F2 could minimize the computation while maintain a large
key domain. There are more key possibilities to protect from intruders in guessing the secret
key. In the long term, despite both sender and receiver remain computing in the same range
(L, N).
select random number L
load key K = KM
for j = Ldownto 0 do
compute key K= F1[K]
end for
store key KM = K
compute hashed value S1 = H[K]
select random number N
for j = N downto 0 do
compute key K = F2[K]
end for
compute hashed value S2 = H[K]
encrypt message (S1|S2) with key KC
broadcast message KC(S1|S2)

Figure 1: Generating hint procedure in HKD.

272

Piya Techateerawat
decrypt message with key KC
extractS1 and S2 from broadcasted message
load key K = KM
whileH[K] not equal to S1
compute key K = F1[K]
end while
store key KM = K
while H[K] not equal to S2
compute key K = F2[K]
end while
until store K as secret key

Figure 2: Receiver procedure in HKD
Intruders require a large set of key to attack. Since secret key is generated from previous
key, this adds up the number of possible keys to Ltx N to attack (where t is number of key
distribution).

Sender Process
Secret key is generated from repeatedly computing one-way function F1 and F2. Then,
sender broadcasts encrypted message which contains signature key from both F1 and F2 as in
figure 1.

Receiver Process
When broadcasted message is received, receiver decrypts message and extracts
signature S1 and S2. Then it repeatedly computes KM until its hash value matches with S1 and then
repeats for S2 as in figure 2.

Key Renewing Process
Sender and receiver start computing the secret key from previous key, K0 instead of KM.
So there is no key duplication and ithelps minimizing the computation.

3.2 Adaptive Intrusion Detection System (Adaptive IDS)
Adaptive Intrusion Detection System (Adaptive IDS) [14] uses either anomaly
detection or misuse detection. This paper uses a decision mechanism derived from Siraj and et
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

273
al. [15]. Within IDS, tasks are combined to minimize energy consumption. So, anomaly
detection is proceeding while event data is pre-checked for misuse detection. The signature
records are combined to a single database to reduce memory use. In normal situation, both
systems operate with the same record.

Event Data is the network activities (for example numbers of success and failure of
authentication). This set of data is prepared for further analysis.

Misuse Detection analyses event data from signature record. In case of event data is
matched with any rules, alert signal will be raised. Otherwise, event data is forwarded to
anomaly detection for further analysis.

Anomaly Detection compares event data with signature record to find harmful attacks
from intruder. If probability reaches the risk threshold, alert signal will be raised.

Signature Record is a database which contains signature of unauthorized and high
risk activities. In addition, each record contains level of harm for misuse detection and
probability chance for anomaly detection.

Voting algorithm for the selection of nodes in distributed defense consists of four
steps: vote preparation, voting, vote counting, and IDS activating. There are two parameters in
this algorithm. First, number of hop count determines the threshold of selection for the number
of hops between a candidate node and itself. A larger hop count means less activated nodes and
each IDS node has to take responsibility for more nodes. Second, the voting threshold is the
minimum number of votes before activating IDS. The procedure allows each node to elect its
gateway. The stages are:
1. Vote Preparation: Each node decides their gateway or nearest node. A hop count
parameter determines distance between agent node and neighboring nodes.
2. Voting: Each node transmits their vote message to their gateway.
3. Vote Counting: To count a received vote.

274

Piya Techateerawat
Figure 3: Procedure to find current key Kcby using one-way function F1 and F2
where L and N are random numbersfrom master key KM.
4. IDS Activating: If the number of votes exceeds the threshold, and IDS is then
activated. The node will remain active until timeout; at this point the process 1-4 will
be commenced again.
To address some of the limitations, we have further investigated the use of adaptive
thresholds. The approach is outlined in the protocol flow chart of figure 4. We assume that
each node has been synchronized to be accurate within a 5 second window. Initial threshold
number is 0 which increases and reduces based on pre-set number. A suggestion is reducing
number should be less than increasing number so activated node can be distributed wider. For
example, in 80 nodes cluster we use increasing increment number as 5 and reducing
increment number as 1.Note that a tree structure is not employed for the adaptive distributed
defense. Instead we rely on the adaptive threshold to guide selection.
The approach shows both a positive reinforcement for the threshold, and an active
reduction of threshold to promote candidate nodes for intrusion detection. The protocol also
avoids the difficulty of maintenance a tree hierarchy. Instead we use the dynamics of the
threshold to control which nodes are activated. This is potentially more robust.

3.3

User Interaction
The objective is to develop security solution which involves less interaction with user or

farmer and simple for non-technical skilled peopleto understand and implement the system.
We divide into four scenarios that system may interact with the user.
1.) Deployment: user requires not involving with complex tasksbut only turn on the
devices. At the same time, devices initiate themselves and set up key by HKD protocols.
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

275
Figure 4: User Interaction for Security Module.

2.) Troubleshooting: in the case that security protocol is corrupted or mal-function user can
simply re-start all the devices so HKD will start the initiate the key as well as Adaptive IDS
will be restarted itself.

3.) Alert: In case that security system raises the warning to user, the system communicates
to user in three levels:3.1) Minor Level Alert: warning will be logged on the central database.
3.2) Medium Level Alert: warning will be shown on the monitor which user can
observe and monitor the system.

3.3) High Level Alert: warning will be connected high power speaker so user can
immediately notice.

Optional, in the complex system may connect via telephone or SMS

system.

4.) Configuration: this scenario is designed for skilled people or administrator to
configure the system, read the log file, upgrade the software or configure the integration
system via telephone or SMS system.

276

Piya Techateerawat
4. Evaluation
4.1 Security
Brute Force Attach (BFA) is used to evaluate the resistance of SPINS and HKD. The
evaluation is based on a pair of communications which follow the theory and algorithm.
However, in practice, adversaries may reduce their computation time when they collect
information from a group of nodes.

