Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
Due to the sensitive nature of the data transmitted by applications ranging from mobile target
surveillance to intelligent home networking, through Wireless sensor networks, (WSNs) appropriate
protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links.
In this paper, we propose a novel group key management scheme. This paper investigates the use of secure
tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms
to the security requirements of WSNs while having less computational and network overhead. Our
protocol considerably can reduce the number of transmitted messages as well as the computational load,
which makes it suitable for WSNs. We tested the proposed protocol considering two models of mobility
of the targets which are respectively the Random Walk model and the Gauss Markov model.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
Due to the sensitive nature of the data transmitted by applications ranging from mobile target
surveillance to intelligent home networking, through Wireless sensor networks, (WSNs) appropriate
protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links.
In this paper, we propose a novel group key management scheme. This paper investigates the use of secure
tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms
to the security requirements of WSNs while having less computational and network overhead. Our
protocol considerably can reduce the number of transmitted messages as well as the computational load,
which makes it suitable for WSNs. We tested the proposed protocol considering two models of mobility
of the targets which are respectively the Random Walk model and the Gauss Markov model.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
Secure data aggregation technique for wireless sensor networks in the presenc...LeMeniz Infotech
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
Secure data aggregation technique for wireless sensor networks in the presenc...LeMeniz Infotech
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
However, the problem of authentication and pairwise key
establishment in sensor networks with MSs is still not solved
in the face of mobile sink replication attacks. For the basic
probabilistic [12] and q-composite [13] key predistribution
schemes, an attacker can easily obtain a large number of keys
by capturing a small fraction of the network sensor nodes,
making it possible for the attacker to take control of the
entire network by deploying a replicated mobile sink,
preloaded with some compromised keys to authenticate
and then initiate data communication with any sensor node.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
Similar to ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
DOI : 10.5121/ijwmn.2013.5207 81
ENHANCED THREE TIER SECURITY
ARCHITECTURE FOR WSN AGAINST MOBILE SINK
REPLICATION ATTACKS USING MUTUAL
AUTHENTICATION SCHEME
Linciya.T1
and Anandkumar. K.M2
1
P.G Scholar, Department of Computer Science and Engineering, Easwari Engineering
College, Chennai, India
linciya.thomas@gmail.com
2
Assistant Professor (Sl.Gr.), Department of Computer Science and Engineering,
Easwari Engineering College, Chennai, India
kmanandmss@gmail.com
ABSTRACT
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
KEYWORDS:
Wireless Sensor Network, Pair wise Key Establishment, Random Key Pre distribution, Mobile Sink, ID
Encryption, Mutual Authentication Scheme.
1. INTRODUCTION
Recent development in electronic and computer technologies made the way for
emergent of Wireless Sensor Networks (WSN). The WSN consists of wide distributed sensors
to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and
to pass their data through the network to a destination. The advancement of wireless
communication technologies and rooted computing, are being widely adapted into many
applications through sensor networks and many active researches on related subject are being
carried out. Several sensor nodes are connected to build the wireless sensor networks. The large
number of small autonomous devices are embedded in the sensors which are interconnected to
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
82
form a sensor network. The WSN make use of a number of sensor nodes within or neighbouring
the area of event to not only collect and integrate but also process and relay the information.
Sensor nodes are equipped with integrated sensors that has the capability to process the
collected data and for short range radio communication. The randomly deployed sensor nodes in
the area of scrutiny collect the sensor data in typical application scenarios.
In application such as military sensing and tracking, environment monitoring,
patient monitoring and tracking, smart environment, etc are sensed by the deployed sensor.
Those sensors are interconnected to form the sensor network and are deployed in hostile
environment where they are prone to different malicious attack. There are various attacks in the
WSN. For example, messages can me spoofed during the transit and then the copy of the
message can be sent to the recipient in the altered form. One can also intrude with a node and
alter its behaviour. The types of counter measures can be addressed by different types of attacks.
