This document summarizes a seminar on secure and efficient data transmission for cluster-based wireless sensor networks. It introduces wireless sensor networks and describes their centralized and hierarchical network architectures. It reviews previous work on the LEACH clustering protocol and its pros and cons. It then proposes two new secure transmission protocols called SET-IBS and SET-IBOOS that use identity-based signatures and offline/online signatures respectively to authenticate data transmitted between sensor nodes and cluster heads. The document analyzes the performance and security of the proposed protocols and discusses their applications and potential for future work.
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Secure and Efficient Data Transmission in WSN
1. A SEMINAR ON
SECURE AND EFFICIENT DATA TRANSMISSION
FOR CLUSTER-BASED WIRELESS SENSOR
NETWORKS
By
DeePak M. Birajdar (2015MCS006)
Under the Guidance of
Mrs. S.S.Solapure
3. Introduction
What is Wireless Sensor Network ?
WSN is a Network System that
monitor physical or environmental
conditions.
A Wireless Sensor Network (WSN)
consists of base stations and a
number of wireless sensors (nodes).
Fig Architecture of sensor node
4. Contd..
Types of WSN
Central – Set of node act as source nodes and sink node
controls all source nodes.
Hierarchical – The network is grouped into clusters.
7. Clustering In WSN
Every cluster has leader sensor node called Cluster-head
(CH).
CH aggregate data by leaf node in cluster send to base
station (BS).
Used to achieve the Scalability and management
Maximize node lifetime and reduce the b/w consumption.
8. LITERATURE SURVEY
[1]
S. Sharma and S.K. Jena, “Secure Hierarchical Routing
Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.
Comm., Computing & Security (ICCCS), pp. 146-151,
2011.[2]
Hierarchical or cluster-base routing
protocol for WSNs is the most energy-
efficient among other routing protocols.
[2] A.A. Abbasi and M. Younis, “A Survey on Clustering
Algorithms for Wireless Sensor Networks,”Computer Comm.,
vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3]
Clustering is introduced to WSNs because it
has proven to be an effective approach to
provide better data aggregation and scalability
for large WSNs.
[3]
A. Shamir, “Identity-Based Cryptosystems and Signature
Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-
53,[4]
The scheme assumes the existence of trusted
key generation centres , whose sole purpose is
t o give each user a personalized smart card
when he first join the network.
11. During Set up Phase
Sink node broadcast message to all nodes.
Node generate
random number(RN)
Node have RN<T(n)
become Cluster Head
12. During Steady-state phase
Broadcasting message to all other node from CH.
Node other than CH determine which cluster they belong.
13. Cluster formation
Leaf node transmit sensed
information to CH.
CH then transmit data to sink
Node.
Adaptive clustering for
energy balancing
14. Pros and Cons of LEACH
Pros
it is Powerful and simple.
Network lifetime increased.
Reduce the traffic on sink node as compare to flat topology.
15. Cons
Failure of CHs leads to lack of robustness.
Selection of CH is random, which does not consider energy Consumption.
Does not work well in large scale networks.
There is no fixed routing path with less energy Consumption.
16. Objective
The objective of the secure data transmission for CWSNs is to
guarantee a secure and efficient data transmission between leaf
nodes and CHs, as well as transmission between CHs and the BS.
17. SECURE DATA TRANSMISSION PROTOCOLS
Proposed Work
SET-IBS.
Secure and efficient data transmission by using the identity-based digital
signature.
SET-IBOOS
Secure and efficient data transmission by using the identity-based
online/offline digital signature.
19. Contd…
Protocol Initialization
Time is divided into successive time intervals from the TDMA control.
Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH
communication
corresponding private pairing parameters are preloaded in the sensor
nodes
20. Use the additively homomorphic encryption scheme in [5]
to encrypt the plaintext of sensed data
This scheme allows efficient aggregation of encrypted data at the CHs
and the BS
21. In the protocol initialization, the BS performs the following operations of key
predistribution to all the sensor nodes
Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e)
Select a generator P of G1 randomly
Choose two cryptographic hash functions: H, hash function which maps strings to
elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
22. Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as
the network public key
Preload each sensor node with the security parameters
Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
23. Key Management
leaf sensor node j transmits a message m to its CH i
encrypts the data using the encryption key k from the
additively homomorphic encryption scheme [5].
It contain three operation
-Extraction
-Signature signing
-Verification
24. Extraction
Node j first obtains its private key as sekj = ┬ H(Idj || tj )
Signature signing
The sensor node j picks a random number αj € Z* and compute
θj =e(P,P) αj
Sensor node compute
cj =h(Cj || tj || θj )
бj = cj sekj + αj P
Where< бj || cj > is the digital signature of node j on the
encrypted message Cj.
25. Verification
Upon receiving the message, each sensor node verifies the
authenticity
It checks the time stamp of current time interval tj
if the time stamp is correct, the sensor node further computes
using the time stamp of current time interval tj.
26. the formula below if the received message is authentic
If h( Cj || tj || θj
’ )= h( Cj || tj || θj )= cj then considered message is authentic.
If the verification above fails then considered message is not authentic.
27. Protocol Operation
After the protocol initialization and key management for security , SET-
IBS operates in round during communication
Each round consist two phases
Setup Phase
Stedy -State Phase
28.
