• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Efficiency analysis of public key management scheme for wsn using TinyOS
 

Efficiency analysis of public key management scheme for wsn using TinyOS

on

  • 1,297 views

Efficiency analysis of public key management scheme for wsn using TinyOS

Efficiency analysis of public key management scheme for wsn using TinyOS

Statistics

Views

Total Views
1,297
Views on SlideShare
1,297
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
1

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Efficiency analysis of public key management scheme for wsn using TinyOS Efficiency analysis of public key management scheme for wsn using TinyOS Presentation Transcript

    • Efficiency Analysis of public key management scheme for WSN on TinyOS
    • Introduction to WSN
      A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations.
      Characteristics of WSN
      Very Limited Resources
      Unreliable Communication
      Unattended Operation
    • Introduction to TinyOS
      It is a free and open source component-based operating system and platform targeting wireless sensor networks (WSNs). TinyOS is an embedded operating system written in the nesC programming language as a set of cooperating tasks and processes.
      It provides interfaces and components for common abstractions such as packet communication, routing, sensing, actuation and storage.
      Its main methodology is “hurry up and sleep” , this way it can save power.
    • KEY MANAGEMENT
      Key management deals with the secure generation, distribution, and storage of keys. Secure methods of key management are extremely important.
      Goals of key management:
      The protocol must establish a key between all sensor nodes that must exchange data securely.
      Node addition / deletion should be supported.
      It should work in undefined deployment environment.
      Unauthorized nodes should not be allowed to establish communication with network nodes.
    • Public key-based key management
      In this scheme there is a Key pair for each node i.epublic+private
      Each node will have its own public and private keys. Public key can be known via sending message but private is not. Private key is confidential and used to exchange the data securely.
      Pre-load all pair-wise keys
      Each two nodes can compute unique pair wise key from their public and private values.
      Each node needs to store (n-1) keys in its memory for n nodes in network.
    • Pre-Load Distribution Key
      All nodes will have preloaded keys. Basestation will communicate to all nodes via different keys which is already loaded in all nodes i.e all nodes will have a pool of keys and every communication will be carried out with that key on which two nodes will agree on common key from pool of keys.
      5
      4
      6
      Base station
      0
      3
      7
      2
      8
      1
    • Process
      Step 1:Basestation will send a key from a pool of keys to node i which is encrypted by common network key.
      Step 2:Node i will receive the message and decrypt the message using network key.
      Step 3:After that, node i match the decrypted key in its pool of keys. If node i find a match of received key and it is free i.e it is not paired with any other node then it will mark that key as paired with basestation.
      Step 4:If node i doesn’t find a match or key is not free then it send failure message to BS.
    • Step 4:If node i find match then node i will send success message to BS then BS will paired that key with node i in its pool of key.
      Step 5:If BS receive a failure message then it will send another free key from pool of key to node i until it is not receiving the success message.
      BS
      Node i
      A1 2
      A2 -1
      A3 -1
      A4 -1
      A5 -1
      A6 -1
      A1 -1
      A2 -1
      A3 -1
      A4 -1
      A5 -1
      A6 -1
    • Process of Public key-based key management
      • each side of the communication generates a private key(letter A).
      • Each side then generates a public key (letter B), which is a derivative of the private key.
      • The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
      • The Diffie-Hellman protocol generates “shared secrets” – identical cryptographic key shared by each side of the communication.
    • Work Completed till now
      TinyOS Installation & setting its Environment Variables.
      WSN network is simulated in TOSSIM simulator with tinyvizgui.
      Tossim simulates nesC applications.
    • Simulating public-key management scheme
      Calculating energy consumption per node in the scheme
    • Work to be done
      Efficiency Analysis
      1 Pair wise key distribution
      let number of total steps in finding and distributing key for node pair is =m
      Active + Sampling 0.0037 J/sample
      then energy consumption will be = m*0.0037J
      Space Requirement = N-1 keys per node (N is total no of nodes)
      2 Public key-based
      let number of total Steps in calculating the public and private key for node i is = n
      now the energy consumption will be = n*0.0037J
      Space requirement = 2 keys per node
    • After calculating the energy of both public key and pre-load key for different number of nodes we will plot the energy Vs node graph for a n node system which will clearly show the efficient key management scheme. to be calculatedEnergy
      per node