Among these protocols: SPINS and HKD, they protect master key with hash or one-way
function. To obtain current secret key, adversary can directly perform BFA, but it is infeasible
to generate next key or master key.
However, breaking current secret key requires 2key length - 1 x Computation Time. In 40 bits
key length, there are 240 possible keys which average half (239) must be attempted to find the
correct key while 128 bits key needs 2127 attempts. Since UltraSparc II computes each key in
2 μs [16], in 40 bits key. It requires 1.10x106 s (12.7 days). To compare with 128 bits key, it
requires 3.4x1032 s (1.08x1025 years). So 128 bits key can enhance security protection as
shown in figure 5. However, breaking master key requires more computation than current
key. Since, it needs to compute for the entire key chain from master key to current key. To
compute key chain, MD5 and SHA-1 use the same 128bits hash.

Let maximum key chain

length is N and assuming that adversary knows this information. To break master key, it
needs to try every key chain. In each key chain, it needs to compute hash function N0 times.
Since number of computing function N0 depends on key chain length N (for key chain length
N, it requires to compute function N! times). So it must run 2key length - 1 x N! x Computation
Time. Then, let the key chain length is 10 for the worst case which actual protocols use
larger number.

In UltraSparc II, its execution times for MD5 and SHA-1 are 39 μs and 56 μs

[15]. In MD5, BFA will find the master key for 40 bits keychain in 7.78x1013 s (2.47x106
years) and 128 bits key chain in 2.41x1040 s (7.64x1032 years).

In SHA-1, it will find the

master key for 40 bits key chain in 1.12x1014s (3.54x106years) and 128 bits key chain in
3.46x1040s (1.10x1033years) as in Figure 6.

*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

277
Figure 5: Logarithm of computation times for current key in brute force attack.

Figure 6: Logarithm of computation times for the key chain in brute force attack.
In short key length (40 bits key), it can secure data in a short period of time (less than 12
days) before renewing key. However, for sensitive information, a longer key (128 bits key) is
required. To protect the system with master key, both short and long key show a secure
protection from BFA. However, SPINS can renew their master key in a period of time while
HKD can still uses its master key for longer. This can improve the security in the long term.

4.2 Energy Consumption
Energy consumption is the significant issue in sensor networks. MD5 consumes 0.59
μJ/Byte when comparing to 3DES computation, 6.04 μJ/Byte. So it can be assured that system
has capability to operate encryption, also able to perform HKD [17-19].

278

Piya Techateerawat
Table 1 illustrates the simulation result that shows the energy consumption in HKD,
SPINS and ELK. This simulation focuses on message size and energy consumption. This
result presents that HKD has almost three times expected lifetime than SPINS. However,
ELK in the best case scenarios reveals the best performance in the simulation.

Table 1: Energy consumption in communication.
Protocol

Estimated operation

(bytes)

time (days)

ELK (best case)

23-38

967

ELK (average)

23-38

108

ELK (worst case)

23-38

53

SPINS

598

277

HKD

4.3

Message size

64

715

User Interaction
User requires the least operation with security module. User needs only turning on to

activate HKD and Adaptive IDS to operate. In the case that system is corrupted, user needs to
re-start the system. For the output from system, user does not require to monitor regularly. In
case that critical threat, system raises the alert via speaker (or telephone/SMS if integrated
with this system). As a result, user requires zero-configuration and zero-maintenance for
day-to-day operation.

4.4

Cost
Cost of configuration and maintenance has a benefit from zero-configuration and

zero-maintenance so user does not require paying extra for security module as well as
implementing and maintenance cost. This is a significant factor for agriculture in developing
countries with limited budget and skilled technicians.

5. Conclusion and Future Works
According to the nature of agriculture industry, wireless sensor network can support the
large area, simple setup and operation. However, the security technology is complicated and
can be the challenge to implement security in wireless sensor network.

*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

279
This paper suggests the challenge main factors: location, device handling, activities and
personas. Since the agriculture can be difference in locations, equipments, activities and
personas, the customized security solution is required for specific type of agriculture.
However, the framework and approach can be set as a guideline. Location can affect by rural
area have less or none of technology infrastructure. The equipments are varied from type of
agriculture similar as the activities. Therefore, security approach needs to be simple and keep
the simple interaction with user. In addition, user approach requires having a customization to
match with local culture and balance with user interaction can be more effective for overall
system.
This paper also presents the security mechanism to support the needs of self-setup and
minimum operation for wireless sensor network in agriculture industry. The security module
has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is
detected via speaker. This system is also simplified the configuration, deployment and
maintenance by only powering on and system will then initiate the key among the agents.
Since HKD uses key chain, the key is updated regularly to increase the security of system.
The benefit from HKD is used less energy from communication with hint message as well as
error handling when message is lost during key change.

In addition, HKD also reduces the

energy consumption by small size of message and increases the operation time. As a result,
this security module is proposed to balance between the moderate security with the limited
budget and knowledge of user where focusing on agriculture in developing country.
For the future, research should focus on error-handling of security system. Since the
current model needs to restart system to initiate the key, the future model should provide
flexible solution for non-technician user to manage the security issues.

6. Acknowledgements
We would like to thank Faculty of Engineering, Thammasat University, Optical and
Quantum Communication Research Lab, National Research Council of Thailand and the
Thailand Research Fund (TRF) for the support and cooperation.

7. References
[1]

A. Dunkels, T. Voigt, N. Bergman and M. Jonsson. “The Design and Implementation
280

Piya Techateerawat
of an IP-based Sensor Network for Intrusion Monitoring”, Swedish National
Computer Networking Workshop, Nov 2004
[2]

C. Murthy and B. Manoj. Ad Hoc Wireless Networks, Ed 1st, Prentice Hall PTR,
United States of America, 2004, pp. 204-219

[3]

A. Hac. Wireless Sensor Network Designs, Ed 1st, Wiley, Great Britain, 2003, pp.
213-234

[4]

G. Barrenetxea, F. Ingelrest, G. Schaefer, M. Vetterli, O. Couach and M.
Parlange,“SensorScope: Out-of-the-Box Enbironmental Monitoring“, Information
Processing in Sensor Networks, 2008.