29. SET-IBOOS
To reduce the computation and storage costs of signature signing
processing in the IBS scheme, we improve SET-IBS by introducing IBOOS
for security in SET-IBOOS
The SET-IBOOS protocol is designed with the same purpose and scenarios
for CWSNs with higher efficiency
Protocol Initialization – It is similar to that of SET-IBS
Key Management For Security
Protocol Operation
31. Extraction:- Same as that in the IBS scheme.
Offline Signing
store the knowledge for signing online signature when it sends the message ,node j
generates the offline value < б^
j>
Online Signing :-
Node j computes the online signature < б^
j, Zj>
based on the encrypted data Cj and the offline signature б^
j
online signature, in the form of
< Idj, tj, Rj , б j ,Zj, Cj>
Verification : Upon receiving the message, each sensor node verifies the authenticity It
checks the time stamp of current time interval tj
33. Analysis
Results demonstrate that the proposed SET IBS
and SET-IBOOS protocols consume energy
faster than LEACH protocol because of the
communication and computational overhead
for security of either IBS or IBOOS process
34. Security Analysis
Attack Models
Passive Attacks on Wireless Channel
Active Attacks on Wireless Channel
Sinkhole
bogus and replayed routing information attack
35. Solutions to Attacks
Passive Attacks - The sensed data are encrypted by the
homomorphic encryption scheme from [5], which deals with
eavesdropping.
Active Attack - attackers do not have valid digital signature.
37. Conclusion
The main goal is concerning clustering protocols to minimize
the energy consumption of each node, and maximize the
network lifetime of wireless sensor networks
The protocols SET-IBS have better performance than the
existing secure protocols for CWSN.
38. Future Scope
• Reduces the computational overhead for protocol security.
• To maximize the life time of sensor nodes.
• To provide more secure way of data transmission in WSN.
39. Refrences
[1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems.
[2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l
Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
[3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841,
2007
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53,
[5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second
Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005.
[6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation,
Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1
Editor's Notes
Central- Source node sence physical values and send data to sink node. Sink node aggregate the value and process it.
A centralized network is chosen for an application if and only if all the source nodes are in the transmission range of sink node. The node density is such that the sink is capable to monitor and control all the source nodes.
All leaf node are not in the range of base station. So some leaf nodes are rearrange themselves to form cluster head of different cluster.
Leaf node send data to CH and CH send data to BS.
where
P is a priori determined value which stands for the desired percentage of CHs during one round
Ecur is the current energy, and Einit is the initial energy
r is the current round number,
Gn is the set of sensor nodes that have not been CHs in the last b1=c rounds.
Node other than CH determine which cluster they belong based on strength of the received signal.
1.LEACH is a completely distributed approach and requires no global information of network.
2. Network lifetime can be increased by the rotation of cluster-Head, aggregating the data by CHs, TDMA assigned
to Cluster members by the CH, so that most of the nodes in sleep mode.
3. Single-hop routing is possible from sensor node to cluster head, and by this means we can able to save the energy of the network.
4. a large-scalable network without traffic overload can be deployed and by this also better energy efficient network topology can be achieved as compared to the
flat-topology.
It significantly relies on cluster heads rather than cluster members of the cluster for communicating to the sink. Due to this it incurs robustness issues like failure of the cluster heads.
2.
3. LEACH support Single Hop Routing, so it does not work well in large scale networks which need high energy for
transmitting data from CH to BS directly.
Identity-based (IDbased) cryptography, introduced by Shamir Eliminates the necessity for checking the validity of certificates[22]
ID-based digital signature security depends on the hardness of Diffie-Hellman problem. Proposed protocol provides confidentiality, authenticity, non-repudiation, integrity and freshness to the communication between sensor nodes.
We adopt the additively homomorphic encryption scheme in [29] to encrypt the plaintext of sensed data, in which a specific operation performed on the plaintext is equivalent to the operation performed on the ciphertext.
p, q are large numbers
E/Fp lindicate an elliptic curve y2 = x3 + ax + b (4a3+ 27b2 !=0) over a finite field Fp.
G1 denote by a q-order subgroup of the additive group of points in E=Fp
G2 a q-order subgroup of the multiplicative group in the finite field Fp.
The pairing is a mapping e : G1 * G1 ->G2, which is a bilinear map
H, for the point mapping hash function which maps strings to elements in G1, and h, for mapping arbitrary inputs
to fixed-length outputs.
Pick a random integer T C- Zq* as the master key msk, set Ppub = tP as network public key.
a nonce is an arbitrary number that may only be used once.
improve the efficiency
store the knowledge for signing online signature when it sends the message. Notice that, this offline signature can be done by the sensor node itself or by the trustful third party
CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster.
These attacks are pointed to CHs of acting as intermediary nodes because of the limited functions by the leaf nodes in a cluster-based architecture. Since
attackers do not have valid digital signature to concatenate with broadcast messages for authentication, attackers cannot pretend as the BS or CHs to
trigger attacks
Fig. 5 shows the comparison of alive nodes’ number, in which the proposed SET-IBS and SET-IBOOS protocols versus LEACH and SecLEACH protocols. The results demonstrate that the proposed SET-IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch otherattacks like selective forwarding attack, acknowledge spoofing attackand drops or altered routing information.
2 SET-IBS and SET-IBOOS are resilient, and robust to the sinkhole and selective forwarding attacks because the CHs being attacked are capable to ignore all the communication packets with bogus node IDs or bogus digital signatures