SlideShare a Scribd company logo
1 of 39
A SEMINAR ON
SECURE AND EFFICIENT DATA TRANSMISSION
FOR CLUSTER-BASED WIRELESS SENSOR
NETWORKS
By
DeePak M. Birajdar (2015MCS006)
Under the Guidance of
Mrs. S.S.Solapure
Contents
 Introduction
 Literature review
 Previous Work
 Objectives
 Proposed Work
 Analysis
 Conclusion
 References
Introduction
What is Wireless Sensor Network ?
 WSN is a Network System that
monitor physical or environmental
conditions.
 A Wireless Sensor Network (WSN)
consists of base stations and a
number of wireless sensors (nodes).
Fig Architecture of sensor node
Contd..
Types of WSN
 Central – Set of node act as source nodes and sink node
controls all source nodes.
 Hierarchical – The network is grouped into clusters.
Centralized Network
There are two different types of nodes - source node and sink nodes
Hierarchical Network
Fig A Fig B
Clustering In WSN
 Every cluster has leader sensor node called Cluster-head
(CH).
 CH aggregate data by leaf node in cluster send to base
station (BS).
 Used to achieve the Scalability and management
 Maximize node lifetime and reduce the b/w consumption.
LITERATURE SURVEY
[1]
S. Sharma and S.K. Jena, “Secure Hierarchical Routing
Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.
Comm., Computing & Security (ICCCS), pp. 146-151,
2011.[2]
Hierarchical or cluster-base routing
protocol for WSNs is the most energy-
efficient among other routing protocols.
[2] A.A. Abbasi and M. Younis, “A Survey on Clustering
Algorithms for Wireless Sensor Networks,”Computer Comm.,
vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3]
Clustering is introduced to WSNs because it
has proven to be an effective approach to
provide better data aggregation and scalability
for large WSNs.
[3]
A. Shamir, “Identity-Based Cryptosystems and Signature
Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-
53,[4]
The scheme assumes the existence of trusted
key generation centres , whose sole purpose is
t o give each user a personalized smart card
when he first join the network.
Previous Work
LEACH Protocol [6]
Two Phase of LEACH
During Set up Phase
 Sink node broadcast message to all nodes.
 Node generate
random number(RN)
 Node have RN<T(n)
become Cluster Head
During Steady-state phase
 Broadcasting message to all other node from CH.
 Node other than CH determine which cluster they belong.
Cluster formation
 Leaf node transmit sensed
information to CH.
 CH then transmit data to sink
Node.
 Adaptive clustering for
energy balancing
Pros and Cons of LEACH
Pros
 it is Powerful and simple.
 Network lifetime increased.
 Reduce the traffic on sink node as compare to flat topology.
Cons
 Failure of CHs leads to lack of robustness.
 Selection of CH is random, which does not consider energy Consumption.
 Does not work well in large scale networks.
 There is no fixed routing path with less energy Consumption.
Objective
 The objective of the secure data transmission for CWSNs is to
guarantee a secure and efficient data transmission between leaf
nodes and CHs, as well as transmission between CHs and the BS.
SECURE DATA TRANSMISSION PROTOCOLS
Proposed Work
 SET-IBS.
Secure and efficient data transmission by using the identity-based digital
signature.
 SET-IBOOS
Secure and efficient data transmission by using the identity-based
online/offline digital signature.
SET-IBS
 Protocol Initialization
 Key Management For Security
 Protocol Operation
Contd…
Protocol Initialization
 Time is divided into successive time intervals from the TDMA control.
Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH
communication
 corresponding private pairing parameters are preloaded in the sensor
nodes
 Use the additively homomorphic encryption scheme in [5]
to encrypt the plaintext of sensed data
 This scheme allows efficient aggregation of encrypted data at the CHs
and the BS
 In the protocol initialization, the BS performs the following operations of key
predistribution to all the sensor nodes
 Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e)
Select a generator P of G1 randomly
 Choose two cryptographic hash functions: H, hash function which maps strings to
elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
 Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as
the network public key
 Preload each sensor node with the security parameters
 Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
Key Management
 leaf sensor node j transmits a message m to its CH i
 encrypts the data using the encryption key k from the
additively homomorphic encryption scheme [5].
 It contain three operation
-Extraction
-Signature signing
-Verification
Extraction
Node j first obtains its private key as sekj = ┬ H(Idj || tj )
Signature signing
 The sensor node j picks a random number αj € Z* and compute
θj =e(P,P) αj
 Sensor node compute
cj =h(Cj || tj || θj )
бj = cj sekj + αj P
 Where< бj || cj > is the digital signature of node j on the
encrypted message Cj.
Verification
 Upon receiving the message, each sensor node verifies the
authenticity
 It checks the time stamp of current time interval tj
 if the time stamp is correct, the sensor node further computes
using the time stamp of current time interval tj.
the formula below if the received message is authentic
If h( Cj || tj || θj
’ )= h( Cj || tj || θj )= cj then considered message is authentic.
If the verification above fails then considered message is not authentic.
Protocol Operation
 After the protocol initialization and key management for security , SET-
IBS operates in round during communication
 Each round consist two phases
 Setup Phase
 Stedy -State Phase
SET-IBOOS
 To reduce the computation and storage costs of signature signing
processing in the IBS scheme, we improve SET-IBS by introducing IBOOS
for security in SET-IBOOS
 The SET-IBOOS protocol is designed with the same purpose and scenarios
for CWSNs with higher efficiency
 Protocol Initialization – It is similar to that of SET-IBS
 Key Management For Security
 Protocol Operation
Key Management
 Extraction
 offline signing
 Online signing
 Verification
 Extraction:- Same as that in the IBS scheme.
 Offline Signing
store the knowledge for signing online signature when it sends the message ,node j
generates the offline value < б^
j>
 Online Signing :-
Node j computes the online signature < б^
j, Zj>
based on the encrypted data Cj and the offline signature б^
j
online signature, in the form of
< Idj, tj, Rj , б j ,Zj, Cj>
 Verification : Upon receiving the message, each sensor node verifies the authenticity It
checks the time stamp of current time interval tj
Operation
Analysis
 Results demonstrate that the proposed SET IBS
and SET-IBOOS protocols consume energy
faster than LEACH protocol because of the
communication and computational overhead
for security of either IBS or IBOOS process
Security Analysis
 Attack Models
Passive Attacks on Wireless Channel
Active Attacks on Wireless Channel
Sinkhole
bogus and replayed routing information attack
Solutions to Attacks
 Passive Attacks - The sensed data are encrypted by the
homomorphic encryption scheme from [5], which deals with
eavesdropping.
 Active Attack - attackers do not have valid digital signature.
Applications
Conclusion
 The main goal is concerning clustering protocols to minimize
the energy consumption of each node, and maximize the
network lifetime of wireless sensor networks
 The protocols SET-IBS have better performance than the
existing secure protocols for CWSN.
Future Scope
• Reduces the computational overhead for protocol security.
• To maximize the life time of sensor nodes.
• To provide more secure way of data transmission in WSN.
Refrences
[1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems.
[2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l
Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
[3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841,
2007
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,
[5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second
Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005.
[6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation,
Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1