[5]

A. Perrig, J. Stankovic and D. Wagner. “Security in Wireless Sensor Networks”,
Communications of the ACM, vol. 47, pp 53-57, Jun 2004

[6]

E. Shi and A. Perrig. “Designing Secure Sensor Networks”, IEEE Wireless
Communications, pp. 38-43, Dec 2004

[7]

J. Newcome, E. Shi, D. Song and A. Perrig. “ The Sybil Attack in Sensor Networks:
Analysis & Defenses”, Information Processing in Sensor Networks 2004, pp. 259-268,
Apr 2004

[8]

J. Deng, R. Han and S. Mishra. “Security Support for In- Network Processing in
Wireless Sensor Networks”, Proceedings of the 1st ACM workshop on Security of ad
hoc and sensor networks, pp. 83-93, 2003

[9]

J. Burrell, T. Brooke and R. Beckwith. “Vineyard Computing: Sensor Networks in
Agricultural Production”, IEEE Pervasive Computing, pp. 38-45, Jan 2004

[10]

M. de Sá and L. Carriço. “Lessons from early stages design of mobile applications”,
Proceedings of the 10th international conference on Human computer interaction with
mobile devices and services (MobileHCI '08). ACM, New York, NY, USA, 127-136,
2008.

[11]

A. Sukumaran, S. Ramlal and et. el. “Intermediated technology interaction in rural
contexts”. Proceedings of the 27th international conference extended abstracts on
Human factors in computing systems (CHI EA '09). ACM, New York, NY, USA,
3817-3822, 2009.

[12]

P. Techateerawat and A. Jennings. “Hint Key Distribution for Sensor Networks”, in
International Joint Conferences on Computer, Information, and Systems Sciences, and
Engineering (CISSE 2006), 2006.

[13]

Penrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key
distribution," presented at Security and Privacy, 2001. S&P 2001. Proceedings. 2001
IEEE Symposium on, 2001.

[14]

P. Techateerawat and A. Jennings. “Adaptive Intrusion Detection in Wireless Sensor

*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf

281
Networks”, in The 2007 International Conference on Intelligent Pervasive Computing
(IPC-07), 2007.
[15]

A. Siraj, S. Bridges and R. Vaughn. “Fuzzy Cognitive Maps for Decision Support in
an Intelligent Intrusion Detection System”, IFSA World Congress and 20th NAFIPS
International Conference 2001, vol. 4, pp. 2165-2170, Jul 2001

[16]

P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F.Mueller, and M. Sichitiu,
"Analyzing and modeling encryption overhead for sensor network nodes " in
Proceedings of the 2nd ACM international conference on Wireless sensor networks
and applications San Diego, CA, USA ACM Press, 2003 pp. 151-159

[17]

P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M.
Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in
Proceedings of the 2nd ACM international conference on Wireless sensor networks
and applications. San Diego, CA, USA: ACM Press, 2003, pp. 151-159.

[18]

N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "Analyzing the energy
consumption of security protocols," in Proceedings of the 2003 international
symposium on Low power electronics and design. Seoul, Korea: ACM Press, 2003,
pp. 30-35.

[19]

J. D. Touch, "Performance analysis of MD5," in Proceedings of the conference on
Applications, technologies, architectures, and protocols for computer communication.
Cambridge, Massachusetts, United States: ACM Press, 1995, pp. 77-86.

Dr. P. Techateerawat is Assistant Professor of Computer Engineering Department, Faculty of Engineering,
Thammasat University. He received his B.Eng. from University of New South Wales, Australia with
Honors in 2004. He continued his PhD study at Royal Melbourne Institute of Technology University,
Australia, where he obtained his PhD in Wireless Sensor Network Security. Dr. PiyaTechateerawat current
interests involve applications of Sensor Network, Security and Quantum Cryptography.

Peer Review: This article has been internationally peer-reviewed and accepted for publication
according to the guidelines given at the journal’s website.

282

Piya Techateerawat

Weitere ähnliche Inhalte

Was ist angesagt?

The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
 
Residential and Official Extension of IOT Enabled Building Automation System
Residential and Official Extension of IOT Enabled Building Automation SystemResidential and Official Extension of IOT Enabled Building Automation System
Residential and Official Extension of IOT Enabled Building Automation SystemAssociate Professor in VSB Coimbatore
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
Implementation of an Efficient Smart Home System using MQTT
Implementation of an Efficient Smart Home System using MQTTImplementation of an Efficient Smart Home System using MQTT
Implementation of an Efficient Smart Home System using MQTTIRJET Journal
 
Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...zaidinvisible
 
23 9754 assessment paper id 0023 (ed l)2
23 9754 assessment paper id 0023 (ed l)223 9754 assessment paper id 0023 (ed l)2
23 9754 assessment paper id 0023 (ed l)2IAESIJEECS
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORINGDESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORINGIAEME Publication
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 
Intelligent fire detection and alert system using labVIEW
Intelligent fire detection and alert system using labVIEWIntelligent fire detection and alert system using labVIEW
Intelligent fire detection and alert system using labVIEWIJECEIAES
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemIJERA Editor
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communicationphbhagwat
 
IRJET- Smart Energy Management System
IRJET-  	  Smart Energy Management SystemIRJET-  	  Smart Energy Management System
IRJET- Smart Energy Management SystemIRJET Journal
 

Was ist angesagt? (20)

The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic condition
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
 
Residential and Official Extension of IOT Enabled Building Automation System
Residential and Official Extension of IOT Enabled Building Automation SystemResidential and Official Extension of IOT Enabled Building Automation System
Residential and Official Extension of IOT Enabled Building Automation System
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Implementation of an Efficient Smart Home System using MQTT
Implementation of an Efficient Smart Home System using MQTTImplementation of an Efficient Smart Home System using MQTT
Implementation of an Efficient Smart Home System using MQTT
 
Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...
 
