A SEMINAR ON
SECURE AND EFFICIENT DATA TRANSMISSION
FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS
ByDeePak M. Birajdar (2015MCS006)
Under the Guidance ofMrs. S.S.Solapure
Contents
Introduction Literature review Previous Work Objectives Proposed Work Analysis Conclusion References
Introduction
What is Wireless Sensor Network ? WSN is a Network System that
monitor physical or environmental conditions.
A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes).
Fig Architecture of sensor node
Contd..Types of WSN
Central – Set of node act as source nodes and sink node controls all source nodes.
Hierarchical – The network is grouped into clusters.
Centralized Network
There are two different types of nodes - source node and sink nodes
Hierarchical Network
Fig A Fig B
Clustering In WSN
Every cluster has leader sensor node called Cluster-head (CH).
CH aggregate data by leaf node in cluster send to base station (BS).
Used to achieve the Scalability and management
Maximize node lifetime and reduce the b/w consumption.
LITERATURE SURVEY
[1]S. Sharma and S.K. Jena, “Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.[2]
Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.
[2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3]
Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.
[3]A. Shamir, “Identity-Based Cryptosystems and SignatureSchemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,[4]
The scheme assumes the existence of trusted key generation centres , whose sole purpose is t o give each user a personalized smart cardwhen he first join the network.
Previous WorkLEACH Protocol [6]
Two Phase of LEACH
During Set up Phase Sink node broadcast message to all nodes. Node generate random number(RN)
Node have RN<T(n) become Cluster Head
During Steady-state phase
Broadcasting message to all other node from CH. Node other than CH determine which cluster they belong.
Cluster formation
Leaf node transmit sensed information to CH.
CH then transmit data to sink Node.
Adaptive clustering for energy balancing
Pros and Cons of LEACH
Pros it is Powerful and simple.
Network lifetime increased.
Reduce the traffic on sink node as compare to flat topology.
Cons
Failure of CHs leads to lack of robustness.
Selection of CH is random, which does not consider energy Consumption.
Does not work well in large scale networks.
There is no fixed routing path with less energy Consumption.
Objective
The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
SECURE DATA TRANSMISSION PROTOCOLS
Proposed Work
SET-IBS.
Secure and efficient data transmission by using the identity-based digital signature.
SET-IBOOS
Secure and efficient data transmission by using the identity-based online/offline digital signature.
SET-IBS
Protocol Initialization
Key Management For Security
Protocol Operation
Contd…Protocol Initialization Time is divided into successive time intervals from the TDMA
control. Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH communication
corresponding private pairing parameters are preloaded in the sensor nodes
Use the additively homomorphic encryption scheme in [5] to encrypt the plaintext of sensed data
This scheme allows efficient aggregation of encrypted data at the CHs and the BS
In the protocol initialization, the BS performs the following operations of key predistribution to all the sensor nodes
Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e) Select a generator P of G1 randomly
Choose two cryptographic hash functions: H, hash function which maps strings to elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as the network public key
Preload each sensor node with the security parameters
Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
Key Management leaf sensor node j transmits a message m to its CH i
encrypts the data using the encryption key k from the additively homomorphic encryption scheme [5].
It contain three operation-Extraction-Signature signing-Verification
ExtractionNode j first obtains its private key as sekj = ┬ H(Idj || tj )
Signature signing The sensor node j picks a random number αj € Z* and compute θj =e(P,P) αj
Sensor node computecj =h(Cj || tj || θj )
бj = cj sekj + αj P
Where< бj || cj > is the digital signature of node j on theencrypted message Cj.
Verification Upon receiving the message, each sensor node verifies
the authenticity
It checks the time stamp of current time interval tj
if the time stamp is correct, the sensor node further computes
using the time stamp of current time interval tj.
the formula below if the received message is authentic
If h( Cj || tj || θj’ )= h( Cj || tj || θj )= cj then considered message is authentic.
If the verification above fails then considered message is not authentic.
Protocol Operation After the protocol initialization and key management for security
, SET-IBS operates in round during communication
Each round consist two phases Setup Phase Stedy -State Phase
SET-IBOOS To reduce the computation and storage costs of signature signing
processing in the IBS scheme, we improve SET-IBS by introducing IBOOS for security in SET-IBOOS
The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency
Protocol Initialization – It is similar to that of SET-IBS
Key Management For Security
Protocol Operation
Key Management
Extraction
offline signing
Online signing
Verification
Extraction:- Same as that in the IBS scheme.
Offline Signing store the knowledge for signing online signature when it sends the
message ,node j generates the offline value < б^j>
Online Signing :- Node j computes the online signature < б^
j, Zj> based on the encrypted data Cj and the offline signature б^
j
online signature, in the form of
< Idj, tj, Rj , б j ,Zj, Cj>
Verification : Upon receiving the message, each sensor node verifies the authenticity It checks the time stamp of current time interval tj
Operation
Analysis
Results demonstrate that the proposed SET IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
Security Analysis Attack Models
Passive Attacks on Wireless Channel
Active Attacks on Wireless ChannelSinkholebogus and replayed routing information attack
Solutions to Attacks
Passive Attacks - The sensed data are encrypted by the homomorphic encryption scheme from [5], which deals with eavesdropping.
Active Attack - attackers do not have valid digital signature.
Applications
Conclusion
The main goal is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks
The protocols SET-IBS have better performance than the existing secure protocols for CWSN.
Future Scope
• Reduces the computational overhead for protocol security.
• To maximize the life time of sensor nodes.
• To provide more secure way of data transmission in WSN.
Refrences[1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems.
[2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
[3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,
[5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005.
[6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation, Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1