Vikkram R,Rajeshkumar G,Sadesh S,



WSN,One-time dynamic active key,VABEK-I,VABEK-II,AES,


The day to day life billions of data are transferred across the internet using millions of devices. These Transferred data are theft or falsifying the original content by the intermediates when transferred from source to destination. So that data is transferred in a secure manner it does not theft or replicate. In the Virtual active key-based encryption a new idea of one-time active dynamic key is used (i.e.) while information transferred between the source and destination the original data is encoded with this key and the algorithm. A Secure un disclosed or secret key is created and applied to single packet and the different one-time active key is applied for consecutive packets, which is a protected communication context, the information to be sent is encoded with the Advanced Encryption Standard (AES) algorithm. The in-between nodes authenticate the acknowledged data packets if the received packet is untruthful or malicious data transmitted by any intruder such packets are noticed and removedor else the data is transferred to the succeeding node. In this Encryption method, there are two modes of operations that are carried out they are VABEK I and VABEK II [VABEK-Virtual Active Based Encryption Keying]. In VABEK I every node observe their adjacent node and in VABEK II every node arbitrarily chooses the nodes and track them. Thus, the two methods check all units and check those data packets if the data is a malicious one its dropped.


I. Abd-alghafar, I ,Abdullah, B.,., Salama, G. I., Abd-alhafez, A. Performance evaluation of a genetic algorithm-based approach to network intrusion detection system Proceedings of the International Conference on Aerospace Sciences and Aviation Technology 2009 Cairo.

II. Breveglieri, L, Macchetti, M., Atasu, K. Efficient AES implementations for ARM based platforms. In: Symposium on Applied Computing, pp. 841–845. ACM, New York (2004)

III. Chen, H.-H ,Liu, H ,Khanna, R.,.,. Reduced complexity intrusion detection in sensor networks using genetic algorithm Proceedings of the IEEE International Conference on Communications June 2009 152-s2.0-7044948512210.1109/ICC.2009.5199399

IV. Eboka, A. O, Aghware, F. O,Ojugo, A. A.,.,Okonta, O. E., Yoro, R. E.,.Genetic algorithm rule-based intrusion detection system (GAIDS)Journal of Emerging Trends in Computing and Information Sciences 20123811821194.

V. F. Zao ,J. Liu, Y. Zhang, and, “Robust distributed node localization with error management,” in Proceeding of the 7th ACM International Symposium on Mobile Ad-Hoc Networking and Computing 2006.pp. 250–261, Florence, Italy, May 2006.

VI. J. Leonard, D. Moore, , D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements, “in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems 2004, pp. 50–61, November 2004.

VII. K. Gaj and P. Chodowiec, Very compact FPGA implementation of the AES algorithm. 5th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003), pages 319-333,Germany, Sept. 8-10, 2003.

VIII. Lade, S. Dhak, B. S. An evolutionary approach to intrusion detection system using genetic algorithm International Journal of Emerging Technology and Advanced Engineering201222632637.

IX. M. Benaissa. And T. Good AES on FPGA from the fastest to the smallest.7th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005), pages 427-440, Edinburgh, UK, Aug.09-01-2005.

X. M. Rabaey,, C. Savarese, J. and K. Langendoen, “Robust positioning algorithms for distributed ad-hoc wireless sensor networks,” in Proceedings of the 2002 USENIX Annual Technical Conference on General Track, pp. 317–327, USENIX Association, Berkeley, USA, 2002.

XI. N.Reijers,.K.Langendoen “Distributed localization in wireless sensor networks: a quantitative comparison,” Computer Networks, vol. 43, no. 4, pp. 499–518, 2003.

XII. Schwabe, P,Bernstein, D.J. New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. INDOCRYPT 2008. LNCS, vol. 5365, pp. 322–336. Springer, Heidelberg (2008)

XIII. Schwabe, P,Käsper, E.,.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. CHES 2009. LNCS, vol. 5747, pp. 1–17. Springer, Heidelberg (2009)

View Download