SlideShare a Scribd company logo
1 of 17
Security Support in In-Network
      Processing in WSN
Introduction to Zigbee (IEEE 802.15.4)
These networks are Wireless Personal Area Networks (WPANs) that are defined by a low data rate,

long battery life, and secure networking. Zigbee networks support automation and remote control.

Zigbee exist in mac & physical layer Qualnet (i.e. network sensor library, supporting Zigbee )

The following are capabilities included in the QualNet 4.5 Sensors Network Library:

• Generating network beacons if the deviceis a coordinator

• Synchronizing to the beacons

• Personal Area Network (PAN) association and disassociation

• Carrier Sense Multiple Access with Collision avoidance (CSMA-CA) for channel access

• Energy detection (ED) within the current channel

• Battery model and RF energy consumption model

• Link Quality Indication (LQI) for received packets

• Modulation schemes:

• O-QPSK with DSSS @ 2.4 GHZ, 868/915 MHz

• BPSK with DSSS @ 868/915 MHz

• PSSS with BPSK and ASK @ 868/915 MHz




Handling Security in In-Network Processing in WSN.
Benefits of In-Network Processing

1. Improved Scalability – reduction of data through aggregation

2. Prolonged Lifetime - less communication overhead due to aggregation.

3. Increased Versatility – easy dissemination of commands

Two types of In-Network Processing

1. upstream - aggregation of data send by nodes to aggregator & base station

2. downstream – disemination of commands from aggregator & base station to leaf nodes
Objectives

Handling security issues such as DOS attacks, eavesdropping, tampering, physical compromise of nodes in both.

1. Secure Data Aggregation - authentication of reported data by aggregators send by nodes.

    2. Secure Data Assemination - authentication of commands by nodes send by aggregators

Aggregators functions

            1. dissemination of commands

            2. aggregation of data
            3. create & dissolve subgroups



3 issues in Delegating trust to Aggregators.
                    1. Nodes & aggregators should understand & identify their sensor group.
                    2. Aggregators can disseminate commands that are trusted by nodes
                    3. nodes can send trusted data to aggregators
Delegation of Authorization
It is a technique used by base station to delegate aggregators for a limited period of time.

Motive is to distinguish between commands originating from aggregators of particular sensor group &
malicious node

Two mechanisms proposed

    1. One-way hash chain
    2. µtesla protocol




    1. One-way hash chain (OHC).

It is generated by one-way hash function F which satisfies following properties:

(I) Given x it is easy to compute y such that y = F(x).

(II) Given y it is computationally infeasible to compute x.

an OHC is a sequence no. K0,K1,... Kn-1,Kn

for all j such that 0 < j < = n Kj-1 = F(Kj)

To delegate trust to aggregators, base station creates separate hash chains for each aggregator.

OHCi : Oim, Oim-1 ….. Oi0

for each sensor group SGi

Oim is send to the aggregator & Oi0 is send to every other node in the sensor group SGi.

Kth packet send by agi includes Oik. .& Fk(Oik) = Oi0 which is calculated by receiving node.

2. µtesla protocol

It is improvement over one-way hash chain. This protocol requires that the base station & nodes

are loosely time synchronized, & each node knows the upper limit of maximum synchronization error.
Sender of broadcast packets maintains a one-way hash chain .

(K0,K1,... Kn-1,Kn ) & each sensor node is configured with K0.

The base station broadcasts a list containing < SGi.,,agi, Oi0, ri> for each sensor group SGi to all the nodes in
the network.



In these protocols, if a aggregator is compromised, then it is confined to its own sub-group.
Lightweight Shared Secret Key Establishment

Privacy & secrecy of data transfer is maintained between nodes & aggregator by using a separate pairwise
secret key. It is called a subkey of sensor node. It can defend sybil attack.

Ks,r = G(Ks,r)

Ks,r = subkey

Ks = unique secret custom key which is preconfigured in sensor nodes & shared with base station only

r = random no.