The most formidable attack in wireless sensor network is the replication attack. The
attacker compromises a node and uses its secret cryptographic key materials to effectively
colonize the network with the clones of it. Foe collects all the credentials like keys, identity etc
once the node has been captured. Those captured credentials are reprogrammed by the attacker
and the nodes are replicated using those credentials in order to eavesdrop the transmitted
messages or compromise the functionality of the network. The replication attack is carried in
two ways: mobile sink replication attack and stationary access node replication attack. There are
some solutions available for stationary access point replication attack compare with mobile sink
replication attack. Many important functions of the sensor network such as routing, resource
allocation, misbehaviour detection, network resilience, throughput etc are remarkably injurious
by replication attack. The above problem of replication attack can be solved through polynomial
pool pr distribution scheme.
There are number of key pre distribution schemes for solving the problem of
authentication and pair wise key distribution which do not exhibit desirable network resilience.
The breach of security in one node makes the entire sensor network unsafe. The new security
challenge for data collection is by avocation of pair wise key establishment and authentication
in the mobile sinks. In the basic probabilistic and q-composite key pre distribution schemes, the
attacker gain the control of entire network by deploying a replicated mobile sink preloaded with
some compromised keys. Those compromised keys can be achieved by an attacker by obtaining
large number of keys by capturing a small fraction of nodes.
To handle the afore-said problem, we use pair wise key pre distribution scheme
that provide authentication and pair wise key establishment amid sensor nodes and Mobile Sink.
To expedite the study of a new security technique, a general three-tier security agenda is
established for authentication and pair wise key establishment, based on the polynomial pool-
based key pre distribution scheme.
In polynomial pool-based key pre distribution scheme both mobile sink and
stationary access point generates the separate subset of keys which results in the high
computational cost. In order to overcome this problem Random pair wise pre distribution
scheme is used to reduce the computational cost and provides security against the replication
attacks in the proposed system. In Random pair wise pre distribution scheme only mobile sink
generates a key with key identifiers and broadcasted to stationary access point and sensor node.
Fig 1 represents the system architecture of the prospective system.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
83
Fig 1. System Architecture
The rest of the paper is organized as follows. Section 2 discusses the previous work
on related topics and Section 3 gives the models and assumptions. Section 4 describes proposed
Random Pair wise Pre distribution in detail. Section 5 discusses the encryption algorithm.
Section 6 discusses the analysis results and Finally, Section 7 concludes the paper.
2. RELATED WORKS
A comprehensive literature review was carried out on node replication attacks and other
security issue in static and mobile wireless sensor networks. This literature survey revealed
versions mathematical and operational methods for solving the problems. The key management
problem is a progressive research area in wireless sensor networks. Eschenauer and Gilgor [4]
proposed a probabilistic key pre distribution scheme which helps to bootstrap the initial trust
between the sensor nodes. The discriminative distribution and countermanding of keys to
sensor nodes and node re-keying without substantial computation and communication
capabilities are briefly explained in this scheme. For the random subset of keys from a large key
pool before deployment, the probabilistic key pre distribution scheme is used. As an outcome,
two nodes have assured a prospect to share at least one key after deployment.
The characteristic of network connectivity and security can be poised by key
management scheme. The core idea is the sensor node randomly picks a set of keys from a key
pool before deployment, so that any two sensor nodes had a certain prospect to share at least
one common key. The problem existing in this key pre distribution is the probability of
establishing a common key between communicating nodes, and the ability to tolerate
compromised nodes is highly dependent on the memory available on the sensor nodes. In other
words, these schemes still require each node to be assigned a large number of keys for a high-
performance WSN, and some solutions for this problem focus on pre deployment knowledge,
post deployment knowledge, the state of the sensors, and overlapping key strings. However,
these solutions are not quite viable since their key sharing mechanism is not enough to be
efficient. One of the most important information is the signal range of the sensor node that
might significantly improve the performance of the key sharing mechanism however, this is not
exploited in these schemes.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
84
Liu et al.[3] The sensor nodes are communicated securely with each other using
cryptographic techniques by enabling bi variate key polynomial. This is one of the most primary
security services. The resource constraints of the sensor nodes makes it not feasible for sensors
to use key polynomial scheme. The scheme assures a direct key established between any two
neighbour sensors in any deployment group. Better trade-off is achieved between
communication overhead, network connectivity and security against node capture compared to
the existing key pre-distribution schemes. Ultimately, it also supports dynamic node addition
after the initial deployment of the nodes in the network.