23 9754 assessment paper id 0023 (ed l)2
23 9754 assessment paper id 0023 (ed l)223 9754 assessment paper id 0023 (ed l)2
23 9754 assessment paper id 0023 (ed l)2
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
Industrial Safety Measurement using Sensors and Voice Announcement
Industrial Safety Measurement using Sensors and Voice AnnouncementIndustrial Safety Measurement using Sensors and Voice Announcement
Industrial Safety Measurement using Sensors and Voice Announcement
 
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORINGDESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Intelligent fire detection and alert system using labVIEW
Intelligent fire detection and alert system using labVIEWIntelligent fire detection and alert system using labVIEW
Intelligent fire detection and alert system using labVIEW
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher System
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communication
 
IRJET- Smart Energy Management System
IRJET-  	  Smart Energy Management SystemIRJET-  	  Smart Energy Management System
IRJET- Smart Energy Management System
 

Andere mochten auch

CROP - Wireless Sensor Network for Precision Agriculture (presentation)
CROP - Wireless Sensor Network for Precision Agriculture (presentation)CROP - Wireless Sensor Network for Precision Agriculture (presentation)
CROP - Wireless Sensor Network for Precision Agriculture (presentation)Luis Batista
 
Sensors in Food and Agriculture post conference summary
Sensors in Food and Agriculture post conference summarySensors in Food and Agriculture post conference summary
Sensors in Food and Agriculture post conference summaryCaptum Capital Limited
 
Microcontroller based irrigation
Microcontroller based irrigationMicrocontroller based irrigation
Microcontroller based irrigationkajikho9
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...Farhad Sohail
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 

Andere mochten auch (12)

CROP - Wireless Sensor Network for Precision Agriculture (presentation)
CROP - Wireless Sensor Network for Precision Agriculture (presentation)CROP - Wireless Sensor Network for Precision Agriculture (presentation)
CROP - Wireless Sensor Network for Precision Agriculture (presentation)
 
WSNs & Agriculture
WSNs & AgricultureWSNs & Agriculture
WSNs & Agriculture
 
Sensors in Food and Agriculture post conference summary
Sensors in Food and Agriculture post conference summarySensors in Food and Agriculture post conference summary
Sensors in Food and Agriculture post conference summary
 
Microcontroller based irrigation
Microcontroller based irrigationMicrocontroller based irrigation
Microcontroller based irrigation
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...
Wireless Sensor Network based Crop Field Monitoring for Marginal Farming: Per...
 
Automatic irrigation system ppt
Automatic irrigation system pptAutomatic irrigation system ppt
Automatic irrigation system ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
PLANT GROWTH REGULATORS
PLANT GROWTH REGULATORSPLANT GROWTH REGULATORS
PLANT GROWTH REGULATORS
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie A Security Approach for Wireless Sensor Network in Agriculture Industry

IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksIJMER
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...IRJET Journal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
 
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET Journal
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tIJARIIT
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 

Ähnlich wie A Security Approach for Wireless Sensor Network in Agriculture Industry (20)

IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
 
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
MAJOR_PROJECT
MAJOR_PROJECTMAJOR_PROJECT
MAJOR_PROJECT
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 

Mehr von drboon

11(7) 2020 ITJEMAST's published research articles
11(7) 2020 ITJEMAST's published research articles11(7) 2020 ITJEMAST's published research articles
11(7) 2020 ITJEMAST's published research articlesdrboon
 
11(6) 2020 ITJEMAST Research Articles
11(6) 2020 ITJEMAST Research Articles11(6) 2020 ITJEMAST Research Articles
11(6) 2020 ITJEMAST Research Articlesdrboon
 
11(5) 2020 ITJEMAST Research Papers
11(5) 2020 ITJEMAST Research Papers 11(5) 2020 ITJEMAST Research Papers
11(5) 2020 ITJEMAST Research Papers drboon
 
11(4) 2020 ITJEMAST Multidisciplinary Research Articles
11(4) 2020 ITJEMAST Multidisciplinary Research Articles11(4) 2020 ITJEMAST Multidisciplinary Research Articles
11(4) 2020 ITJEMAST Multidisciplinary Research Articlesdrboon
 
11(3) 2020 ITJEMAST Multidisciplinary Research Articles
11(3) 2020 ITJEMAST Multidisciplinary Research Articles 11(3) 2020 ITJEMAST Multidisciplinary Research Articles
11(3) 2020 ITJEMAST Multidisciplinary Research Articles drboon
 
11(1)2020 ITJEMAST RESEARCH ARTICLES
11(1)2020 ITJEMAST RESEARCH ARTICLES11(1)2020 ITJEMAST RESEARCH ARTICLES
11(1)2020 ITJEMAST RESEARCH ARTICLESdrboon
 
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...
11(2)2020  International Transaction Journal of Engineering, Management, & Ap...11(2)2020  International Transaction Journal of Engineering, Management, & Ap...
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...drboon
 
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...drboon
 
The Streets in a Livable City
The Streets in a Livable CityThe Streets in a Livable City
The Streets in a Livable Citydrboon
 
Impact of Building Envelope Modification on Energy Performance of High-Rise A...
Impact of Building Envelope Modification on Energy Performance of High-Rise A...Impact of Building Envelope Modification on Energy Performance of High-Rise A...
Impact of Building Envelope Modification on Energy Performance of High-Rise A...drboon
 
Enhancement of Space Environment Via Healing Garden
Enhancement of Space Environment Via Healing GardenEnhancement of Space Environment Via Healing Garden
Enhancement of Space Environment Via Healing Gardendrboon
 
Design of Quadruped Walking Robot with Spherical Shell
Design of Quadruped Walking Robot with Spherical ShellDesign of Quadruped Walking Robot with Spherical Shell
Design of Quadruped Walking Robot with Spherical Shelldrboon
 