Subkey is distributed in 3 step process:

                   1. Base Station chooses a random no. for each sensor group & creates subkey for each
                      node in that sub group. Then it broadcasts that random no. using utesla protocol.
                   2. Base Station sends encrypted unicast message to each aggregator that contains subkey
                      for all sensor nodes in the sensor group of that aggregator.
                   3. Aggregator sends a unicast message to each sensor nodes after which sensor node can
                      identify its sensor group.

Efficient secure broadcasts in a small group : Ripple Key
Ripple command dissemination is a method within a sensor group that doesn't rely on unicast messages, and
doesn't require time synchronization. SG is divided into layers called ripples. Ripples is defined as set of all
nodes that are at the same distance (no. of hops) from the ag. .

For each ripple a secret ripple key (Krj) is generated that is shared between ag & members of ripple.

To disseminate commands, ag sends a separate ripple message for each ripple in the group.

Assumption : distance of farthest node from ag is 5 hops or less.

Advantages:

   1. No need of time synchronization among sensor nodes.
   2. No unicast message to each node.

Disadvantages:

   1. Ag sends same command multiple times for each ripple.
   2. Subject to rushing attack
   3. Too many layers makes the method inefficient.
Building A Secure Hierarchical WSN : An Integrated Solution

There are four rounds present in building secure hierarchical WSN.



Round 0 (Preparation)
The BS discovers the topology of the complete sensor network & perform some initial preparation Secure
Routing protocol such as INSENS. It provides following functionalities:

   1. Discovering Topology of WSN
   2. Building routing tables in the presence of attacks such as tampering with data, DOS etc

The BS configures hierarchical network by dividing it into sensor groups and choosing ag for each group.

Round 1 (Group Announcement)
BS uses delegation of authorization to mechanism to inform each node the identity of sensor groups such as
ag's id, initial sequence no., random no. to generate subkey by broadcasting message.

µtesla protocol protects authenticity & integrity of message.

After receiving message each node can verify that whether it is from BS or contents of the message is
tampered. At the end of round each node has the complete list of sensor groups in the WSN but still it
doesn't knows which group does it belongs to.

Round 2 (Trust Commitment)
The BS sends all information that an ag needs to build a secure sensor such as internal routing information,
one-way hash chain & the subkeys of member nodes.

At first for each sensor group BS generates subkey for each member node

BS then sends unicast message to the aggregator. This message includes

<topologyi,ohci,ri,key_listi>.

Topology contains all connectivity information among the nodes

ohc is one-way hash chain that the ag will use.

key_list is the entire key_list that BS creates for the nodes in that group.
Round 3 (Building each Sensor Group)
This round provides 4 piece of information to each node in a sensor group.

   1.   The sensor group it belongs to
   2.   Its forwarding table for sending & routing data
   3.   The pairwise shared key it shared with the ag
   4.   The ripple key of the ripple it belongs to

Since the ag has the sensor group topology information, it can compute paths & routing table for each
member node by using Breadth-First Search Algorithm.

To securely send this information to member nodes, ag sends two unicast message in breadth first manner.

1st message contains – <Oi1,agi,ri,MAC>

It tells the node its sensor group & subkey that it shares with ag.

2nd message contains - <fts,KRj>

ft is forwarding table of the node.

KR is ripple key of that node.

Now each sensor node can send its data securely to ag using its subkey Ks,r.




Performance Evaluation
1. Network setup overhead
A WSN can be divided in level of hierarchies such as each top level hierarchy can be further divided into 2nd
level hierarchy & each 2nd level hierarchy can be divided into 3rd level hierarchy & so on.

The overall network overhead increases with the no. of levels & hence no. of sensor groups. Network
overhead increases in Round 1 & 2 & decreases in round 3 with increasing no. of levels.

The reason for increase in network overhead in round 1 is round 1 is repeated for each layer (µtesla
broadcast).

