Premium Essay

Nt1330 Unit 1 Lab Report

Submitted By
Words 627
Pages 3
Time Consumption for Key establishment is one of the important constraints of Wireless Sensor Network. In basic schemes it is depends on the number of factors like, the number of a node neighbours N$_{nb}$, the key ring size\emph{ m}, and the key pool size \emph{P} because of shared key discovery phase and path key establishment phase .Time consumption for key establishment T$_{E}$ in E-G scheme is expressed as follow:\\ \emph{T$_{E}$= max(T$_{Ei}$)
\hspace{5mm} i=1,2,...,N\\
T$_{Ei}$ $\propto$ N$_{nb}$
\hspace{5mm} T$_{Ei}$ $\propto$ P/m}\\
Here \emph{N} is the total number of nodes in the network and T\emph{$_{Ei}$} is the time for node \emph{i} to finish its key establishment.

\paragraph*{}In the proposed scheme, the time consumption of key establishment is only depends on the time to get a key seed from the SCH. Other factors like number of nodes, number of node neighbours are not affected because of there is no need to find the shared key. So the time consumption for key establishment is unique even though the number of nodes increases. …show more content…
The shared-key discovery phase takes place after each node has finished finding shared keys with its neighbors. Each node broadcasts a list of identifiers of the keys on its key ring to all its neighbors. Two neighboring nodes will setup a secure link if they share at least one key. However, if two neighboring nodes have no keys in common, they will begin a path key establishment phase with the help of their neighbors. A path key establishment may span one or more hops. If the nodes cannot be reached via a shared key (i.e., one link or one hop), it will take at most two or three hops to contact it. We can find that the time consumption of key establishment under the basis scheme is affected by the following three factors: the number of a node neighbors, the key ring size, and the key pool

Similar Documents

Premium Essay

Nt1330 Unit 1 Lab Report

...transferred and it is dynamically shut down when not in use. D. Energy Consumption In proposed system, a energy-efficient trust model by applying a geographic target nodes to identify trust managers (may save energy due to low storage usage), while implemented an energy watcher to help sensor nodes estimate their neighbor nodes’ energy cost for each packet forwarding and thus enable the selection of the most efficient node as their next hop in the route. Watchdog Frequency Optimization techniques is used to estimate energy consumption of each nodes. Energy watcher using the HWFA algorithm to calculate energy value of each nodes. Depends on this value the files is transfer to the target node. In this model, a sensor node’s transmitter unit to the main node as file request and then the facts can be sends multiple requested node and DBP algorithms to avoid the WSNTS attacks. The source node sends all type of file, and then enters the data sends from source node to destination node over the network. As well as data must be send from source node to intermediate node automatically in this module the data’s are successfully transfer from source to destination without attacks. CONCLUSION In this paper,we adapt dynamic watchdog optimization techniques to mobile WSNs(sensor nodes can move from time to time and thus make their optimal watchdog positions continuously changing).To answer an importantresearch question on whether WSNTS can still maintainsufficient security when the...

Words: 554 - Pages: 3

Premium Essay

Test

...Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure...

Words: 2305 - Pages: 10

Premium Essay

Unknown

...Student Name: | Tiffany Walker | Student Name: | Tiffany Walker | Week 1 – Unit 1 NT1330 – Client-Server Networking II Windows Server 2008 Network Services PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version...

Words: 1730 - Pages: 7