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...drboon
 
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...drboon
 
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitro
Effect of Oryzalin on Growth of Anthurium andraeanum In VitroEffect of Oryzalin on Growth of Anthurium andraeanum In Vitro
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitrodrboon
 
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...drboon
 
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...drboon
 
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...drboon
 
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...drboon
 
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...drboon
 

Mehr von drboon (20)

11(7) 2020 ITJEMAST's published research articles
11(7) 2020 ITJEMAST's published research articles11(7) 2020 ITJEMAST's published research articles
11(7) 2020 ITJEMAST's published research articles
 
11(6) 2020 ITJEMAST Research Articles
11(6) 2020 ITJEMAST Research Articles11(6) 2020 ITJEMAST Research Articles
11(6) 2020 ITJEMAST Research Articles
 
11(5) 2020 ITJEMAST Research Papers
11(5) 2020 ITJEMAST Research Papers 11(5) 2020 ITJEMAST Research Papers
11(5) 2020 ITJEMAST Research Papers
 
11(4) 2020 ITJEMAST Multidisciplinary Research Articles
11(4) 2020 ITJEMAST Multidisciplinary Research Articles11(4) 2020 ITJEMAST Multidisciplinary Research Articles
11(4) 2020 ITJEMAST Multidisciplinary Research Articles
 
11(3) 2020 ITJEMAST Multidisciplinary Research Articles
11(3) 2020 ITJEMAST Multidisciplinary Research Articles 11(3) 2020 ITJEMAST Multidisciplinary Research Articles
11(3) 2020 ITJEMAST Multidisciplinary Research Articles
 
11(1)2020 ITJEMAST RESEARCH ARTICLES
11(1)2020 ITJEMAST RESEARCH ARTICLES11(1)2020 ITJEMAST RESEARCH ARTICLES
11(1)2020 ITJEMAST RESEARCH ARTICLES
 
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...
11(2)2020  International Transaction Journal of Engineering, Management, & Ap...11(2)2020  International Transaction Journal of Engineering, Management, & Ap...
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...
 
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...
 
The Streets in a Livable City
The Streets in a Livable CityThe Streets in a Livable City
The Streets in a Livable City
 
Impact of Building Envelope Modification on Energy Performance of High-Rise A...
Impact of Building Envelope Modification on Energy Performance of High-Rise A...Impact of Building Envelope Modification on Energy Performance of High-Rise A...
Impact of Building Envelope Modification on Energy Performance of High-Rise A...
 
Enhancement of Space Environment Via Healing Garden
Enhancement of Space Environment Via Healing GardenEnhancement of Space Environment Via Healing Garden
Enhancement of Space Environment Via Healing Garden
 
Design of Quadruped Walking Robot with Spherical Shell
Design of Quadruped Walking Robot with Spherical ShellDesign of Quadruped Walking Robot with Spherical Shell
Design of Quadruped Walking Robot with Spherical Shell
 
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...
 
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...
 
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitro
Effect of Oryzalin on Growth of Anthurium andraeanum In VitroEffect of Oryzalin on Growth of Anthurium andraeanum In Vitro
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitro
 
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...
 
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...
 
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...
 
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...
 