The reason for increase in network overhead in round 2 is increase in the no. of sensor groups as BS sends
unicast message to ag.s at level 1 then ag.s at level 2.

The reason for decrease in network overhead in round 3 is as the no. of sensor group increases the no. of
nodes in each SG decreases.

The overall network setup overhead is relatively small.
2. In-Network Processing Performance
By experiments it is concluded that in-network processing results in a significant reduction in the no. of
packets exchanged. While the overhead due to initial network setup results in more packets being exchanged
at first in multi-level hierarchy compared to no hierarchy

In-network processing consumes less network bandwidth after just a small no of sensor reports.

Another observation is that by increasing the no. of levels, the no. of packets exchanged decreases.




3. Aggregator Storage Requirement
An aggregator needs to store ripple keys,subkeys, one-way hash chain & topology information of its sensor
groups. Memory requirement for one-way hash chain is small as not all values is to be stored. All less no. of
ripples keys storage is required. But storage requirement of subkeys & topology increases with the size of
sensor group. By conducting experiments we conclude that storage requirement for storing shared pairwise
keys & topology information increases linearly with group size.
4. Aggregator Command dissemination
There are two mechanism aggregator can use to send command to all nodes

1 . µtesla

2 . Ripple Keys

These two approaches incur much less overhead than unicast approach. The ripple key approach
outperforms µtesla for small network size. Thus ripple key approach requires small no. of packets exchange
than µtesla. Also ripple key doesn't require time synchronization & suffer from delay key release. If group
size is large µtesla results in small no. of packet exchanged.



5. Resource requirements for cryptographic Algorithms.
One-way hash chain & Message Authentication Codes (MAC) can be generated using RC5 on berkeley
motes. Motes have 4Mhz processor with 128k flash memory, 4k RAM and RFM monolithics TR 1000 radio
at 19.2kbps. We use standard CBC mode to generate MAC.

Experiments shows that computation & memory requirement for cryptographic algorithms needed to build
WSN supporting in-network processing is fairly low. It can be easily supported by current sensor nodes such
as motes. cryptographic algorithms take about 2k flash memory & 264 bytes of RAM for data storage .
Analysis of Key Management in Wireless
           Sensor Networks
Introduction:

WSNs come in two flavours: distributed networks and hierarchical networks. In a
hierarchical wireless sensor network (HWSN), three types of devices exist: a base station,
several cluster heads, and a multitude of sensor nodes. The sensor node can be considered
the “worker bees” of the network, whereby they diligently collect data representing various
characteristics of its surrounding atmosphere.



Pair-wise key management schemes:

      All pair wise (Single master key):

      The most trivial solution in terms of resource usage. All nodes are deployed with a
      single master key. Problems: Since an adversary may capture a node and compromise
      the key very easily, it has very low resilience. This scheme is not recommended for
      much more than a test system.



      All pair-wise (Distinct pair-wise keys):

      Each node stores all possible pairs in the WSN. For a network of size N, Node Si stores
      a unique pair-wise key for each one of N-1 sensor nodes in the WSN . However, not
      all N-1 keys have to be stored in a nodes’ key-chain to have a adequate connectivity.
      The storage burden is high for each sensor node but resilience is much better than
      “single master key”.



      Random pair-wise key scheme:

      Each sensor node is given a random set of Np pair-wise keys. This gives a probability
      p that two nodes can connect. “At key setup phase, each node identity is matched
      with Np other randomly selected node IDs with probability p” . For each matched
      pair of nodes a pair-wise key is generated. The key is then stored in both nodes’ key-
      chain along with an ID of other node. 2Np units of memory are use in each node to
      store the complete keychain. During the shared-key discovery phase, all nodes
      broadcast their ID. As a result, each node sends and receives one message from the
      other nodes within its radio range .
Closest pair-wise keys pre-distribution scheme:

