SlideShare a Scribd company logo
Seminar On
Cluster-based Wireless Sensor Network (WSN)
Methods for Secure and Efficient
Data Transmission
Presented By
Swapnil S. Jagtap
Under The Guidance of
Guide Name
Department of Computer Engineering,
Vidya Pratishthan’s College of Engineering,
Baramati.
October 19, 2018
Contents
1 Introduction
2 Literature Survey
3 Motivation
4 Cluster Network Architecture
5 Proposed Protocols
6 Comparison
7 Conclusion
8 References
Introduction
A wireless sensor network (WSN) is a network system comprised of
spatially distributed devices using wireless sensor nodes to monitor physical or
environmental conditions like temperature, sound, pollution levels, humidity,
wind speed and direction, pressure, etc.
The individual nodes are capable of sensing their environments,
processing the information data locally, and sending data to one or more
collection points in a WSN.
Many WSNs are deployed in harsh, neglected and often adversarial
physical environments for certain applications, such as military domains and
sensing tasks with trustless surroundings.
WSN comes under IEEE 802.15.4 standard.
The WSN is built for the application oriented network.
Swapnil S. Jagtap CWSN October 19, 2018 1 / 17
Wireless Sensor Node
Figure: Components of the Wireless Sensor Node
Swapnil S. Jagtap CWSN October 19, 2018 2 / 17
Literature Survey
Authors Year Paper Title Description
Huang Lu, 2012 Secure & Efficient SET-IBS &
Jie Li Data Transmission SET-IBOOS protocols
for CWSNs
Y. Wang, 2006 A Survey of Security Data aggregation in WSNs
G. Attebury, Issues in WSNs for military operations,
B. Ramamurthy Symmetric key cryptography
Deng Jing, 2004 Balanced Energy Balanced-energy scheduling(BS),
Han Yunghsiang, Sleep scheduling Randomized scheduling (RS),
Heinzelman Weni scheme for high Distance-based scheduling (DS)
density CWSNs Schemes
Jamal Al-Karaki, 2004 Routing Techniques Flat-based routing,
Ahmed E. Kamal in Wireless Sensor Hierarchical-based routing,
Networks Location-based routing
Chris Karlof, 2003 Secure Routing in Sinkhole attack,
David Wagner Wireless Sensor Hello Flood attack
Networks
Swapnil S. Jagtap CWSN October 19, 2018 3 / 17
Motivation
Day by day we are getting surrounded by number of sensor nodes
around us, or we can say that we are becoming dependent on these sensor
nodes which we come across in our daily life.
This thing motivated me to study about the technology known as
Cluster-based Wireless Sensor Networks (CWSNs), which is now a days
widely used every where in the industry, medical, agricultural, military,
disaster management, environmental fields.
Swapnil S. Jagtap CWSN October 19, 2018 4 / 17
Sensors in Smartphone
Swapnil S. Jagtap CWSN October 19, 2018 5 / 17
Cluster Network Architecture
Figure: Simple Cluster Network Architecture
Swapnil S. Jagtap CWSN October 19, 2018 6 / 17
Proposed Protocols
1 Secure and Efficient data Transmission using Identity-Based digital
Signature (SET-IBS)
2 Secure and Efficient data Transmission using Identity-Based
Online/Offline digital Signature (SET-IBOOS)
Swapnil S. Jagtap CWSN October 19, 2018 7 / 17
Phases in the proposed system
Figure: Operation in the proposed system
Swapnil S. Jagtap CWSN October 19, 2018 8 / 17
Steps for SET-IBS Protocol for CWSN
Setup: The BS generates a master key msk and public parameters param
for the private key generator (PKG), and gives them to all sensor nodes.
Extraction: Given an ID string, a sensor node generates a private key
sekID associated with the ID using msk.
Signature signing: Given a message M, time-stamp t and a signing key
θ, the sending node generates a signature SIG.
Verification: Given the ID, M and SIG, the receiving node (CH node)
outputs “accept”if SIG is valid, and outputs “reject”otherwise.
Swapnil S. Jagtap CWSN October 19, 2018 9 / 17
Operation in SET-IBS Protocol
Setup phase
Step 1. BS ⇒ Gs : IDbs, Ts, nonce
Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, ci
Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, cj
Step 4. CHi ⇒ Gs : IDi, Ts, sched(IDj/tj), σi, ci
Steady state phase
Step 5. Lj → CHi : IDi, IDj, tj, C, σj, cj
Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, ci
Swapnil S. Jagtap CWSN October 19, 2018 10 / 17
Steps for SET-IBOOS Protocol for CWSN