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

A Security Approach for Wireless Sensor Network in Agriculture Industry

  • 1. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies http://TuEngr.com A Security Approach for Wireless Sensor Network in Agriculture Industry Piya Techateerawat a* a Department of Electrical and Computer Engineering, Faculty of Engineering, Thammasat University Khlong-Luang, Pathumthani, THAILAND ARTICLEINFO ABSTRACT Article history: Received 24 April 2013 Received in revised form 20 August 2013 Accepted 26 August 2013 Available online 26 August 2013 An overview of agriculture industry is involved with large area, farmers and agriculture products. A large scale of area requires time consuming for collecting data to make decision on agriculture (e.g. watering, pruning and harvesting.). From these requirements, wireless sensor network can be a supported technology because it can deploy distributed and construct network sharing among their group. In general, security solution needs an experienced and skilled specialist to set up, maintain and troubleshoot. This is a challenge for wireless sensor network to implement in agriculture industry. Keywords: Security Framework; Key Distribution; Intrusion Detection System Our security approach is presented related factors and customized configuration for the process of deployment, maintenance, information feedback. This paper presents the security mechanism to support the needs of self-setup and minimum operation for wireless sensor network in agriculture industry. The security module has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is detected via speaker. This system is also simplified the configuration, deployment and maintenance by only powering on and system will then initiate the key among the agents. As a result, this security module is proposed to balance between the moderate security with the limited resource and technician. 2013 INT TRANS J ENG MANAG SCI TECH. *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 269
  • 2. Nomenclature and Symbols We use the following notation to describe a protocol and operation in this paper: M1 | M2 the concatenation of message M1 and M2 H[D] the hash function which digests data D F1[D] the first one-way function which covert data D F2[D] the second one-way function which covert data D KC the common key to use when secret key is not set up KM the master key to generate keys for the 1 time. K0 the storing key to save previous key session K[M] encryption of message M with key K S1 the signature of key from F1 S2 the signature of key from F2 L, N the random numbers in the key generating st 1. Introduction A wireless sensor network is developed for self-established network infrastructure with data sensor technology. In addition, it can reduce the complexity of device deployment on small and large area. The sensor data can monitor different types of data e.g. monitoring water, humidity, temperature and etc. These could be the keys to support various industries including the agriculture industry [1-3]. A security approach for wireless sensor network is required to consider three main factors: area, farmers and agriculture products. A large area of agriculture field requires a technology that has a low cost of technology devices to cover large area of farm. A farmer is skilled person for specific agriculture but requires the simplified technology for less time learning as well as less human-error for the user. For the last factor, agriculture product is the main objective for agriculture industry, therefore selected technology needs to support the growing process and improve the agriculture product in the final result. As SensorScope [4] presents the benefit of wireless sensor network could be operated as a simple management system. The end-user can minimize the learning curve by let the self-operated algorithm to manage the technical task such as power management, sensor data, 270 Piya Techateerawat
  • 3. network infrastructure and ad-hoc management. In addition, it is expected that the network is flexible and adaptable to the additional of new nodes. It also manages routing changes in the event of node failure. These features also need to consider the energy efficiency which is the most critical aspect of sensor network application [5-8]. However, security in sensor network needs to consider variety of factors for a completed approach. This paper shows the suggested factors and customization solution for agriculture industry by demonstration in ordered as 1) A security approach for wireless sensor network, and 2) A mechanism for security in wireless sensor network. 2. A Security Approach for Wireless Sensor Network A security approach for wireless sensor network is covered: agriculture industry challenge, user approach and technology implementation. These approaches are the support factors for successive in security implementation. Although difference agriculture needs a difference solution, a main structure and framework can be prepared for agriculture field [9]. The agriculture industry challenge is taking part on the location, device handling, activities and personas. The location of agriculture can be differentiated for each place. In the case of rural area, the infrastructure and technology platform cannot be expected to be installed. The set up configuration of wireless sensor network relies on data transfer as well as security establishing. For device handling scheme, a farmer and equipment can be changed and cannot rely on the exact procedure or timeline. The activities are also difference from types of agriculture and time but the main time during seeding and harvesting need to be rush. Therefore, only a compulsory activity for security in wireless sensor network is needed to involve with agriculture user. In the last, special needs or personas needs special equipment and simplified interaction [10]. The user approach is the second challenge for security implementation. As part of operation people is in rural area, communication can be more effective by customized interaction as a local culture. Also, survey and training should have communicate in person can gain more attraction and cooperative with the system. The final solution also should fill the gap between core technology and user familiarity [11]. *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 271
  • 4. 3. Security Out-of-the-Box The following part presents the core technology that can be used as security mechanism in wireless sensor network. The main benefit is self-constructed, use limited energy and maintain the sufficient security for agriculture application. The system is based on the SensorScope [4] but adds the solution module on top of the system. The security module is consisted with two main functions: HKD and Adaptive IDS. 3.1 Hint Key Distribution (HKD) HKD [12] is inspired by using of hint messages in ELK [13]. It uses symmetric encryption to secure transmissions. The confidentiality and simplicity are provided from encryption and decryption. When every sensor node has the secret key, it can establish secured communication without altering the routing (or tree hierarchy). To construct a key, we describe two sides of operations. Sender and receiver have common key KC which is used as a secret key when the key is not distributed. Master key, KM is also installed asa part of key computation. Two one-way functions F1 and F2 could minimize the computation while maintain a large key domain. There are more key possibilities to protect from intruders in guessing the secret key. In the long term, despite both sender and receiver remain computing in the same range (L, N). select random number L load key K = KM for j = Ldownto 0 do compute key K= F1[K] end for store key KM = K compute hashed value S1 = H[K] select random number N for j = N downto 0 do compute key K = F2[K] end for compute hashed value S2 = H[K] encrypt message (S1|S2) with key KC broadcast message KC(S1|S2) Figure 1: Generating hint procedure in HKD. 272 Piya Techateerawat