In this scheme Location information is used to improve the key connectivity. Sensor
nodes are deployed in a two dimensional area similar to a grid. All sensors locations
are predicted by a setup server. Each sensor shares pair-wise keys with its c closest
neighbors. In the key setup each sensor node SA is given a unique key KA and a set
“c” of it’s closest neighbors SB1, . . . , SBc are selected. For each pair (SA, SBi), a pair-
wise key KA,Bi = PRF(KBi |IDA) is generated. All these pair-wise keys and Ids makeup
the keychain of SA, Node SBi only stores the key KBi and the PRF. Each sensor uses
2c+1 units of memory to store its key-chain [3][4]. This scheme makes deployments
of new nodes easier, decreases memory usage, and has good key connectivity if
deployment errors are kept low.




ID based one-way function scheme (IOS):

This scheme is based on a connected r-regular graph G of the expected deployment.
The graph is composed of star-like sub graphs. The sub graphs are used to distributed

the pair-wise keys to the appropriate nodes. Each sensor node is the center of one
star-like graph and a leaf of r/2 star-like sub graphs. Each node uses r + 1 units of
memory to store keys and key IDs . Very good key resilience.



Multiple IOS:

Multiple IOS is meant to improve the scalability of ID based one-way function scheme
(IOS). Every node in graph G corresponds to l nodes SA =SA1, . . . , SAl. Each sensor
node SAi stores a common key KA and a secret Hash(KB|IDAi). Every node SBj in the
class of node SB, can use common key KB to generate the secret Hash(KB|IDAi) for
node SAi [3][4]. Memory usage decreases by a factor of l.



Broadcast session key negotiation protocol (BROSK):

A single master key is pre-deployed to all sensor nodes. Sensor node pairs (Si, Sj) then
exchange randomnonce values. The master key Km is used to establish session key
Ki,j = PRF(Km|RNi|RNj). Only one unit of memory is used (by each node) to store the
master key. If the master keyis compromised, then all links are compromised
therefore the scheme has very low resilience .




       Protocols for Distributed Key Management in Clustered

                            Wireless Sensor Networks




Aim: To provide security to one-to-all and one-to-one communication
In WSN.



Related Terms:



Rekey Interval, Periodic Rekeying , Rekeying with Cluster Dynamics:

The Rekey Interval can be defined as the period with which encryption key of a node
is changed to a new one. If the network topology does not change within the rekey
interval, the new key can be easily distributed to all the nodes by encrypting it with
the existing key. Each node decrypts the new key using the existing key and
designates the new key as its current key. This way of rekeying is called Periodic
Rekeying. If the network topology changes within the rekey interval due to joining of
new nodes or leaving of existing nodes, then the rekeying method applied at this
time is called Rekeying with Cluster Dynamics.




Key Management Protocols:

The aim of the key management protocols is to provide security to all the one-to-all
and one-to-one data communications. This requires formation of a network wide key
shared by all members of the network, pair-wise keys shared between every Cluster
Head and a cluster member and a Cluster key shared by all members of each cluster.
We assume that in a WSN there are one or more clusters. Each cluster is having a
Cluster Head decided by the HEED algorithm. The Cluster Head has a share a pair-
wise key with each of its cluster members.




                    Notations in the Key Management Protocols
Initial key distribution protocol


Initial cluster key distribution protocol:




Initial Network Key Distribute protocol:
Security Support in In-Network  Processing & analysis of key management in  WSN

More Related Content

What's hot

Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksIDES Editor
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...IDES Editor
 
Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPvanhoefm
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Ambreen Zafar
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 
Practical Verification of TKIP Vulnerabilities
Practical Verification of TKIP VulnerabilitiesPractical Verification of TKIP Vulnerabilities
Practical Verification of TKIP Vulnerabilitiesvanhoefm
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting systemQuang Do
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leachcsandit
 

What's hot (18)

Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
 
Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIP
 
Ip trace ppt
Ip trace pptIp trace ppt
Ip trace ppt
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)
 
