secure and efficient data transmission for cluster-based wireless sensor networks
TRANSCRIPT
SECURE AND EFFICIENT DATA TRANSMISSION FORCLUSTER-BASED WIRELESS SENSOR NETWORKS
Secure data transmission is a critical issue for wireless sensor networks (WSNs).
Military applications are examples.
Clustering is an effective and practical way to enhance the system performance
of WSNs.
Clusters are formed dynamically and periodically.
INTRODUCTION
RAW DATA
ENCRYPTION
CIPHER DATA
RAW DATA
DECRYPTION
CLUSTERING
SYMMETRIC KEY DISTRIBUTION
• In symmetric key cryptography, both parties must possess a common secret key which they must exchange prior to using any encryption. • Distribution of secret keys has been problematic until
recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. • The first two are often impractical and always unsafe, while
the third depends on the security of a previous key exchange.
ASYMMETRIC KEY DISTRIBUTION
• In asymmetric key cryptography, encryption is done with a key and decryption is done using another.• Asymmetric key distribution is a better option to enhance the
security than symmetric key distribution.• Here, we use the concept of asymmetric key distribution.
PROTOCOLS
We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs:• SET-IBS - Identity-Based digital Signature (IBS).• SET-IBOOS - Identity-Based Online/Offline digital Signature
(IBOOS).
CURRENT SCENARIO
LEACH protocol is used.
Symmetric key distribution.More likely to compromise the security.
PROPOSED SYSTEM - ADVANTAGES
• SET Protocol- IBS and IBOOS.
• Asymmetric key management for security.
• Digital Signature concept- prevents against mock sender.