  • 5. decrypt message with key KC extractS1 and S2 from broadcasted message load key K = KM whileH[K] not equal to S1 compute key K = F1[K] end while store key KM = K while H[K] not equal to S2 compute key K = F2[K] end while until store K as secret key Figure 2: Receiver procedure in HKD Intruders require a large set of key to attack. Since secret key is generated from previous key, this adds up the number of possible keys to Ltx N to attack (where t is number of key distribution). Sender Process Secret key is generated from repeatedly computing one-way function F1 and F2. Then, sender broadcasts encrypted message which contains signature key from both F1 and F2 as in figure 1. Receiver Process When broadcasted message is received, receiver decrypts message and extracts signature S1 and S2. Then it repeatedly computes KM until its hash value matches with S1 and then repeats for S2 as in figure 2. Key Renewing Process Sender and receiver start computing the secret key from previous key, K0 instead of KM. So there is no key duplication and ithelps minimizing the computation. 3.2 Adaptive Intrusion Detection System (Adaptive IDS) Adaptive Intrusion Detection System (Adaptive IDS) [14] uses either anomaly detection or misuse detection. This paper uses a decision mechanism derived from Siraj and et *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 273
  • 6. al. [15]. Within IDS, tasks are combined to minimize energy consumption. So, anomaly detection is proceeding while event data is pre-checked for misuse detection. The signature records are combined to a single database to reduce memory use. In normal situation, both systems operate with the same record. Event Data is the network activities (for example numbers of success and failure of authentication). This set of data is prepared for further analysis. Misuse Detection analyses event data from signature record. In case of event data is matched with any rules, alert signal will be raised. Otherwise, event data is forwarded to anomaly detection for further analysis. Anomaly Detection compares event data with signature record to find harmful attacks from intruder. If probability reaches the risk threshold, alert signal will be raised. Signature Record is a database which contains signature of unauthorized and high risk activities. In addition, each record contains level of harm for misuse detection and probability chance for anomaly detection. Voting algorithm for the selection of nodes in distributed defense consists of four steps: vote preparation, voting, vote counting, and IDS activating. There are two parameters in this algorithm. First, number of hop count determines the threshold of selection for the number of hops between a candidate node and itself. A larger hop count means less activated nodes and each IDS node has to take responsibility for more nodes. Second, the voting threshold is the minimum number of votes before activating IDS. The procedure allows each node to elect its gateway. The stages are: 1. Vote Preparation: Each node decides their gateway or nearest node. A hop count parameter determines distance between agent node and neighboring nodes. 2. Voting: Each node transmits their vote message to their gateway. 3. Vote Counting: To count a received vote. 274 Piya Techateerawat
  • 7. Figure 3: Procedure to find current key Kcby using one-way function F1 and F2 where L and N are random numbersfrom master key KM. 4. IDS Activating: If the number of votes exceeds the threshold, and IDS is then activated. The node will remain active until timeout; at this point the process 1-4 will be commenced again. To address some of the limitations, we have further investigated the use of adaptive thresholds. The approach is outlined in the protocol flow chart of figure 4. We assume that each node has been synchronized to be accurate within a 5 second window. Initial threshold number is 0 which increases and reduces based on pre-set number. A suggestion is reducing number should be less than increasing number so activated node can be distributed wider. For example, in 80 nodes cluster we use increasing increment number as 5 and reducing increment number as 1.Note that a tree structure is not employed for the adaptive distributed defense. Instead we rely on the adaptive threshold to guide selection. The approach shows both a positive reinforcement for the threshold, and an active reduction of threshold to promote candidate nodes for intrusion detection. The protocol also avoids the difficulty of maintenance a tree hierarchy. Instead we use the dynamics of the threshold to control which nodes are activated. This is potentially more robust. 3.3 User Interaction The objective is to develop security solution which involves less interaction with user or farmer and simple for non-technical skilled peopleto understand and implement the system. We divide into four scenarios that system may interact with the user. 1.) Deployment: user requires not involving with complex tasksbut only turn on the devices. At the same time, devices initiate themselves and set up key by HKD protocols. *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 275
  • 8. Figure 4: User Interaction for Security Module. 2.) Troubleshooting: in the case that security protocol is corrupted or mal-function user can simply re-start all the devices so HKD will start the initiate the key as well as Adaptive IDS will be restarted itself. 3.) Alert: In case that security system raises the warning to user, the system communicates to user in three levels:3.1) Minor Level Alert: warning will be logged on the central database. 3.2) Medium Level Alert: warning will be shown on the monitor which user can observe and monitor the system. 3.3) High Level Alert: warning will be connected high power speaker so user can immediately notice. Optional, in the complex system may connect via telephone or SMS system. 4.) Configuration: this scenario is designed for skilled people or administrator to configure the system, read the log file, upgrade the software or configure the integration system via telephone or SMS system. 276 Piya Techateerawat
  • 9. 4. Evaluation 4.1 Security Brute Force Attach (BFA) is used to evaluate the resistance of SPINS and HKD. The evaluation is based on a pair of communications which follow the theory and algorithm. However, in practice, adversaries may reduce their computation time when they collect information from a group of nodes. Among these protocols: SPINS and HKD, they protect master key with hash or one-way function. To obtain current secret key, adversary can directly perform BFA, but it is infeasible to generate next key or master key. However, breaking current secret key requires 2key length - 1 x Computation Time. In 40 bits key length, there are 240 possible keys which average half (239) must be attempted to find the correct key while 128 bits key needs 2127 attempts. Since UltraSparc II computes each key in 2 μs [16], in 40 bits key. It requires 1.10x106 s (12.7 days). To compare with 128 bits key, it requires 3.4x1032 s (1.08x1025 years). So 128 bits key can enhance security protection as shown in figure 5. However, breaking master key requires more computation than current key. Since, it needs to compute for the entire key chain from master key to current key. To compute key chain, MD5 and SHA-1 use the same 128bits hash. Let maximum key chain length is N and assuming that adversary knows this information. To break master key, it needs to try every key chain. In each key chain, it needs to compute hash function N0 times. Since number of computing function N0 depends on key chain length N (for key chain length N, it requires to compute function N! times). So it must run 2key length - 1 x N! x Computation Time. Then, let the key chain length is 10 for the worst case which actual protocols use larger number. In UltraSparc II, its execution times for MD5 and SHA-1 are 39 μs and 56 μs [15]. In MD5, BFA will find the master key for 40 bits keychain in 7.78x1013 s (2.47x106 years) and 128 bits key chain in 2.41x1040 s (7.64x1032 years). In SHA-1, it will find the master key for 40 bits key chain in 1.12x1014s (3.54x106years) and 128 bits key chain in 3.46x1040s (1.10x1033years) as in Figure 6. *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 277
  • 10. Figure 5: Logarithm of computation times for current key in brute force attack. Figure 6: Logarithm of computation times for the key chain in brute force attack. In short key length (40 bits key), it can secure data in a short period of time (less than 12 days) before renewing key. However, for sensitive information, a longer key (128 bits key) is required. To protect the system with master key, both short and long key show a secure protection from BFA. However, SPINS can renew their master key in a period of time while HKD can still uses its master key for longer. This can improve the security in the long term. 4.2 Energy Consumption Energy consumption is the significant issue in sensor networks. MD5 consumes 0.59 μJ/Byte when comparing to 3DES computation, 6.04 μJ/Byte. So it can be assured that system has capability to operate encryption, also able to perform HKD [17-19]. 278 Piya Techateerawat