L2 tp
L2 tpL2 tp
L2 tp
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
Practical Verification of TKIP Vulnerabilities
Practical Verification of TKIP VulnerabilitiesPractical Verification of TKIP Vulnerabilities
Practical Verification of TKIP Vulnerabilities
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 

Viewers also liked

Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for securitySwamy Vivekananda
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

Viewers also liked (19)

Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Projet MQTT
Projet MQTTProjet MQTT
Projet MQTT
 

Similar to Security Support in In-Network Processing & analysis of key management in WSN

SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkBADALKUMAR56
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
Automotive bus technologies
Automotive bus technologiesAutomotive bus technologies
Automotive bus technologiesRadwa Tarek
 

Similar to Security Support in In-Network Processing & analysis of key management in WSN (20)

SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
I017355767
I017355767I017355767
I017355767
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
I04503075078
I04503075078I04503075078
I04503075078
 
J1803056876
J1803056876J1803056876
J1803056876
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor network
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Automotive bus technologies
Automotive bus technologiesAutomotive bus technologies
Automotive bus technologies
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 

Security Support in In-Network Processing & analysis of key management in WSN

  • 1. Security Support in In-Network Processing in WSN
  • 2. Introduction to Zigbee (IEEE 802.15.4) These networks are Wireless Personal Area Networks (WPANs) that are defined by a low data rate, long battery life, and secure networking. Zigbee networks support automation and remote control. Zigbee exist in mac & physical layer Qualnet (i.e. network sensor library, supporting Zigbee ) The following are capabilities included in the QualNet 4.5 Sensors Network Library: • Generating network beacons if the deviceis a coordinator • Synchronizing to the beacons • Personal Area Network (PAN) association and disassociation • Carrier Sense Multiple Access with Collision avoidance (CSMA-CA) for channel access • Energy detection (ED) within the current channel • Battery model and RF energy consumption model • Link Quality Indication (LQI) for received packets • Modulation schemes: • O-QPSK with DSSS @ 2.4 GHZ, 868/915 MHz • BPSK with DSSS @ 868/915 MHz • PSSS with BPSK and ASK @ 868/915 MHz Handling Security in In-Network Processing in WSN. Benefits of In-Network Processing 1. Improved Scalability – reduction of data through aggregation 2. Prolonged Lifetime - less communication overhead due to aggregation. 3. Increased Versatility – easy dissemination of commands Two types of In-Network Processing 1. upstream - aggregation of data send by nodes to aggregator & base station 2. downstream – disemination of commands from aggregator & base station to leaf nodes
  • 3. Objectives Handling security issues such as DOS attacks, eavesdropping, tampering, physical compromise of nodes in both. 1. Secure Data Aggregation - authentication of reported data by aggregators send by nodes. 2. Secure Data Assemination - authentication of commands by nodes send by aggregators Aggregators functions 1. dissemination of commands 2. aggregation of data 3. create & dissolve subgroups 3 issues in Delegating trust to Aggregators. 1. Nodes & aggregators should understand & identify their sensor group. 2. Aggregators can disseminate commands that are trusted by nodes 3. nodes can send trusted data to aggregators
  • 4. Delegation of Authorization It is a technique used by base station to delegate aggregators for a limited period of time. Motive is to distinguish between commands originating from aggregators of particular sensor group & malicious node Two mechanisms proposed 1. One-way hash chain 2. µtesla protocol 1. One-way hash chain (OHC). It is generated by one-way hash function F which satisfies following properties: (I) Given x it is easy to compute y such that y = F(x). (II) Given y it is computationally infeasible to compute x. an OHC is a sequence no. K0,K1,... Kn-1,Kn for all j such that 0 < j < = n Kj-1 = F(Kj) To delegate trust to aggregators, base station creates separate hash chains for each aggregator. OHCi : Oim, Oim-1 ….. Oi0 for each sensor group SGi Oim is send to the aggregator & Oi0 is send to every other node in the sensor group SGi. Kth packet send by agi includes Oik. .