Chan et al. [2] further unmitigated this proposal and developed two key predistribution
schemes: the q-composite key predistribution scheme and the random pairwise keys scheme. In
q-composite key predistribution scheme two sensor nodes are required to compute compute a
pairwise key from the shared q predistributed keys. In random pairwise keys scheme pair of
sensor nodes are randomly picked and assign each pair a unique random key. Comparing to the
basic probabilistic key predistribution scheme the above schemes improved the security. They
developed a general scaffold for pairwise key establishment using the polynomial-based key pre
distribution protocol [5] and the probabilistic key distribution in [6] and [7]. Tolerating not more
than t compromised node, where the value of t was limited by the memory available in the
sensor nodes can be carried in this scheme.
Amar Rasheed et.al [1] developed for group key pre distribution. The pair wise key
establishment in the context of sensor networks is the ultimate aspiration. This system is
unreservedly secure and t-collusion resistant. The network resilience is significantly improved
to the mobile sink replication attack. The small fraction of preselected sensor nodes are called
as sensor nodes. In this new security agenda, stationary access nodes act as an authentication
access point to a network to elicit the sensor node to transmit the collected to the mobile sink.
The data request message from the mobile sink to sensor node is transmitted through stationary
access node. These data request will elicit the sensor node to transmit the data from sensor node
to mobile sink through stationary access point.
3. MODELS AND ASSUMPTIONS
3.1 Network Model
We consider a sensor networks, where a large number of sensor nodes are randomly
distributed in the two dimensional area and remain stationary after deployment, and all of them
have similar capabilities and equal significance. One sink which has the mobility named as
mobile sink which collects the data from all other sensor nodes. Each sensor node sends its data
packets to sink nodes through access point. For the secure data transmission we go three tier
security scheme.
3.2 Three Tier Security Scheme
The two separate polynomial pools are used in three tier security scheme: the mobile
polynomial pool and the static polynomial pool. For data gathering from the sensor through the
mobile sink the polynomials from mobile polynomial pool are used. To gain access to the
network for the sensor’s data gathering, an attacker needs to compromise at least a single
polynomial. For key setup between the sensor nodes and stationary access nodes the
polynomials from static polynomial pool are used.
Afore mention to deployment, The subset of polynomials from the mobile polynomial
pool is picked by each mobile sink. The randomly selected sensor nodes called stationary access
nodes carry a polynomial from the mobile polynomial pool. These nodes acts as the
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
85
authentication point for the network which triggers the sensor node to transmit the data. The
data request is transmitted to sensor node from the mobile sink through stationary access node.
This data request will initiate the sensor node to transmit the collected data. Every stationary
access node may share a mobile polynomial with a mobile sink. The subset of polynomials from
both static and mobile polynomial pool is randomly picked by stationary access point and
sensor node. The main benefit to use separate pools is the mobile sink authentication is
autonomous of the key distribution scheme used to unite the sensor network
3.2.1 Key Discovery between a Mobile Sink and a Sensor Node
To establish a direct pair wise key between sensor node u and mobile sink v, a sensor
node u needs to find a stationary access node a in its neighbourhood, such that, node a can
establish pair wise keys with both mobile sink v and sensor node u. Fig 2 shows a direct secure
path establishment between nodes u and v, mobile sink v sends the pair wise key to node a in
message encrypted and authenticated with the shared pair wise key ;a between v and a. If node
a receives the above message and it shares a pair wise key with u, it sends the pair wise key to
node u in a message encrypted and authenticated with pair wise key; u between a and u.
Fig 2. Direct Key Establishment
Fig 3 illustrates that the mobile sink and the sensor node will have to establish a pair
wise key with the help of other sensor nodes using indirect key discovery. To establish a pair
wise key with mobile sink u, a sensor node v has to find a stationary access node a in its
neighbourhood such that node a can establish a pair wise key with both nodes u and v. If node
(a) establishes a pair wise key with only node v and not with u. As the probability is high that
the access node a can discover a common mobile polynomial with node v, sensor node u needs
to find an intermediate sensor node i along the path u - i - a - v, such that intermediate node i
can establish a direct pair wise key with node (a).
