+ All Categories
Home > Engineering > Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

Date post: 07-Apr-2017
Category:
Upload: walchand-college-of-engineeringsangli
View: 275 times
Download: 4 times
Share this document with a friend
39
A SEMINAR ON SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS By DeePak M. Birajdar (2015MCS006) Under the Guidance of Mrs. S.S.Solapure
Transcript
Page 1: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

A SEMINAR ON

SECURE AND EFFICIENT DATA TRANSMISSION

FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS

ByDeePak M. Birajdar (2015MCS006)

Under the Guidance ofMrs. S.S.Solapure

Page 2: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Contents

Introduction Literature review Previous Work Objectives Proposed Work Analysis Conclusion References

Page 3: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Introduction

What is Wireless Sensor Network ? WSN is a Network System that

monitor physical or environmental conditions.

A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes).

Fig Architecture of sensor node

Page 4: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Contd..Types of WSN

Central – Set of node act as source nodes and sink node controls all source nodes.

Hierarchical – The network is grouped into clusters.

Page 5: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Centralized Network

There are two different types of nodes - source node and sink nodes

Page 6: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Hierarchical Network

Fig A Fig B

Page 7: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Clustering In WSN

Every cluster has leader sensor node called Cluster-head (CH).

CH aggregate data by leaf node in cluster send to base station (BS).

Used to achieve the Scalability and management

Maximize node lifetime and reduce the b/w consumption.

Page 8: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

LITERATURE SURVEY

[1]S. Sharma and S.K. Jena, “Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.[2]

Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.

[2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3]

Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.

[3]A. Shamir, “Identity-Based Cryptosystems and SignatureSchemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,[4]

The scheme assumes the existence of trusted key generation centres , whose sole purpose is t o give each user a personalized smart cardwhen he first join the network.

Page 9: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Previous WorkLEACH Protocol [6]

Page 10: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Two Phase of LEACH

Page 11: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

During Set up Phase Sink node broadcast message to all nodes. Node generate random number(RN)

Node have RN<T(n) become Cluster Head

Page 12: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

During Steady-state phase

Broadcasting message to all other node from CH. Node other than CH determine which cluster they belong.

Page 13: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Cluster formation

Leaf node transmit sensed information to CH.

CH then transmit data to sink Node.

Adaptive clustering for energy balancing

Page 14: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Pros and Cons of LEACH

Pros it is Powerful and simple.

Network lifetime increased.

Reduce the traffic on sink node as compare to flat topology.

Page 15: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Cons

Failure of CHs leads to lack of robustness.

Selection of CH is random, which does not consider energy Consumption.

Does not work well in large scale networks.

There is no fixed routing path with less energy Consumption.

Page 16: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Objective

The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.

Page 17: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

SECURE DATA TRANSMISSION PROTOCOLS

Proposed Work

SET-IBS.

Secure and efficient data transmission by using the identity-based digital signature.

SET-IBOOS

Secure and efficient data transmission by using the identity-based online/offline digital signature.

Page 18: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

SET-IBS

Protocol Initialization

Key Management For Security

Protocol Operation

Page 19: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Contd…Protocol Initialization Time is divided into successive time intervals from the TDMA

control. Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH communication

corresponding private pairing parameters are preloaded in the sensor nodes

Page 20: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Use the additively homomorphic encryption scheme in [5] to encrypt the plaintext of sensed data

This scheme allows efficient aggregation of encrypted data at the CHs and the BS

Page 21: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

In the protocol initialization, the BS performs the following operations of key predistribution to all the sensor nodes

Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e) Select a generator P of G1 randomly

Choose two cryptographic hash functions: H, hash function which maps strings to elements in G1, h for mapping arbitrary inputs to fixed-length outputs.

Page 22: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as the network public key

Preload each sensor node with the security parameters

Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )

Page 23: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Key Management leaf sensor node j transmits a message m to its CH i

encrypts the data using the encryption key k from the additively homomorphic encryption scheme [5].

It contain three operation-Extraction-Signature signing-Verification

Page 24: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

ExtractionNode j first obtains its private key as sekj = ┬ H(Idj || tj )

Signature signing The sensor node j picks a random number αj € Z* and compute θj =e(P,P) αj

Sensor node computecj =h(Cj || tj || θj )

бj = cj sekj + αj P

Where< бj || cj > is the digital signature of node j on theencrypted message Cj.

Page 25: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Verification Upon receiving the message, each sensor node verifies

the authenticity

It checks the time stamp of current time interval tj

if the time stamp is correct, the sensor node further computes

using the time stamp of current time interval tj.

Page 26: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

the formula below if the received message is authentic

If h( Cj || tj || θj’ )= h( Cj || tj || θj )= cj then considered message is authentic.

If the verification above fails then considered message is not authentic.

Page 27: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Protocol Operation After the protocol initialization and key management for security

, SET-IBS operates in round during communication

Each round consist two phases Setup Phase Stedy -State Phase

Page 28: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks
Page 29: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

SET-IBOOS To reduce the computation and storage costs of signature signing

processing in the IBS scheme, we improve SET-IBS by introducing IBOOS for security in SET-IBOOS

The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency

Protocol Initialization – It is similar to that of SET-IBS

Key Management For Security

Protocol Operation

Page 30: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Key Management

Extraction

offline signing

Online signing

Verification

Page 31: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Extraction:- Same as that in the IBS scheme.

Offline Signing store the knowledge for signing online signature when it sends the

message ,node j generates the offline value < б^j>

Online Signing :- Node j computes the online signature < б^

j, Zj> based on the encrypted data Cj and the offline signature б^

j

online signature, in the form of

< Idj, tj, Rj , б j ,Zj, Cj>

Verification : Upon receiving the message, each sensor node verifies the authenticity It checks the time stamp of current time interval tj

Page 32: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Operation

Page 33: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Analysis

Results demonstrate that the proposed SET IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process

Page 34: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Security Analysis Attack Models

Passive Attacks on Wireless Channel

Active Attacks on Wireless ChannelSinkholebogus and replayed routing information attack

Page 35: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Solutions to Attacks

Passive Attacks - The sensed data are encrypted by the homomorphic encryption scheme from [5], which deals with eavesdropping.

Active Attack - attackers do not have valid digital signature.

Page 36: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Applications

Page 37: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Conclusion

The main goal is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks

The protocols SET-IBS have better performance than the existing secure protocols for CWSN.

Page 38: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Future Scope

• Reduces the computational overhead for protocol security.

• To maximize the life time of sensor nodes.

• To provide more secure way of data transmission in WSN.

Page 39: Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Networks

Refrences[1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani

IEEE Transactions on Parallel and Distributed Systems.

[2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.

[3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007

[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,

[5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005.

[6] Wireless Sensor Network Remote Triggered  Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation, Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1


Recommended