A Simple and Efficient Unique Identity Based Verification in Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : GiriBabu Pitchika, Mula.Sudhakar


GiriBabu Pitchika, Mula.Sudhakar"A Simple and Efficient Unique Identity Based Verification in Networks", International Journal of Engineering Trends and Technology (IJETT), V17(6),288-292 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


In networks transferring data is critical issue for providing security of data. Before transferring data if it checks the sent user is authenticate user or not. By providing security of data and authentication of user we proposed a technique. In this paper we are implement two concepts for performing those operations. The first one is identity based signature for verification of user generated by the verifier and second one is key is x-or operated with the data and get the cipherand then binary level technique for encryption and decryption message. The binary level technique converts the plain text into binary form and then splits the data into blocks and assign values to it based on identification mark technique depend upon the length of the binary digitthese are divided into two 1stlevel is 2bit and 2nd level is 4 bit level. By providing those techniques we can improve efficiency, security overhead and energy consumption.


1. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences. (2000) 4–7
2. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols. Volume 1. (2003) 293–315 Also appeared in First IEEE International Workshop on Sensor Network Protocols and Applications.
3. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35 (2002) 54–62
4. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002) 521–534 Also appeared in Mobile Computing and Networking.
5. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press (2002) 41–47
6. Zhu, S., Setia, S., Jajodia, S.: Leap: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security, ACM Press (2003) 62–72
7. Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003. (2003) 175–192
8. Yea, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: INFOCOM 2004. (2004)
9. Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: Proceedings of the 2003 ACM workshop on Wireless security, ACM Press (2003) 79–87
10. Oliveira, L.B., Wong, H.C., Loureiro, A.A.F.: LHA-SP: Secure protocols for hierarchical wireless sensor networks. In: 9th IFIP/IEEE International Symposium on Integrated Network Management (IM’05), Nice, France (2005) To appear. 11. Melo, E.J.D., Liu, M.: The effect of organization on energy consumption in wireless sensor networks. In: IEEE Globecom 2002. (2002)