You are on page 1of 6

SEMINAR REPORT ON

Energy-efficient and Secure Sensor Data Transmission Using Encompression

Submitted By

ANILKUMAR P Reg No. EWAKEEC014

Department of Electronics & Communication Engineering AWH ENGINEERING COLLEGE, CALICUT, KERALA UNIVERSITY OF CALICUT 2014

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

CERTIFICATE
Certified that this is the bonafide record of the seminar titled

Energy-efficient

and Secure Sensor Data Transmission Using Encompression


Carried out by the under mentioned student

ANILKUMAR P Reg No. EWAKEEC014


In Partial fulfillment of the requirement for the award of bachelor of technology degree of electronics and communication engineering under the University of Calicut during the year 2014 Ms. Aparna k c Assistant Professor and Seminar Coordinator and Head Dept. of ECE AWH Engineering College , Calicut Date: / 01/2014 Ms. Lekha Pankaj Associate Professor Dept. of ECE AWH Engineering College, Calicut Date: / 01/2014

ii

ACKNOWLEDGEMENT
Words will not suffice to express my sincere gratitude to Professor Shahir V K, Principal, AWH Engineering College, for providing me the necessary facilities for the seminar. I express my heartfelt gratitude to Smt. Lekha Pankaj, Associate Professor and Head, Department of Electronics and Communication Engineering for her valuable guidance and moral support throughout the work. I wish to express my sincere thanks to Ms. Aparna K C, Assistant Professor and Seminar Coordinator, Department of Electronics and Communication Engineering for his valuable suggestions and timely help. I would like to thank my family and all my friends for their unending support and motivation Above all, I thank God for giving me strength, courage and blessings to complete this seminar.

ANILKUMAR P

iii

ABSTRACT

Sensor networks are

frequently deployed in

physically insecure

environments and capture sensitive data, making security a paramount challenge. Cryptographic techniques,such as encryption and hashing, are useful in addressing these concerns. However, the use of these schemes greatly increases the energy consumption of sensor nodes and thus shortens their lifetime.To address this challenge, we propose encompression (encryption+ compression) as a strategy to achieve low-energy secure data transmission in sensor networks. Our proposal combines, for the first time, compressive sensing (CS), a powerful and general approach for exploiting sparsity of sensor data, with encryption and integrity checking of the compressively sensed data. While encompression can be realized using any compression technique, CS is particularly well suited since it can be realized with a very low computational and energy footprint that is compatible with the constraints of sensor nodes.We present an evaluation of a hardware implementation of encompression, wherein the CS, encryption, and integrity checking algorithms are realized using a 65-nm CMOS technology. We also present a system-level evaluation of encompression by realizing it in software on a commercial embedded sensor platform and measuring the energy consumption. The evaluation of encompression in hardware shows that, with the use of a reasonable compression ratio of 6-10, encompression results in an energy reduction of 55-65% over a hardware implementation of encryption and integrity checking alone. The system-level evaluation demonstrates that the energy of an application that captures, encompresses, and transmits data is reduced by upto 78% using encompression vs. traditional encryption and integrity checking. Our results also demonstrate that the total sensor node energy consumption with encompression may even be less than the case where neither cryptography nor compression is employed (for a compression ratio of 10, this energy bonus can be upto 14%). These results suggest that the use of CS may be a gamechanger in enabling state-of-the-art cryptography to be employed in highly energy-constrained sensor networks.
iv

CONTENTS
Chapters 1. INTRODUCTION 2. LITERATURE SURVEY 2.1 COMPRESSIVE SENCING 2.1.1 CS TECHNIQUE 2.2 SECURE HASH ALGORITHM (SHA) 2.3 ADVACED ENCRYPTION STANDERD (AES) 3. ENCOMPRESSION IN HARDWARE 3.1 COMPRESSION 3.2 ENCRYPTION 3.3 INTERITY CHECKING 4. HARDWARE IMPLIMENTATION 5. SYSTEM LEVEL EVALUATION 5.1 EXPERIMENTAL SETUP 5.2 SENSOR ENERGY PROFILE 6. CONCLUSION REFERENCES 8 8 10 13 13 13 19 4 5 6 7 3 Page No 1 3

LIST OF FIGURES
Figures Page No

1 ENCOMPRESSION ARCHITECTURE 2 COMPRESSION HARDWARE OVERVIEW

4 6

3 ENERGY REDUCTION FOR HARDWARE IMPLIMENTATION OFENCOMPRESSION 4 EZ430 AP AND AD 5 AD TRASMISSION CURRENT PROFILE 6 ENERGY BONUSES 7 ENERGY OVERHEAD

vi

You might also like