& Fk(Oik) = Oi0 which is calculated by receiving node. 2. µtesla protocol It is improvement over one-way hash chain. This protocol requires that the base station & nodes are loosely time synchronized, & each node knows the upper limit of maximum synchronization error. Sender of broadcast packets maintains a one-way hash chain . (K0,K1,... Kn-1,Kn ) & each sensor node is configured with K0. The base station broadcasts a list containing < SGi.,,agi, Oi0, ri> for each sensor group SGi to all the nodes in the network. In these protocols, if a aggregator is compromised, then it is confined to its own sub-group.
  • 5. Lightweight Shared Secret Key Establishment Privacy & secrecy of data transfer is maintained between nodes & aggregator by using a separate pairwise secret key. It is called a subkey of sensor node. It can defend sybil attack. Ks,r = G(Ks,r) Ks,r = subkey Ks = unique secret custom key which is preconfigured in sensor nodes & shared with base station only r = random no. Subkey is distributed in 3 step process: 1. Base Station chooses a random no. for each sensor group & creates subkey for each node in that sub group. Then it broadcasts that random no. using utesla protocol. 2. Base Station sends encrypted unicast message to each aggregator that contains subkey for all sensor nodes in the sensor group of that aggregator. 3. Aggregator sends a unicast message to each sensor nodes after which sensor node can identify its sensor group. Efficient secure broadcasts in a small group : Ripple Key Ripple command dissemination is a method within a sensor group that doesn't rely on unicast messages, and doesn't require time synchronization. SG is divided into layers called ripples. Ripples is defined as set of all nodes that are at the same distance (no. of hops) from the ag. . For each ripple a secret ripple key (Krj) is generated that is shared between ag & members of ripple. To disseminate commands, ag sends a separate ripple message for each ripple in the group. Assumption : distance of farthest node from ag is 5 hops or less. Advantages: 1. No need of time synchronization among sensor nodes. 2. No unicast message to each node. Disadvantages: 1. Ag sends same command multiple times for each ripple. 2. Subject to rushing attack 3. Too many layers makes the method inefficient.
  • 6. Building A Secure Hierarchical WSN : An Integrated Solution There are four rounds present in building secure hierarchical WSN. Round 0 (Preparation) The BS discovers the topology of the complete sensor network & perform some initial preparation Secure Routing protocol such as INSENS. It provides following functionalities: 1. Discovering Topology of WSN 2. Building routing tables in the presence of attacks such as tampering with data, DOS etc The BS configures hierarchical network by dividing it into sensor groups and choosing ag for each group. Round 1 (Group Announcement) BS uses delegation of authorization to mechanism to inform each node the identity of sensor groups such as ag's id, initial sequence no., random no. to generate subkey by broadcasting message. µtesla protocol protects authenticity & integrity of message. After receiving message each node can verify that whether it is from BS or contents of the message is tampered. At the end of round each node has the complete list of sensor groups in the WSN but still it doesn't knows which group does it belongs to. Round 2 (Trust Commitment) The BS sends all information that an ag needs to build a secure sensor such as internal routing information, one-way hash chain & the subkeys of member nodes. At first for each sensor group BS generates subkey for each member node BS then sends unicast message to the aggregator. This message includes <topologyi,ohci,ri,key_listi>. Topology contains all connectivity information among the nodes ohc is one-way hash chain that the ag will use. key_list is the entire key_list that BS creates for the nodes in that group.