More Related Content

What's hot

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor networkShiwangi Thakur
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 

What's hot (20)

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
S04404116120
S04404116120S04404116120
S04404116120
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Presentation1
Presentation1Presentation1
Presentation1
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 

Viewers also liked

Script of a story
Script of a storyScript of a story
Script of a storyjasleen1234
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEEGLOBALSOFTSTUDENTPROJECTS
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeTAIWAN
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 

Viewers also liked (18)

Script of a story
Script of a storyScript of a story
Script of a story
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
Steganography
SteganographySteganography
Steganography
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieee
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
eeca
eecaeeca
eeca
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Steganography
SteganographySteganography
Steganography
 
Leach
Leach Leach
Leach
 
Firefox os
Firefox osFirefox os
Firefox os
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 

Similar to Secure and Efficient Data Transmission in WSN

An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Krishna thesis presentation
Krishna thesis presentationKrishna thesis presentation
Krishna thesis presentationahyaimie
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEEMEMTECHSTUDENTPROJECTS
 
secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...swathi78
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...Shakas Technologies
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
 

Similar to Secure and Efficient Data Transmission in WSN (20)

An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Krishna thesis presentation
Krishna thesis presentationKrishna thesis presentation
Krishna thesis presentation
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
 
secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
E035425030
E035425030E035425030
E035425030
 
550 537-546
550 537-546550 537-546
550 537-546
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
I04503075078
I04503075078I04503075078
I04503075078
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Secure and Efficient Data Transmission in WSN