Setup: The BS generates a master key msk and public parameters param
for the private key generator (PKG), and gives them to all sensor nodes.
Extraction: Given an ID string, a sensor node generates a private key
sekID associated with the ID using msk.
Offline signing: Given public parameters and time-stamp t, the CH
sensor node generates an offline signature SIGoffline, and transmit it to
the leaf nodes in its cluster.
Online signing: From the private key sekID, SIGoffline and message
M, a sending node (leaf node) generates an online signature SIGonline.
Verification: Given ID, M and SIGonline, the receiving node (CH node)
outputs “accept”if SIGonline is valid, and outputs “reject”otherwise.
Swapnil S. Jagtap CWSN October 19, 2018 11 / 17
Operation in SET-IBOOS Protocol
Setup phase
Step 1. BS ⇒ Gs : IDbs, Ts, nonce
Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, zi
Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, zj
Step 4. CHi ⇒ Gs : IDi, Ts, alloc(IDj/tj/σj), σi, zi
Steady state phase
Step 5. Lj → CHi : IDi, IDj, tj, C, σj, zj
Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, zi
Swapnil S. Jagtap CWSN October 19, 2018 12 / 17
Message Size of Data Transmission
For SET-IBS,
|IDj| + |ti| + |C| + |σj| + |h(C ti θ)|
where,
|IDj| and |ti| are 2 bytes
|C| is 20 bytes
and the hash value |h(C ti θ)| is 20 bytes
The total message size is 44+|σj| bytes in SET-IBS.
For SET-IBOOS,
|IDj| + |tj| + |C| + |σj| + |zj|
where,
|σj| + |zj| is the online signature of size 2 bytes
The total message size is 46 bytes in SET-IBOOS.
Swapnil S. Jagtap CWSN October 19, 2018 13 / 17
Comparison
Table: Comparison of characteristics of the proposed protocols with other secure
data transmission protocols
SET-IBS / SET-IBOOS Other Protocols
Key Asymmetric Symmetric
management
Neighborhood Yes Limited
authentication
Storage Comparatively low Comparatively high
cost
Network Comparatively high Comparatively low
scalability
Communication Deterministic Probabilistic
overhead
Computational Comparatively high Low ∼ High
overhead
Attack Active and Passive attacks on wireless channel
resilience
Swapnil S. Jagtap CWSN October 19, 2018 14 / 17
Conclusion
We first studied about the wireless sensor nodes and then the wireless
sensor networks. We then studied two secure and efficient data transmission
protocols for CWSNs, SET-IBS and SET-IBOOS which are efficient in
communication and which achieves security requirements in CWSNs.
Swapnil S. Jagtap CWSN October 19, 2018 15 / 17
References
1 Huang Lu, Jie Li, and Mohsen Guizani, “Secure and Efficient Data
Transmission for Cluster-based Wireless Sensor Networks,”IEEE Trans.
on Parallel and Distributed Systems, 2012.
2 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues
in Wireless Sensor Networks,”IEEE Commun. Surveys Tuts., vol. 8, no.
2, 2006.
3 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An
application-specific protocol architecture for wireless microsensor
networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, 2002.
4 A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An analytical model for
information retrieval in wireless sensor networks using enhanced
APTEEN protocol,”IEEE Trans. Parallel Distrib. Syst., vol. 13, 2002.
5 P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance
analysis of a secure clustering protocol for sensor networks,”in Proc.
IEEE NCA, 2007.
Swapnil S. Jagtap CWSN October 19, 2018 16 / 17
6 G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra-Low
Power Public Key Cryptography for WSNs,”in Proc. IEEE PerCom
Workshops, 2005.
7 R. Yasmin, E. Ritter, and G. Wang, “An Authentication Framework for
Wireless Sensor Networks using Identity-Based Signatures,”in Proc.
IEEE CIT, 2010.
8 H. Lu, J. Li, and H. Kameda, “A Secure Routing Protocol for
Cluster-Based WSNs Using ID-Based Digital Signature,”in Proc. IEEE
GLOBECOM, 2010.
9 W. Diffie and M. Hellman, “New directions in cryptography,”IEEE Trans.
Inf. Theory, vol. 22, no. 6, 1976.
10 Y. Jia, L. Zhao, and B. Ma, “A Hierarchical Clustering-based Routing
Protocol for WSNs Supporting Multiple Data Aggregation
Qualities,”IEEE Trans. Parallel Distrib. Syst., vol. 4, no. 1-2, 2008.
Swapnil S. Jagtap CWSN October 19, 2018 17 / 17
THANK YOU