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
86
Fig 3. Indirect Key Discovery through Intermediate Stationary Access Node
Fig 4 shows that the mobile sink and the sensor node will have to establish a pair
wise key with the help of other sensor nodes using indirect key discovery. To establish a pair
wise key with mobile sink u, a sensor node v has to find a stationary access node a in its
neighbourhood such that node a can establish a pair wise key with both nodes u and v. If node
(a) establishes a pair wise key with only node v and not with u. As the probability is high that
the sensor node a can discover a common mobile polynomial with node v, sensor node u needs
to find an intermediate sensor node i along the path u - i - a - v, such that intermediate node i
can establish a direct pair wise key with node (a).
Fig 4. Indirect Key Discovery through Intermediate Stationary Node
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
87
4. RANDOM PAIR WISE KEY PRE DISTRIBUTION
In this section, we first list phases for pair wise key setup in Random Key Pre distribution
(RKP) schemes
A. Phases in Random Key Pre distribution Schemes
Four main phases for key setup in RKP schemes are presented as follows.
1. Key pre distribution phase:
A mobile sink has a polynomial pool.
• generate a large key pool of size ;
• different keys for each sensor from the key pool to form a key ring are
selected randomly;
• In the memory of the sensor the key ring is loaded.
• Each sensor is loaded with unique node identifier or key identifier.
2. Sensor deployment phase:
Sensors are erratically picked and uniformly dispersed in a large area. Typically, the
average number of neighbors of a sensor is much smaller than the total number of
deployed sensors.
3. Key discovery phase:
Two steps are involved in the key discovery phase. In the first step, each sensor
attempts to discover shared key(s) with each of its neighbors. To accomplish this, the
sensor can broadcast its key ring identifier to its neighbours. After the first step of the
key discovery phase, the sensor knows all its neighbors. The set of all neighbors of
sensor is represented by Wi and | Wi|=n’. The set of neighbours of sensor i who share at
least one key with the sensor i is represented by Ri. Thus, we have Wi = Qi ∪ Ri and
|Qi|+| Ri|= n’. In the second step, every sensor i broadcasts its set Qi. Using the sets
received from neighbors, a sensor can build a key graph based on the key-share
relations among neighbors.
4. Pair wise key establishment phase:
If sensor shares at least one key with a given neighbor, the shared key(s) can be used as
their pair wise key(s).
In the proposed system the random pair wise key is used for the security and for reducing the
computational cost. Figure 5 shows the functional architecture for the three tier security scheme.
Sensor nodes collect the data from the remote area and send to the mobile sink. The data that are
collected from sensor node is forwarded to access point which in turn sent to mobile sink. For
secure transmission of data we generate keys from the polynomial pool. The key is generated in
sensor node then it encrypt the collected data using the generated key and transfer it to the
mobile sink.
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
88
Fig 5. Functional Architecture of the Proposed System
For the encryption of the data using the key ID based encryption algorithm is used. For
the ID based encryption algorithm its essential for the private key generator which is to be
located in the base station from which the master key to be stored in the mobile sink.
5. ID BASED ENCRYPTION ALGORITHM
ID-based public key infrastructure involves a trusted Key Generation Center (KGC),
and users. The basic operations consist of Set Up and Private Key Extraction. KGC runs BDH
parameter generator to generate two groups G1,G2 and a bilinear pairing e: G1 × G1 → G2.
Itchooses an arbitrary generator P ε G1 and defines two cryptographic hash functions:
H1 : {0,1}*
→G1,
H2 : {0,1}*
→G2.
• Set Up: KGC chooses a random number s ε Zq
*
and set Ppub=sP . Then the KGC
publishes system parameters params={G1,G2,q,P,Ppub,H1,H2}, and keep s as master-key.
• Private Key Extraction: An identity information ID to KGC is submitted by the user.
The user’s public key is computed by KCG as QID=H1(ID) and reversion private key as
SID= sQID.
The holder of private key SID to decrypt a message sent to her under the public key QID.
Let m denote the message to be encrypted.
• Encryption:
Compute U=rP where r ε RZq
*
. Then compute
V = m H2(e(Ppub,rQID)) (1)
Output the cipher text (U,V)
⊕
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
89
• Decryption:
Decryption is performed by computing
V H2(e(U,SID)) = V H2(e(rP,sQID)) (2)
= V H2(e(sP,rQID)) (3)
= V H2(e(Ppub,rQID)) (4)
= m
The node ID is used for the creation of the private key and public key for the secure
transmission of data from the sensor node to the mobile sink. Hence ID based encryption
algorithm is adhibited for the encryption and decryption of the data.