  • 1. A SEMINAR ON SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS By DeePak M. Birajdar (2015MCS006) Under the Guidance of Mrs. S.S.Solapure
  • 2. Contents  Introduction  Literature review  Previous Work  Objectives  Proposed Work  Analysis  Conclusion  References
  • 3. Introduction What is Wireless Sensor Network ?  WSN is a Network System that monitor physical or environmental conditions.  A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes). Fig Architecture of sensor node
  • 4. Contd.. Types of WSN  Central – Set of node act as source nodes and sink node controls all source nodes.  Hierarchical – The network is grouped into clusters.
  • 5. Centralized Network There are two different types of nodes - source node and sink nodes
  • 7. Clustering In WSN  Every cluster has leader sensor node called Cluster-head (CH).  CH aggregate data by leaf node in cluster send to base station (BS).  Used to achieve the Scalability and management  Maximize node lifetime and reduce the b/w consumption.
  • 8. LITERATURE SURVEY [1] S. Sharma and S.K. Jena, “Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.[2] Hierarchical or cluster-base routing protocol for WSNs is the most energy- efficient among other routing protocols. [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3] Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs. [3] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47- 53,[4] The scheme assumes the existence of trusted key generation centres , whose sole purpose is t o give each user a personalized smart card when he first join the network.
  • 10. Two Phase of LEACH
  • 11. During Set up Phase  Sink node broadcast message to all nodes.  Node generate random number(RN)  Node have RN<T(n) become Cluster Head
  • 12. During Steady-state phase  Broadcasting message to all other node from CH.  Node other than CH determine which cluster they belong.
  • 13. Cluster formation  Leaf node transmit sensed information to CH.  CH then transmit data to sink Node.  Adaptive clustering for energy balancing
  • 14. Pros and Cons of LEACH Pros  it is Powerful and simple.  Network lifetime increased.  Reduce the traffic on sink node as compare to flat topology.
  • 15. Cons  Failure of CHs leads to lack of robustness.  Selection of CH is random, which does not consider energy Consumption.  Does not work well in large scale networks.  There is no fixed routing path with less energy Consumption.
  • 16. Objective  The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
  • 17. SECURE DATA TRANSMISSION PROTOCOLS Proposed Work  SET-IBS. Secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS Secure and efficient data transmission by using the identity-based online/offline digital signature.
  • 18. SET-IBS  Protocol Initialization  Key Management For Security  Protocol Operation
  • 19. Contd… Protocol Initialization  Time is divided into successive time intervals from the TDMA control. Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH communication  corresponding private pairing parameters are preloaded in the sensor nodes
  • 20.  Use the additively homomorphic encryption scheme in [5] to encrypt the plaintext of sensed data  This scheme allows efficient aggregation of encrypted data at the CHs and the BS
  • 21.  In the protocol initialization, the BS performs the following operations of key predistribution to all the sensor nodes  Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e) Select a generator P of G1 randomly  Choose two cryptographic hash functions: H, hash function which maps strings to elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
  • 22.  Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as the network public key  Preload each sensor node with the security parameters  Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
  • 23. Key Management  leaf sensor node j transmits a message m to its CH i  encrypts the data using the encryption key k from the additively homomorphic encryption scheme [5].  It contain three operation -Extraction -Signature signing -Verification
  • 24. Extraction Node j first obtains its private key as sekj = ┬ H(Idj || tj ) Signature signing  The sensor node j picks a random number αj € Z* and compute θj =e(P,P) αj  Sensor node compute cj =h(Cj || tj || θj ) бj = cj sekj + αj P  Where< бj || cj > is the digital signature of node j on the encrypted message Cj.
  • 25. Verification  Upon receiving the message, each sensor node verifies the authenticity  It checks the time stamp of current time interval tj  if the time stamp is correct, the sensor node further computes using the time stamp of current time interval tj.
  • 26. the formula below if the received message is authentic If h( Cj || tj || θj ’ )= h( Cj || tj || θj )= cj then considered message is authentic. If the verification above fails then considered message is not authentic.
  • 27. Protocol Operation  After the protocol initialization and key management for security , SET- IBS operates in round during communication  Each round consist two phases  Setup Phase  Stedy -State Phase
  • 28.
  • 29. SET-IBOOS  To reduce the computation and storage costs of signature signing processing in the IBS scheme, we improve SET-IBS by introducing IBOOS for security in SET-IBOOS  The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency  Protocol Initialization – It is similar to that of SET-IBS  Key Management For Security  Protocol Operation
  • 30. Key Management  Extraction  offline signing  Online signing  Verification
  • 31.  Extraction:- Same as that in the IBS scheme.  Offline Signing store the knowledge for signing online signature when it sends the message ,node j generates the offline value < б^ j>  Online Signing :- Node j computes the online signature < б^ j, Zj> based on the encrypted data Cj and the offline signature б^ j online signature, in the form of < Idj, tj, Rj , б j ,Zj, Cj>  Verification : Upon receiving the message, each sensor node verifies the authenticity It checks the time stamp of current time interval tj
  • 33. Analysis  Results demonstrate that the proposed SET IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
  • 34. Security Analysis  Attack Models Passive Attacks on Wireless Channel Active Attacks on Wireless Channel Sinkhole bogus and replayed routing information attack
  • 35. Solutions to Attacks  Passive Attacks - The sensed data are encrypted by the homomorphic encryption scheme from [5], which deals with eavesdropping.  Active Attack - attackers do not have valid digital signature.
  • 37. Conclusion  The main goal is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks  The protocols SET-IBS have better performance than the existing secure protocols for CWSN.
  • 38. Future Scope • Reduces the computational overhead for protocol security. • To maximize the life time of sensor nodes. • To provide more secure way of data transmission in WSN.
  • 39. Refrences [1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani IEEE Transactions on Parallel and Distributed Systems. [2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. [3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007 [4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53, [5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005. [6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation, Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1