  • 11. Table 1 illustrates the simulation result that shows the energy consumption in HKD, SPINS and ELK. This simulation focuses on message size and energy consumption. This result presents that HKD has almost three times expected lifetime than SPINS. However, ELK in the best case scenarios reveals the best performance in the simulation. Table 1: Energy consumption in communication. Protocol Estimated operation (bytes) time (days) ELK (best case) 23-38 967 ELK (average) 23-38 108 ELK (worst case) 23-38 53 SPINS 598 277 HKD 4.3 Message size 64 715 User Interaction User requires the least operation with security module. User needs only turning on to activate HKD and Adaptive IDS to operate. In the case that system is corrupted, user needs to re-start the system. For the output from system, user does not require to monitor regularly. In case that critical threat, system raises the alert via speaker (or telephone/SMS if integrated with this system). As a result, user requires zero-configuration and zero-maintenance for day-to-day operation. 4.4 Cost Cost of configuration and maintenance has a benefit from zero-configuration and zero-maintenance so user does not require paying extra for security module as well as implementing and maintenance cost. This is a significant factor for agriculture in developing countries with limited budget and skilled technicians. 5. Conclusion and Future Works According to the nature of agriculture industry, wireless sensor network can support the large area, simple setup and operation. However, the security technology is complicated and can be the challenge to implement security in wireless sensor network. *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 279
  • 12. This paper suggests the challenge main factors: location, device handling, activities and personas. Since the agriculture can be difference in locations, equipments, activities and personas, the customized security solution is required for specific type of agriculture. However, the framework and approach can be set as a guideline. Location can affect by rural area have less or none of technology infrastructure. The equipments are varied from type of agriculture similar as the activities. Therefore, security approach needs to be simple and keep the simple interaction with user. In addition, user approach requires having a customization to match with local culture and balance with user interaction can be more effective for overall system. This paper also presents the security mechanism to support the needs of self-setup and minimum operation for wireless sensor network in agriculture industry. The security module has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is detected via speaker. This system is also simplified the configuration, deployment and maintenance by only powering on and system will then initiate the key among the agents. Since HKD uses key chain, the key is updated regularly to increase the security of system. The benefit from HKD is used less energy from communication with hint message as well as error handling when message is lost during key change. In addition, HKD also reduces the energy consumption by small size of message and increases the operation time. As a result, this security module is proposed to balance between the moderate security with the limited budget and knowledge of user where focusing on agriculture in developing country. For the future, research should focus on error-handling of security system. Since the current model needs to restart system to initiate the key, the future model should provide flexible solution for non-technician user to manage the security issues. 6. Acknowledgements We would like to thank Faculty of Engineering, Thammasat University, Optical and Quantum Communication Research Lab, National Research Council of Thailand and the Thailand Research Fund (TRF) for the support and cooperation. 7. References [1] A. Dunkels, T. Voigt, N. Bergman and M. Jonsson. “The Design and Implementation 280 Piya Techateerawat
  • 13. of an IP-based Sensor Network for Intrusion Monitoring”, Swedish National Computer Networking Workshop, Nov 2004 [2] C. Murthy and B. Manoj. Ad Hoc Wireless Networks, Ed 1st, Prentice Hall PTR, United States of America, 2004, pp. 204-219 [3] A. Hac. Wireless Sensor Network Designs, Ed 1st, Wiley, Great Britain, 2003, pp. 213-234 [4] G. Barrenetxea, F. Ingelrest, G. Schaefer, M. Vetterli, O. Couach and M. Parlange,“SensorScope: Out-of-the-Box Enbironmental Monitoring“, Information Processing in Sensor Networks, 2008. [5] A. Perrig, J. Stankovic and D. Wagner. “Security in Wireless Sensor Networks”, Communications of the ACM, vol. 47, pp 53-57, Jun 2004 [6] E. Shi and A. Perrig. “Designing Secure Sensor Networks”, IEEE Wireless Communications, pp. 38-43, Dec 2004 [7] J. Newcome, E. Shi, D. Song and A. Perrig. “ The Sybil Attack in Sensor Networks: Analysis & Defenses”, Information Processing in Sensor Networks 2004, pp. 259-268, Apr 2004 [8] J. Deng, R. Han and S. Mishra. “Security Support for In- Network Processing in Wireless Sensor Networks”, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 83-93, 2003 [9] J. Burrell, T. Brooke and R. Beckwith. “Vineyard Computing: Sensor Networks in Agricultural Production”, IEEE Pervasive Computing, pp. 38-45, Jan 2004 [10] M. de Sá and L. Carriço. “Lessons from early stages design of mobile applications”, Proceedings of the 10th international conference on Human computer interaction with mobile devices and services (MobileHCI '08). ACM, New York, NY, USA, 127-136, 2008. [11] A. Sukumaran, S. Ramlal and et. el. “Intermediated technology interaction in rural contexts”. Proceedings of the 27th international conference extended abstracts on Human factors in computing systems (CHI EA '09). ACM, New York, NY, USA, 3817-3822, 2009. [12] P. Techateerawat and A. Jennings. “Hint Key Distribution for Sensor Networks”, in International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2006), 2006. [13] Penrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key distribution," presented at Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2001. [14] P. Techateerawat and A. Jennings. “Adaptive Intrusion Detection in Wireless Sensor *Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address: tpiya@engr.tu.ac.th. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Volume 4 No.4 ISSN 2228-9860 eISSN 1906-9642. Online Available at http://TuEngr.com/V04/269-282.pdf 281
  • 14. Networks”, in The 2007 International Conference on Intelligent Pervasive Computing (IPC-07), 2007. [15] A. Siraj, S. Bridges and R. Vaughn. “Fuzzy Cognitive Maps for Decision Support in an Intelligent Intrusion Detection System”, IFSA World Congress and 20th NAFIPS International Conference 2001, vol. 4, pp. 2165-2170, Jul 2001 [16] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F.Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes " in Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications San Diego, CA, USA ACM Press, 2003 pp. 151-159 [17] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications. San Diego, CA, USA: ACM Press, 2003, pp. 151-159. [18] N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "Analyzing the energy consumption of security protocols," in Proceedings of the 2003 international symposium on Low power electronics and design. Seoul, Korea: ACM Press, 2003, pp. 30-35. [19] J. D. Touch, "Performance analysis of MD5," in Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. Cambridge, Massachusetts, United States: ACM Press, 1995, pp. 77-86. Dr. P. Techateerawat is Assistant Professor of Computer Engineering Department, Faculty of Engineering, Thammasat University. He received his B.Eng. from University of New South Wales, Australia with Honors in 2004. He continued his PhD study at Royal Melbourne Institute of Technology University, Australia, where he obtained his PhD in Wireless Sensor Network Security. Dr. PiyaTechateerawat current interests involve applications of Sensor Network, Security and Quantum Cryptography. Peer Review: This article has been internationally peer-reviewed and accepted for publication according to the guidelines given at the journal’s website. 282 Piya Techateerawat