More Related Content

What's hot

IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
iaemedu
 
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
IAESIJEECS
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
 
Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate ContentionsComputer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
Shanmuga Priyan Thiagarajan
 

What's hot (6)

IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate ContentionsComputer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
 

Similar to Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission

IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET Journal
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 
E010412433
E010412433E010412433
E010412433
IOSR Journals
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
ijtsrd
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Charalampos Doukas
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Walchand college of Engineering,Sangli
 
becan
becanbecan
becan
manas0770
 
IRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
IRJET- Doctors Assitive System using Augmentated Reality for Critical AnalysisIRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
IRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
IRJET Journal
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET Journal
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
76 s201917
76 s20191776 s201917
76 s201917
IJRAT
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET Journal
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Eswar Publications
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
IRJET Journal
 

Similar to Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission (20)

IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptx
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
 
E010412433
E010412433E010412433
E010412433
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 
becan
becanbecan
becan
 
IRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
IRJET- Doctors Assitive System using Augmentated Reality for Critical AnalysisIRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
IRJET- Doctors Assitive System using Augmentated Reality for Critical Analysis
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
76 s201917
76 s20191776 s201917
76 s201917
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 

Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission

  • 1. Seminar On Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission Presented By Swapnil S. Jagtap Under The Guidance of Guide Name Department of Computer Engineering, Vidya Pratishthan’s College of Engineering, Baramati. October 19, 2018
  • 2. Contents 1 Introduction 2 Literature Survey 3 Motivation 4 Cluster Network Architecture 5 Proposed Protocols 6 Comparison 7 Conclusion 8 References
  • 3. Introduction A wireless sensor network (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. Many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings. WSN comes under IEEE 802.15.4 standard. The WSN is built for the application oriented network. Swapnil S. Jagtap CWSN October 19, 2018 1 / 17
  • 4. Wireless Sensor Node Figure: Components of the Wireless Sensor Node Swapnil S. Jagtap CWSN October 19, 2018 2 / 17
  • 5. Literature Survey Authors Year Paper Title Description Huang Lu, 2012 Secure & Efficient SET-IBS & Jie Li Data Transmission SET-IBOOS protocols for CWSNs Y. Wang, 2006 A Survey of Security Data aggregation in WSNs G. Attebury, Issues in WSNs for military operations, B. Ramamurthy Symmetric key cryptography Deng Jing, 2004 Balanced Energy Balanced-energy scheduling(BS), Han Yunghsiang, Sleep scheduling Randomized scheduling (RS), Heinzelman Weni scheme for high Distance-based scheduling (DS) density CWSNs Schemes Jamal Al-Karaki, 2004 Routing Techniques Flat-based routing, Ahmed E. Kamal in Wireless Sensor Hierarchical-based routing, Networks Location-based routing Chris Karlof, 2003 Secure Routing in Sinkhole attack, David Wagner Wireless Sensor Hello Flood attack Networks Swapnil S. Jagtap CWSN October 19, 2018 3 / 17
  • 6. Motivation Day by day we are getting surrounded by number of sensor nodes around us, or we can say that we are becoming dependent on these sensor nodes which we come across in our daily life. This thing motivated me to study about the technology known as Cluster-based Wireless Sensor Networks (CWSNs), which is now a days widely used every where in the industry, medical, agricultural, military, disaster management, environmental fields. Swapnil S. Jagtap CWSN October 19, 2018 4 / 17
  • 7. Sensors in Smartphone Swapnil S. Jagtap CWSN October 19, 2018 5 / 17