Editor's Notes

  1. Central- Source node sence physical values and send data to sink node. Sink node aggregate the value and process it.
  2. A centralized network is chosen for an application if and only if all the source nodes are in the transmission range of sink node. The node density is such that the sink is capable to monitor and control all the source nodes.
  3. All leaf node are not in the range of base station. So some leaf nodes are rearrange themselves to form cluster head of different cluster. Leaf node send data to CH and CH send data to BS.
  4. where P is a priori determined value which stands for the desired percentage of CHs during one round Ecur is the current energy, and Einit is the initial energy r is the current round number, Gn is the set of sensor nodes that have not been CHs in the last b1=c rounds.
  5. Node other than CH determine which cluster they belong based on strength of the received signal.
  6. 1.LEACH is a completely distributed approach and requires no global information of network. 2. Network lifetime can be increased by the rotation of cluster-Head, aggregating the data by CHs, TDMA assigned to Cluster members by the CH, so that most of the nodes in sleep mode. 3. Single-hop routing is possible from sensor node to cluster head, and by this means we can able to save the energy of the network. 4. a large-scalable network without traffic overload can be deployed and by this also better energy efficient network topology can be achieved as compared to the flat-topology.
  7. It significantly relies on cluster heads rather than cluster members of the cluster for communicating to the sink. Due to this it incurs robustness issues like failure of the cluster heads. 2. 3. LEACH support Single Hop Routing, so it does not work well in large scale networks which need high energy for transmitting data from CH to BS directly.
  8. Identity-based (IDbased) cryptography, introduced by Shamir Eliminates the necessity for checking the validity of certificates[22] ID-based digital signature security depends on the hardness of Diffie-Hellman problem. Proposed protocol provides confidentiality, authenticity, non-repudiation, integrity and freshness to the communication between sensor nodes.
  9. We adopt the additively homomorphic encryption scheme in [29] to encrypt the plaintext of sensed data, in which a specific operation performed on the plaintext is equivalent to the operation performed on the ciphertext.
  10. p, q are large numbers E/Fp lindicate an elliptic curve y2 = x3 + ax + b (4a3+ 27b2 !=0) over a finite field Fp. G1 denote by a q-order subgroup of the additive group of points in E=Fp G2 a q-order subgroup of the multiplicative group in the finite field Fp. The pairing is a mapping e : G1 * G1 ->G2, which is a bilinear map
  11. H, for the point mapping hash function which maps strings to elements in G1, and h, for mapping arbitrary inputs to fixed-length outputs. Pick a random integer T C- Zq* as the master key msk, set Ppub = tP as network public key.
  12. a nonce is an arbitrary number that may only be used once.
  13. improve the efficiency
  14. store the knowledge for signing online signature when it sends the message. Notice that, this offline signature can be done by the sensor node itself or by the trustful third party CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster.
  15. These attacks are pointed to CHs of acting as intermediary nodes because of the limited functions by the leaf nodes in a cluster-based architecture. Since attackers do not have valid digital signature to concatenate with broadcast messages for authentication, attackers cannot pretend as the BS or CHs to trigger attacks Fig. 5 shows the comparison of alive nodes’ number, in which the proposed SET-IBS and SET-IBOOS protocols versus LEACH and SecLEACH protocols. The results demonstrate that the proposed SET-IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
  16. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch otherattacks like selective forwarding attack, acknowledge spoofing attackand drops or altered routing information.
  17. 2 SET-IBS and SET-IBOOS are resilient, and robust to the sinkhole and selective forwarding attacks because the CHs being attacked are capable to ignore all the communication packets with bogus node IDs or bogus digital signatures