6. MUTUAL AUTHENTICATION SCHEME
Challenge–response authentication is an authentication process by verifying an identity
using the required authentication information. This authentication information is usually a value
and that are to be computed in response for inevitable challenge. Challenge–response
authentication helps to crack the problem of exchanging session keys for encryption. This is
chiefly effective for man-in-the-middle attack, because without knowing the secret the attacker
will not be able to derive the session key. Through this protocol we are able to state things other
than the secret value. Every challenge–response sequence is unique to ensure a challenge by
employing a cryptographic nonce in the authentication protocol.
Mutual authentication is percolated using a challenge–response handshake in both
directions. Mutual authentication is the process to authenticate the both ends of transmission
that is authentication between sender and receiver. This is the basic function for both private and
public communication. It is also known as two-way authentication where two parties
authenticating each other suitably. It refers to a one node authenticating themselves to another
node and that node authenticating itself to the first node in such a way that both parties are
assured of the others' identity.
Mutual authentication scheme is anticipated in this paper for identifying the replicated
mobile sink. Figure 6 describes the pseudo code for mutual authentication scheme. Mobile Sink
(MS) sends mobile sink challenge (MSC) to the Access point (AP). AP generates the challenge
and Access point response (APR) calculates the hash function using APC, MSC and the random
number. If MS receives is not equal to null then MS calculates the estimated value using APC
and APR. If the estimated value equal to APR then mobile sink response (MSR) evaluates the
hash function using APC, MSC and random number. If AP receives MSR and AP is not equal to
null then AP calculates the estimated value using MSC and MSR. If the estimated value equals
to MSR then MS is authenticated as a trusted node or else MS is the replicated node.
⊕ ⊕
⊕
⊕
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
90
Fig 6. Pseudo code for Mutual Authentication Scheme
7. RESULT ANALYSIS
The proposed scheme has been implemented and analysed in the network simulator
NS2. The possible outcomes when there is a change in the key size is to be determined. The
various sets of key size is given and the change of key size broadcasted from mobile sink to
stationary access node and stationary access node to sensor node is to be determined. Table 1
shows the calculation of broadcasting the key from the mobile sink to stationary access node
and stationary access node to sensor node.
Table 1. Calculation of Broadcasting the Key of Various Size
Size of Key
Generated in
Mobile Sink
Size of Key
Broadcasted to
Stationary Access
Node
Size of Key
Generated in
Stationary Access
Node
Size of Key
Broadcasted to
Sensor Node
5 4 5 4
10 9 10 9
20 19 20 19
30 29 30 29
40 39 40 39
If the key size is larger it should be stored in a disk file which can be discovered by
someone else. Thus large key size is not only convenient to use but also it is a security risk. It
considerably takes longer time to encrypt and decrypt messages and broadcast the generated
key. So it is convenient to use the smaller key size. The key size used in this project is 4 (32
bit). Thus the following analysis shows that as the size of the polynomial pool increases the
probability of sharing the key size also increases
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
91
The key is generated in the static polynomial pool and it is broadcasted to the sensor
node. Fig. 7 and Fig. 8 represent the sharing of the key from static polynomial pool to the
stationary access node and sensor node.
Fig 7. The probability that a sensor and stationary access node share a static polynomial
versus the size
Fig 8. The probability that a sensor and stationary access node share a static polynomial
versus the size .
7. CONCLUSIONS
The security performance of the three tier scheme can be carried out by strengthening
the authentication mechanism between stationary access nodes and sensor nodes. We used the
one-way hash chains algorithm in conjunction with the static polynomial pool-based scheme.
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
92
The network resilience is significantly improved to the mobile sink replication attack using
random pair wise key pre distribution compared to single polynomial pool-based key pre
distribution approach. The use of key pools and stationary access nodes that carry polynomials
from the mobile pool of the network will inhibit an attacker from collecting sensor data, by
deploying a replicated mobile sink. The proposed key distribution scheme reduces the
computational cost in the nodes.
REFERENCES
[1] Amr Rasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor
Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE
Computer Society, VOL. 23, NO. 5, pp 958-965.
[2] H. Chan, A. Perrig, and D. Song(2003), “Random Key Pre-Distribution Schemes for Sensor
Networks,” Proc. IEEE Symp. Research in Security and Privacy.
