Sign In to Follow Application
View All Documents & Correspondence

Intrusion Time Based Cryptographic Key Generation For Wireless Sensor Network Security

Abstract: INTRUSION-TIME-BASED CRYPTOGRAPHIC KEY GENERATION FOR WIRELESS SENSOR NETWORK SECURITY The present invention relates to a system for secure communication in sensor networks using a dynamic, time-based security key generation mechanism triggered by intrusion detection. Conventional cryptographic key generation methods often rely on static or biometric parameters, which are vulnerable to compromise. The proposed system enhances security by generating a unique security key based on the exact timestamp of the detected intrusion or anomalous activity, combined with a source of cryptographic entropy. The generated key is used to secure communication between the sensor node and a base station, and is discarded after a single session. This time-driven, event-specific key generation approach ensures high randomness, resists replay and brute-force attacks, and is well-suited for resource-constrained environments such as wireless sensor networks.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
02 June 2025
Publication Number
24/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

SR UNIVERSITY
ANANTHSAGAR, HASANPARTHY (M), WARANGAL URBAN, TELANGANA - 506371, INDIA

Inventors

1. MR. GOTTE RANJITH KUMAR
H.NO.4-23 AMUDALAPALLY, KESHAVAPATNAM, KARIMNAGAR, TELANGANA, INDIA-50570
2. SRAVAN KUMAR GURRAM
H.NO: 10-17/1/A VILL: KONDAGATTU (MUTHYAMPETA) MANDAL: MALLIAL DIST: JAGTIAL TELANGANA, INDIA
3. BUNGA SEKHAR
HNO 1-5-1115/216/20. PENTHOUSE. PANCHASHEELA ENCLAVE ROAD NO 9, OPP PRAGATI SHEEL ARCH ALWAL HILLS. SECUNDERABAD 500010.
4. YEDLLA SATYAM
VI: PEDDAMPET MDL RAMAGIRI DIST: PEDDAPALLY

Specification

Description:FIELD OF THE INVENTION
This invention relates to Intrusion-Time-Based Cryptographic Key Generation for Wireless Sensor Network Security
BACKGROUND OF THE INVENTION
Now a day information security is the major challenging task in wireless network. Cryptographic security-key plays a crucial role in securing information. This model helps to generate security-key randomly base on intruder detection time. Random key generation prevents key compromise
SUMMARY OF THE INVENTION
This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the invention.
This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
Latest security-key generation algorithms like physical-layer based key generation algorithm, Elliptic Curve Cryptography based key generation algorithm and electrocardiogram (ECG)-based cryptographic key generation algorithm. These techniques generates key based on the static parameters, which compromised. Proposed invention is suitable for intruder detection. Detected data will be sent to base station in sensor network. This transfer will be secured with detected time based security key, which will generated randomly based on detected time. The randomness in combination with cryptographic entropy will prevent attack on security-key.
BRIEF DESCRIPTION OF THE DRAWINGS
The illustrated embodiments of the subject matter will be understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and methods that are consistent with the subject matter as claimed herein, wherein:
FIGURE 1: SYSTEM ARCHITECTURE
The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION OF THE INVENTION
The detailed description of various exemplary embodiments of the disclosure is described herein with reference to the accompanying drawings. It should be noted that the embodiments are described herein in such details as to clearly communicate the disclosure. However, the amount of details provided herein is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosure as defined by the appended claims.
It is also to be understood that various arrangements may be devised that, although not explicitly described or shown herein, embody the principles of the present disclosure. Moreover, all statements herein reciting principles, aspects, and embodiments of the present disclosure, as well as specific examples, are intended to encompass equivalents thereof.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a",” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
In addition, the descriptions of "first", "second", “third”, and the like in the present invention are used for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" and "second" may include at least one of the features, either explicitly or implicitly.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Latest security-key generation algorithms like physical-layer based key generation algorithm, Elliptic Curve Cryptography based key generation algorithm and electrocardiogram (ECG)-based cryptographic key generation algorithm. These techniques generates key based on the static parameters, which compromised. Proposed invention is suitable for intruder detection. Detected data will be sent to base station in sensor network. This transfer will be secured with detected time based security key, which will generated randomly based on detected time. The randomness in combination with cryptographic entropy will prevent attack on security-key.
Code:
// C++ code
//
int a=0,b=0;
unsigned long my_time;
long randomnum;
void setup()
{
Serial.begin(9600);
pinMode(13, OUTPUT);
}

void loop()
{
a=analogRead(A0);
b=map(a,0,1023,0,255);
//Serial.println(b);
if(b>100)
{
Serial.println("--------------------------------------------------------");
Serial.println("motion detected at");
Serial.print("DT = ");
my_time = millis();
Serial.print(my_time );Serial.println(" milliseconds ");
randomnum = random(1,my_time );
Serial.println("RANDOM VALUE FROM 1 TO DETECTED TIME IS SECURITY KEY");
Serial.print ("SECURITY KEY Rn = ");
Serial.println(randomnum);
Serial.println("--------------------------------------------------------");
delay(5000);

}

//digitalWrite(LED_BUILTIN, HIGH);
//delay(1000); // Wait for 1000 millisecond(s)
//digitalWrite(LED_BUILTIN, LOW);
// delay(1000); // Wait for 1000 millisecond(s)
}

Security key:
--------------------------------------------------------
motion detected at
DT = 34902 milliseconds
RANDOM VALUE FROM 1 TO DETECTED TIME IS SECURITY KEY
SECURITY KEY Rn = 16808
--------------------------------------------------------

NOVELTY:
Sensor node in wireless sensor network will implement randomness with cryptographic entropy to secure security-key. This is useful in intrusion detection system compared to existing algorithms.


, Claims:1. A sensor node configured for secure communication in a wireless sensor network, comprising: a key generation module, a communication module, a time capture module and a detection module.
2. The system as claimed as claim 1, wherein the generated security key is used for a single communication session and discarded thereafter.
3. The system as claimed as claim 1, wherein the communication module configured to transmit data securely to a base station using the generated security key.
4. The system as claimed as claim 1, wherein the time capture module configured to record a timestamp of the detected event.
5. The system as claimed as claim 1, wherein the detection module configured to identify an intrusion or anomalous event

Documents

Application Documents

# Name Date
1 202541053368-STATEMENT OF UNDERTAKING (FORM 3) [02-06-2025(online)].pdf 2025-06-02
2 202541053368-REQUEST FOR EARLY PUBLICATION(FORM-9) [02-06-2025(online)].pdf 2025-06-02
3 202541053368-POWER OF AUTHORITY [02-06-2025(online)].pdf 2025-06-02
4 202541053368-FORM-9 [02-06-2025(online)].pdf 2025-06-02
5 202541053368-FORM FOR SMALL ENTITY(FORM-28) [02-06-2025(online)].pdf 2025-06-02
6 202541053368-FORM 1 [02-06-2025(online)].pdf 2025-06-02
7 202541053368-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [02-06-2025(online)].pdf 2025-06-02
8 202541053368-EVIDENCE FOR REGISTRATION UNDER SSI [02-06-2025(online)].pdf 2025-06-02
9 202541053368-EDUCATIONAL INSTITUTION(S) [02-06-2025(online)].pdf 2025-06-02
10 202541053368-DRAWINGS [02-06-2025(online)].pdf 2025-06-02
11 202541053368-DECLARATION OF INVENTORSHIP (FORM 5) [02-06-2025(online)].pdf 2025-06-02
12 202541053368-COMPLETE SPECIFICATION [02-06-2025(online)].pdf 2025-06-02