  • 8. Cluster Network Architecture Figure: Simple Cluster Network Architecture Swapnil S. Jagtap CWSN October 19, 2018 6 / 17
  • 9. Proposed Protocols 1 Secure and Efficient data Transmission using Identity-Based digital Signature (SET-IBS) 2 Secure and Efficient data Transmission using Identity-Based Online/Offline digital Signature (SET-IBOOS) Swapnil S. Jagtap CWSN October 19, 2018 7 / 17
  • 10. Phases in the proposed system Figure: Operation in the proposed system Swapnil S. Jagtap CWSN October 19, 2018 8 / 17
  • 11. Steps for SET-IBS Protocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Signature signing: Given a message M, time-stamp t and a signing key θ, the sending node generates a signature SIG. Verification: Given the ID, M and SIG, the receiving node (CH node) outputs “accept”if SIG is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 9 / 17
  • 12. Operation in SET-IBS Protocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, ci Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, cj Step 4. CHi ⇒ Gs : IDi, Ts, sched(IDj/tj), σi, ci Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, cj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, ci Swapnil S. Jagtap CWSN October 19, 2018 10 / 17
  • 13. Steps for SET-IBOOS Protocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Offline signing: Given public parameters and time-stamp t, the CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster. Online signing: From the private key sekID, SIGoffline and message M, a sending node (leaf node) generates an online signature SIGonline. Verification: Given ID, M and SIGonline, the receiving node (CH node) outputs “accept”if SIGonline is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 11 / 17
  • 14. Operation in SET-IBOOS Protocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, zi Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, zj Step 4. CHi ⇒ Gs : IDi, Ts, alloc(IDj/tj/σj), σi, zi Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, zj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, zi Swapnil S. Jagtap CWSN October 19, 2018 12 / 17
  • 15. Message Size of Data Transmission For SET-IBS, |IDj| + |ti| + |C| + |σj| + |h(C ti θ)| where, |IDj| and |ti| are 2 bytes |C| is 20 bytes and the hash value |h(C ti θ)| is 20 bytes The total message size is 44+|σj| bytes in SET-IBS. For SET-IBOOS, |IDj| + |tj| + |C| + |σj| + |zj| where, |σj| + |zj| is the online signature of size 2 bytes The total message size is 46 bytes in SET-IBOOS. Swapnil S. Jagtap CWSN October 19, 2018 13 / 17
  • 16. Comparison Table: Comparison of characteristics of the proposed protocols with other secure data transmission protocols SET-IBS / SET-IBOOS Other Protocols Key Asymmetric Symmetric management Neighborhood Yes Limited authentication Storage Comparatively low Comparatively high cost Network Comparatively high Comparatively low scalability Communication Deterministic Probabilistic overhead Computational Comparatively high Low ∼ High overhead Attack Active and Passive attacks on wireless channel resilience Swapnil S. Jagtap CWSN October 19, 2018 14 / 17
  • 17. Conclusion We first studied about the wireless sensor nodes and then the wireless sensor networks. We then studied two secure and efficient data transmission protocols for CWSNs, SET-IBS and SET-IBOOS which are efficient in communication and which achieves security requirements in CWSNs. Swapnil S. Jagtap CWSN October 19, 2018 15 / 17
  • 18. References 1 Huang Lu, Jie Li, and Mohsen Guizani, “Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks,”IEEE Trans. on Parallel and Distributed Systems, 2012. 2 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,”IEEE Commun. Surveys Tuts., vol. 8, no. 2, 2006. 3 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, 2002. 4 A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol,”IEEE Trans. Parallel Distrib. Syst., vol. 13, 2002. 5 P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,”in Proc. IEEE NCA, 2007. Swapnil S. Jagtap CWSN October 19, 2018 16 / 17
  • 19. 6 G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra-Low Power Public Key Cryptography for WSNs,”in Proc. IEEE PerCom Workshops, 2005. 7 R. Yasmin, E. Ritter, and G. Wang, “An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures,”in Proc. IEEE CIT, 2010. 8 H. Lu, J. Li, and H. Kameda, “A Secure Routing Protocol for Cluster-Based WSNs Using ID-Based Digital Signature,”in Proc. IEEE GLOBECOM, 2010. 9 W. Diffie and M. Hellman, “New directions in cryptography,”IEEE Trans. Inf. Theory, vol. 22, no. 6, 1976. 10 Y. Jia, L. Zhao, and B. Ma, “A Hierarchical Clustering-based Routing Protocol for WSNs Supporting Multiple Data Aggregation Qualities,”IEEE Trans. Parallel Distrib. Syst., vol. 4, no. 1-2, 2008. Swapnil S. Jagtap CWSN October 19, 2018 17 / 17