[3] D. Liu, P. Ning, and R.Li(2003) ” Establishing Pairwise Keys in Distributed Sensor Networks,”
Proc. 10th ACM Conf. Computers and Comm. Security, pp. 52-61.
[4] L. Eschenauer and V.D. Gligor(2002) “A Key-Management Scheme for Distributed Sensor
Networks,” Proc. ACM Conf. Computer Comm. Security, pp. 41-47.
[5] H. Chan, A. Perrig, and D. Song(2004), “Key Distribution Techniques for Sensor Networks,”
Wireless Sensor Networks, Kluwer Academic, pp. 277-303.
[6] D. Liu and P. Ning,(2003) “Location-Based Pairwise Key Establishments for Static Sensor
Networks,” Proc. First ACM Workshop Security Ad Hoc and Sensor Networks.
[7] A. Rasheed and R. Mahapatra(2009), “A Key Pre-Distribution Scheme for Heterogeneous
Sensor Networks,” Proc. Int’l Conf. Wireless Comm. and Mobile Computing Conf. (IWCMC
’09), pp. 263-268.
[8] T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm,(2005) “Vital Signs Monitoring and
Patient Tracking over a Wireless Network,” Proc. IEEE 27th Ann. Int’l Conf. Eng. Medicine and
Biology Soc. (EMBS).
[9] H. Deng, W. Li, and D.P. Agrawal,(2002) “Routing Security in Wireless Ad Hoc Networks,”
Proc. IEEE Comm. Magazine, pp. 70-75.
[10] Parno B, Perrig A, Gligor V.(2005) “Distributed Detection of Node Replication Attacks in
Sensor Networks” In: Proceedings of the IEEE Symposium on Security and Privacy; pp.49-63.
[11] Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, (2004)“Efficient Collection of Sensor Data in Remote
Fields Using Mobile Collectors,” Proc. 13th Int’l Conf. Computer Comm. and Networks
(ICCCN ’04).
[12] M.Conti, R. Di Pietro,L.V. Mancini and A. Mei (2007)“A randomized, efficient, and distributed
protocol for the detection of node replication attacks in wireless sensor networks” In ACM
MobiHoc, pages 80-89.
[13] Jun-Won Ho, Donggang Liu, Matthhew wright (2009) “ Distributed Detection of replica node
attacks with group deployment knowledge in wireless sensor networks”, Ad Hoc Networks,
pp:1476-1488.
[14] Chia-Mu, Chun-Shien, Lu., and Sy-Yen Kuo (2008) “Mobile Sensor Network Resilient Against
Node Replication Attacks”, SECON ’08. 5th
Annual IEEE communications Society conference,
pp.597-599.
[15] Chia-Mu, Chun-Shien, Lu., and Sy-Yen Kuo (2009) “Efficient Distributed and Detection of
Nodes Replication Attacks in Mobile Sensor Networks”, IEEE 2009.
13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
93
[16] A. Rasheed and R. Mahapatra,(2007) “An Energy-Efficient Hybrid Data Collection Scheme in
Wireless Sensor Networks,” Proc. Third Int’l Conf. Intelligent Sensors, Sensor Networks and
Information Processing.
[17] W. Zhang, G. Cao, and T. La Porta(2003), “Data Dissemination with Ring-Based Index for
Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), pp. 305-314.
[18] L. Hu and D. Evans(2004), “Using Directional Antenna to Prevent Wormhole Attacks,” Proc.
Network and Distributed System Security Symp.
Authors
T.Linciya received B.Tech- Computer Science and Enginering (2011) from
Kalasalingam University, Srivillputhur and persuing M.E- Computer
Science and Engineering in Easwari Engineering College, Chennai. The
current project is regarding Three tier security scheme.
Anandkumar K.M. received the B.E. degree in the year 2000 from
Bharathiyar University and M.Tech in the year 2006 from
Dr.M.G.R.University and currently doing the research in Anna University,
Chennai. He is an assistant professor in the Department of Computer
Science and Engineering, Easwari Engineering College, Anna University,
Chennai. His main research interests focus on Pervasive Computing,
Wireless Sensor Networks and Healthcare applications. He published many
papers in National and International Conferences. He is an active lifetime
member of ISTE and CSI in India.