  • 7. Round 3 (Building each Sensor Group) This round provides 4 piece of information to each node in a sensor group. 1. The sensor group it belongs to 2. Its forwarding table for sending & routing data 3. The pairwise shared key it shared with the ag 4. The ripple key of the ripple it belongs to Since the ag has the sensor group topology information, it can compute paths & routing table for each member node by using Breadth-First Search Algorithm. To securely send this information to member nodes, ag sends two unicast message in breadth first manner. 1st message contains – <Oi1,agi,ri,MAC> It tells the node its sensor group & subkey that it shares with ag. 2nd message contains - <fts,KRj> ft is forwarding table of the node. KR is ripple key of that node. Now each sensor node can send its data securely to ag using its subkey Ks,r. Performance Evaluation 1. Network setup overhead A WSN can be divided in level of hierarchies such as each top level hierarchy can be further divided into 2nd level hierarchy & each 2nd level hierarchy can be divided into 3rd level hierarchy & so on. The overall network overhead increases with the no. of levels & hence no. of sensor groups. Network overhead increases in Round 1 & 2 & decreases in round 3 with increasing no. of levels. The reason for increase in network overhead in round 1 is round 1 is repeated for each layer (µtesla broadcast). The reason for increase in network overhead in round 2 is increase in the no. of sensor groups as BS sends unicast message to ag.s at level 1 then ag.s at level 2. The reason for decrease in network overhead in round 3 is as the no. of sensor group increases the no. of nodes in each SG decreases. The overall network setup overhead is relatively small.
  • 8. 2. In-Network Processing Performance By experiments it is concluded that in-network processing results in a significant reduction in the no. of packets exchanged. While the overhead due to initial network setup results in more packets being exchanged at first in multi-level hierarchy compared to no hierarchy In-network processing consumes less network bandwidth after just a small no of sensor reports. Another observation is that by increasing the no. of levels, the no. of packets exchanged decreases. 3. Aggregator Storage Requirement An aggregator needs to store ripple keys,subkeys, one-way hash chain & topology information of its sensor groups. Memory requirement for one-way hash chain is small as not all values is to be stored. All less no. of ripples keys storage is required. But storage requirement of subkeys & topology increases with the size of sensor group. By conducting experiments we conclude that storage requirement for storing shared pairwise keys & topology information increases linearly with group size.
  • 9. 4. Aggregator Command dissemination There are two mechanism aggregator can use to send command to all nodes 1 . µtesla 2 . Ripple Keys These two approaches incur much less overhead than unicast approach. The ripple key approach outperforms µtesla for small network size. Thus ripple key approach requires small no. of packets exchange than µtesla. Also ripple key doesn't require time synchronization & suffer from delay key release. If group size is large µtesla results in small no. of packet exchanged. 5. Resource requirements for cryptographic Algorithms. One-way hash chain & Message Authentication Codes (MAC) can be generated using RC5 on berkeley motes. Motes have 4Mhz processor with 128k flash memory, 4k RAM and RFM monolithics TR 1000 radio at 19.2kbps. We use standard CBC mode to generate MAC. Experiments shows that computation & memory requirement for cryptographic algorithms needed to build WSN supporting in-network processing is fairly low. It can be easily supported by current sensor nodes such as motes. cryptographic algorithms take about 2k flash memory & 264 bytes of RAM for data storage .
  • 10. Analysis of Key Management in Wireless Sensor Networks
  • 11. Introduction: WSNs come in two flavours: distributed networks and hierarchical networks. In a hierarchical wireless sensor network (HWSN), three types of devices exist: a base station, several cluster heads, and a multitude of sensor nodes. The sensor node can be considered the “worker bees” of the network, whereby they diligently collect data representing various characteristics of its surrounding atmosphere. Pair-wise key management schemes: All pair wise (Single master key): The most trivial solution in terms of resource usage. All nodes are deployed with a single master key. Problems: Since an adversary may capture a node and compromise the key very easily, it has very low resilience. This scheme is not recommended for much more than a test system. All pair-wise (Distinct pair-wise keys): Each node stores all possible pairs in the WSN. For a network of size N, Node Si stores a unique pair-wise key for each one of N-1 sensor nodes in the WSN . However, not all N-1 keys have to be stored in a nodes’ key-chain to have a adequate connectivity. The storage burden is high for each sensor node but resilience is much better than “single master key”. Random pair-wise key scheme: Each sensor node is given a random set of Np pair-wise keys. This gives a probability p that two nodes can connect. “At key setup phase, each node identity is matched with Np other randomly selected node IDs with probability p” . For each matched pair of nodes a pair-wise key is generated. The key is then stored in both nodes’ key- chain along with an ID of other node. 2Np units of memory are use in each node to store the complete keychain. During the shared-key discovery phase, all nodes broadcast their ID. As a result, each node sends and receives one message from the other nodes within its radio range .
  • 12. Closest pair-wise keys pre-distribution scheme: In this scheme Location information is used to improve the key connectivity. Sensor nodes are deployed in a two dimensional area similar to a grid. All sensors locations are predicted by a setup server. Each sensor shares pair-wise keys with its c closest neighbors. In the key setup each sensor node SA is given a unique key KA and a set “c” of it’s closest neighbors SB1, . . . , SBc are selected. For each pair (SA, SBi), a pair- wise key KA,Bi = PRF(KBi |IDA) is generated. All these pair-wise keys and Ids makeup the keychain of SA, Node SBi only stores the key KBi and the PRF. Each sensor uses 2c+1 units of memory to store its key-chain [3][4]. This scheme makes deployments of new nodes easier, decreases memory usage, and has good key connectivity if deployment errors are kept low. ID based one-way function scheme (IOS): This scheme is based on a connected r-regular graph G of the expected deployment. The graph is composed of star-like sub graphs. The sub graphs are used to distributed the pair-wise keys to the appropriate nodes. Each sensor node is the center of one star-like graph and a leaf of r/2 star-like sub graphs. Each node uses r + 1 units of memory to store keys and key IDs . Very good key resilience. Multiple IOS: Multiple IOS is meant to improve the scalability of ID based one-way function scheme
  • 13. (IOS). Every node in graph G corresponds to l nodes SA =SA1, . . . , SAl. Each sensor node SAi stores a common key KA and a secret Hash(KB|IDAi). Every node SBj in the class of node SB, can use common key KB to generate the secret Hash(KB|IDAi) for node SAi [3][4]. Memory usage decreases by a factor of l. Broadcast session key negotiation protocol (BROSK): A single master key is pre-deployed to all sensor nodes. Sensor node pairs (Si, Sj) then exchange randomnonce values. The master key Km is used to establish session key Ki,j = PRF(Km|RNi|RNj). Only one unit of memory is used (by each node) to store the master key. If the master keyis compromised, then all links are compromised therefore the scheme has very low resilience . Protocols for Distributed Key Management in Clustered Wireless Sensor Networks Aim: To provide security to one-to-all and one-to-one communication In WSN. Related Terms: Rekey Interval, Periodic Rekeying , Rekeying with Cluster Dynamics: The Rekey Interval can be defined as the period with which encryption key of a node is changed to a new one. If the network topology does not change within the rekey
  • 14. interval, the new key can be easily distributed to all the nodes by encrypting it with the existing key. Each node decrypts the new key using the existing key and designates the new key as its current key. This way of rekeying is called Periodic Rekeying. If the network topology changes within the rekey interval due to joining of new nodes or leaving of existing nodes, then the rekeying method applied at this time is called Rekeying with Cluster Dynamics. Key Management Protocols: The aim of the key management protocols is to provide security to all the one-to-all and one-to-one data communications. This requires formation of a network wide key shared by all members of the network, pair-wise keys shared between every Cluster Head and a cluster member and a Cluster key shared by all members of each cluster. We assume that in a WSN there are one or more clusters. Each cluster is having a Cluster Head decided by the HEED algorithm. The Cluster Head has a share a pair- wise key with each of its cluster members. Notations in the Key Management Protocols
  • 15.
  • 16. Initial key distribution protocol Initial cluster key distribution protocol: Initial Network Key Distribute protocol: