IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of
messages, battery exhausting, and nodes compromising. While most of these attacks can be
dealt with through cryptographic security protocols provided by key management schemes,
there are always a few that manage to really cause problems. One such attack that is most
common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture
and compromise some nodes and inject them into several locations throughout the network in
order to conduct other types of attacks. Moreover, if this attack is not detected early, then these
replicated injected nodes will consume a large amount of the network resources. In this paper,
we analyze several key management schemes that can be used for checking integrity and
preventing cloning attacks. After analyzing the problems associated with these schemes, we
propose a model that allows us to distinguish between legitimate nodes and cloned nodes in
such sensor networks.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of
messages, battery exhausting, and nodes compromising. While most of these attacks can be
dealt with through cryptographic security protocols provided by key management schemes,
there are always a few that manage to really cause problems. One such attack that is most
common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture
and compromise some nodes and inject them into several locations throughout the network in
order to conduct other types of attacks. Moreover, if this attack is not detected early, then these
replicated injected nodes will consume a large amount of the network resources. In this paper,
we analyze several key management schemes that can be used for checking integrity and
preventing cloning attacks. After analyzing the problems associated with these schemes, we
propose a model that allows us to distinguish between legitimate nodes and cloned nodes in
such sensor networks.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
From the radar and military research world’s, the Ultra-WideBand Impulse Radio (UWB-IR) was
adopted in the telecommunications world in the 1990’. Currently, the UWB-IR technology is an
interesting candidate for close range Wireless Sensors Networks (WSNs). It is particularly attractive
for industrial sensor networks due to its resilience to multipath interference, simple transceiver
circuitry, accurate ranging ability, and low transmission power. In order to secure data and communications
in the Ad-Hoc UWB-IR networks, UWB-IR requires suitable encryption protocols. In
this paper, we review and summarize the IEEE 802.15.4 security sub-layer protocol of UWB-IR
based Symmetric Key Cryptography scheme. Then, we highlight the different vulnerabilities and
weaknesses present in this type of scheme. Finally, we prove, after a deep examination of multiple
Public Key Cryptography (PKC) schemes, that the certificateless one is the most suitable for Ad-Hoc
UWB-IR networks characterized by nodes mobility. Indeed, we have also evaluated and analyzed the
different public key cryptosystems (PKCS) and concluded that NTRU is the most optimum public
key cryptosystem to be used with the certificateless scheme in order to secure data and communications
in Ad-Hoc UWB-IR Networks. This is due to the fact that it is the fastest PKCS to provide
different security levels at a high speed with very constrained resources.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
From the radar and military research world’s, the Ultra-WideBand Impulse Radio (UWB-IR) was
adopted in the telecommunications world in the 1990’. Currently, the UWB-IR technology is an
interesting candidate for close range Wireless Sensors Networks (WSNs). It is particularly attractive
for industrial sensor networks due to its resilience to multipath interference, simple transceiver
circuitry, accurate ranging ability, and low transmission power. In order to secure data and communications
in the Ad-Hoc UWB-IR networks, UWB-IR requires suitable encryption protocols. In
this paper, we review and summarize the IEEE 802.15.4 security sub-layer protocol of UWB-IR
based Symmetric Key Cryptography scheme. Then, we highlight the different vulnerabilities and
weaknesses present in this type of scheme. Finally, we prove, after a deep examination of multiple
Public Key Cryptography (PKC) schemes, that the certificateless one is the most suitable for Ad-Hoc
UWB-IR networks characterized by nodes mobility. Indeed, we have also evaluated and analyzed the
different public key cryptosystems (PKCS) and concluded that NTRU is the most optimum public
key cryptosystem to be used with the certificateless scheme in order to secure data and communications
in Ad-Hoc UWB-IR Networks. This is due to the fact that it is the fastest PKCS to provide
different security levels at a high speed with very constrained resources.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
This paper presents a novel scheme that provides high level of security and privacy in a Wireless Mesh
Network (WMN). We combine an approach of Network Coding with multiple layered encryption of onion routing for a WMN. An added superior feature provides higher level of security and privacy. Sensitive network information is confined to 1-hop neighborhood which is available anyways in a wireless medium with nodes using a bivariate polynomial. The only routing information divulged to a relay node is about next hop. No plain text is ever transmitted and all data can only be decrypted by its source and destination.Prior work finds it difficult to enforce encryption with network coding without divulging in complete
routing information,hence losing privacy and anonymity. We compare our scheme with other existing approach for several networks. The preliminary results show this work to provide superior security and anonymity at low overhead cost.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Security Key Management Model for Low Rate Wireless Personal Area Networks (20)
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Security Key Management Model for Low Rate Wireless Personal Area Networks
1. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 192
Security Key Management Model for
Low Rate Wireless Personal Area Networks
Anass RGHIOUI rghioui.anass-etu@uae.ac.ma
Laboratory of Informatics, Systems and Telecommunications
Faculty of Science and Technology of Tangier
Abdelmalek Essaadi University, Morocco
Said BOUCHKAREN sbouchakaren@uae.ac.ma
Laboratory of Technology of Information and Communication
National School of Applied Sciences of Tangier
Abdelmalek Essaadi University, Morocco
Anass KHANNOUS khannous@ensat.ac.ma
Laboratory of Informatics, Systems and Telecommunications
Faculty of Science and Technology of Tangier
Abdelmalek Essaadi University, Morocco
Mohammed BOUHORMA m.bouhorma@fstt.ac.ma
Laboratory of Informatics, Systems and Telecommunications
Faculty of Science and Technology of Tangier
Abdelmalek Essaadi University, Morocco
Abstract
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless
Personal Area Network) are characterized by low computation, memory and storage space, and
they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the
other hand, this makes them very vulnerable to security issues, as they are low energy so they
cant implement current security solutions, and they are deployed in non-secure environments that
makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security
of the bootstrapping and commissioning phases as the percentage of existing of an intruder in
this time is very low. In this paper, we propose a security model for LR-WPANs based on
symmetric cryptography, which takes into account securing the bootstrapping phase, with an
analysis of the effectiveness of this proposal and the measures of its implementation.
Keywords: LR-WPAN, Low Rate Wireless Personal Area Network, IEEE 802.15.4, Network
Security, Key Management System.
1. INTRODUCTION
R WPAN [1] is a family of ad hoc networks for low-resource devices known by their low power
consumption, low range and low debit. To communicate, these devices implement the IEEE
802.15.4 protocol [2] in the two lower layers, i.e. data link layer and physical layer. This protocol
was designed specifically for this type of devices. It divides them into two types:
• FFD (Full Function Device) with all possible functions, must be at least one in a network, act as
a PAN coordinator or a router, can communicate with all devices within the same network.
• RFD (Reduced Function Device) with limited functions, act as a sensor or actuator, can only
communicate with FFDs.
2. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 193
802.15.4 defines two types of topologies: hierarchical and distributed. In hierarchical topologies
devices are placed in groups as clusters, each cluster is managed by a cluster-head. Into a
cluster, cluster-heads can communicate with each other, but devices can communicate only with
their cluster-head.
In distributed topologies, all devices contribute to the formation of the network and every one of
them can communicate with others who are within his reach.
Although LR WPAN characteristics helped greatly to the development of ubiquitous networks [3],
they have a high security issues caused by the absence of a security infrastructure. Devices do
not have sufficient resources to implement known security protocols that have proven their
effective-ness [4]. One of the security deficiencies these networks suffer from, is the easy
disclosure of exchanged information between devices into the network [5]. This information can
be used by attackers in order to disrupt the functioning of the network. Among the solutions
proposed to address this problem is the use of a specific cryptographic protocol, which respects
the specificity of LR WPAN networks, as first line defense. Most solutions in this sense choose to
deal with the hierarchical topologies because the devices are placed in an ordered manner and
well controllable [6]. Also, these solutions neglect the security of the network deployment phase,
the bootstrapping, as it takes a very little time to an attacker can intervene. This is true in a
clustered networks, but in a distributed networks bootstrapping phase takes a very important time
before the network being stabilized since the devices are placed in a disorderly manner. Securing
this phase is indispensable, devices exchange important information if they are captured by a
malicious, he can use them to attack the network.
We try to find a suitable solution to secure the bootstrap-ping phase in distributed LR WPAN. We
propose a security model based on symmetric cryptography with a specific key establishment
scheme. In the analysis part, we study the advantages of this solution in terms of its respect of:
security metrics, flexibility, scalability, and energy-efficient.
After this introduction, the structure of the rest of the pa-per is as follows: Section 2 gives a brief
overview of LR WPAN specifications, Section 3 discusses the proposed security model, and
Section 4 presents a theoretical analysis of this model in terms of energy, flexibility and security.
Finally, Section 5 concludes the paper.
2. LR-WPAN SPECIFICATIONS
2.1 Architecture and Security Specifications
In the studied network, it exists three types of devices:
• The base station BS, a powerful machine, is the network supervisor, collects data, manages the
entire network, gathers information and updates devices. It can be protected from attacks by
means of known security systems.
• FFDs act as routers for messages circulating in the network. These messages take one
direction, from or to the base station.
• RFDs play the role of host devices; they represent either sensors or actuators.
3. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 194
FIGURE 1: LR-WPAN topologies and devices.
LR WPANs do not possess an established secure infrastructure, in most cases; nodes are
deployed in non-secure environments. These types of networks are vulnerable to Sniffing attacks
without any difficulty to the attacker. There-from, the data exchanged within this network is non-
confidential. To ensure it confidentiality, it is necessary to use a cryptographic system.
IEEE 802.15.4 defines two types of topologies: star and mesh (Fig 1). In star topology, devices
are placed in groups as clusters, each cluster is managed by a cluster-head. Into a cluster,
devices communicate only with their cluster-head. Cluster-heads can communicate with each
other. In mesh topology, all devices contribute to the formation of the network and every one
communicates with others who are within his reach.
2.2 Related Works
The cryptography solution ensures confidentiality, authentication and integrity of exchanged
messages. By encrypting the data, no one can understand the message contents without
mechanisms to decrypt it.
Applying cryptography in LR WPAN networks must take into consideration characteristics and
constraints of devices implementing this technology, such as low power battery, low storage
ability and low computing capacity, to optimize resources and provide to nodes longer life lasting.
Even if efficient key management systems exist in today’s internet, but their underlying
cryptographic algorithms are either too heavy to run on resource-constrained nodes, or do not
provide a satisfactory security level.
There are two types of cryptographic systems: symmetric and asymmetric. In symmetric
cryptography, both communicating parties must share the same security key. However, for
asymmetric cryptography, each unit has two keys: a public one that attributes to each device
wants to communicate with it, and a private one that keeps it secret, used to decrypt messages
encrypted by the public key. The ad-vantage of asymmetric cryptography is its security keys
mechanism, instead of symmetric cryptography where the problem of how a device will share its
key privately with the other one without being disclosed by unauthorized parties.
Since energy conservation is an essential element in LR WPANs, most of studies concerning LR
WPANs [7], [8], [9], [10], [11] recommends the use of symmetric cryptography because, unlike
asymmetric cryptography, it implements algorithms that do not require a lot of computation, as a
benefit, it does not consume much energy. The difficult part in this kind of cryptography is security
key management since each message sender must have the same shared key with the recipient
to decrypt the encrypted messages. Both of them must have specific mechanism to exchange the
security key without being unveiled by an intruder.
4. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 195
Existing solutions are based either on pre-shared information between nodes of the same
network [12] [13] [14] [15] or depends on a trusted third party that manages the security keys
between these nodes [16]. In the pre-shared based solutions, we find the use of a secret master
key pre-shared between all nodes in the same network to use it as a basis for generation of
session keys between them. Other solution based on multiple pre-shared keys that if a network
gather N nodes, each node will hold N - 1 pairwise key shared with network nodes. In addition,
there are solutions that use a random sharing key and depends on probability functions or nodes
location to find at least one shared key between two nodes on the same network. Yet there are
solutions that use a trusted third party to manage security keys, usually it is the base station or a
local powerful nodes.
3. LR-WPAN SPECIFICATIONS
Our main purpose is not to offer a complete security solution for LR WPAN networks, but the aim
of our study is to pro-pose a security model based on symmetric cryptography, providing a key
establishment solution, for distributed LR WPANs, taking into account the security of the
bootstrap-ping phase. So our scheme can be adapted and implemented by any symmetric
cryptographic system as needed, de-pends on the used application.
3.1 Assumptions
We suppose that LR WPAN consists of following units: a base station, routers and hosts. Each
one of routers and hosts has a unique identifier. Hosts do not communicate with each other.
Notation Description
BS Base Station
ID Unique IDentication number
Di Device i
L Device level in network, relative to the BS
SBS Generated seed by BS
SDi Generated seed by a device Di
KDi
Symmetric key generated by a device Di
KDi,BS
Symmetric key shared between Di and BS
(A) KDi,BS
Encrypted message A by KDi,BS
TABLE 1: List of Notations.
All devices are located in the network in a distributed way, but no one is outside the reach of
other network devices. Thus, each host is connected to at least one router.
Communications within the network are of two types: communications exchanged between the
devices and the base station, and those exchanged between the devices themselves to establish
connections and update the network topology.
In the base station, we create a database of devices that will be in the network, it is implemented
by data concerning these devices. The both information necessary for our solution are the
identifier and the address of each device.
Every device Di has two type of security keys: KDi,BS
a pairwise key between Di and the base
station BS, and KDi,j
between two devices Di and Dj. To generate a KDi,BS
key, we use a base
station generated seed SBS and the device ID. To generate KDi,j
, we use a device generated
seed SDi.
The choice of the cryptographic algorithm is left to the user, also the choice of the method to
which it will combine between S and the device ID to generate the key, according to its needs and
its deployment environment.
5. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 196
3.2 Solution Purpose
During the network start-up, the bootstrapping phase, devices need to exchange them identities
and other information to make connections and update them routing scheme. An attacker can
easily steal this information at this stage and use them after in his attacks.
Our solution purpose is to develop a security model suggesting a scheme for pairwise key
establishment at bootstrapping phase, which will secure the two kinds of communication existing
in this network: communication be-tween a device and the base station, and communication
between two devices, a host and a router, or two routers.
4. SECURITY KEYS ESTABLISHEMENT
4.1 KDi,BS
Establishment
As described in Fig. 2, the base station BS generates a seed SBS, sends it to the devices in the
first row, the message is determined as a message of level L1 since it belongs to the BS, which
represents the head of the network.
A device Di that receives this message will keep the seed, increment the level L of the received
message and make it as its level, so if the first message that is generated by the base station
equal to 1. The first devices that receive this message will have L2 , and so on, each node that
receives this message for the first time will increment its level. Thus, it records the sender
address of this message as its gateway to the BS. Thereafter, each node will send the received
seed to other devices, in this case: if a node has already received the seed, it will check the level
of the sender, if it is less than or equal to its level, it will reject it, otherwise it will record the sender
address as its second gateway. If a device receives the message for the first time, it will proceed
as cited before.
So on, until all the devices in the network receives the seed SBS. This way, each device will use
the seed with its own ID to generate the secret key to encrypt its communications with the BS.
Since the base station has the seed and all devices IDs in its database, it will generate for each
one its appropriate security key. Upon receiving an encrypted message, it will check the address
of the sender to know its key that will use to decrypt the message.
FIGURE 2: KDi,BS
generation messages exchange protocol.
6. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 197
4.2 KDi,j
Establishment
After that each device in the network has a symmetric key KDi,BS
shared with the base station,
they will need to communicate with each other to share some information to up-date them routing
tables. For this (Fig. 3), each device generates its own seed SDi and use it with its ID to generate
a symmetric key KDi
in order to share it with its nearest devices. If a two devices Di and Dj want
to establish a secure communication, firstly, they exchange hello messages, including them level
L. The device that has the level less than the other, which is to say it is in a position nearest to
the base station, will deal with authentication procedures and key exchange.
As described in Fig. 2, assuming that Di level less than Dj. In this case, Di records in a message
Dj address and its own key KDi
, encrypts this message by its key KDi,BS
and transfers it to the
base station. The latter, i.e. the BS, decrypting this message will understand that the node owner
of the address contained in the message, i.e. Dj, wants to communicate with the node sending
the message, which is Di. The base station will check them in its database, if it is OK, it encrypts
the key of the sender node KDi
with the solicited node key KDi,BS
and sends it to this latter, i.e.
Dj, to use it to communicate securely with the other node Di.
FIGURE 3: KDi,j
generation messages exchange protocol.
5. PERFORMANCE EVALUATION
We evaluate our work relative to three criteria: energy and time efficiency, an essential element
for LR WPAN networks, flexibility and scalability of this model in a dynamic network like
distributed networks and security our main objective of this study.
The evaluation of our scheme is based on simulations made on the TOSSIM simulator of TinyOS.
The simulations were compiled for the TelosB platform. TelosB is based on the low-power
microcontroller MSP430 16-bit with a clock frequency of 4 MHz. It implements the IEEE 802.15.4
7. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 198
transceiver CC2420 with a claimed data rate of 250 Kbps. We used AES 128-bit as the
symmetric cryptography protocol. We used PowerTOSSIM plugin for energy analysis.
5.1 Energy Cost
From energy point of view (Fig. 4), which is an essential metric for LR WPAN networks, and a
critical criterion of choice to adopt or not a solution, our model does not require a lot of calculation
or exchange between devices to establish security keys, it can be considered as an energy-
economizer.
Our model is based on symmetric cryptography that is recommended by experts in the field as an
appropriate solution for LR WPANs. Our proposal for key management in our scheme has two
key types to secure two important types of communication within this network communication be-
tween the base station and network devices, and communication between these devices, so, any
device have to store only its symmetric key shared with the base station, and the keys of these
gateways, i.e. the router devices with a level less than it and convey its messages to the base
station. Network device uses its ID to establish the key; it does not need to store other additional
information that will charge its space storage. In terms of computation, a device only needs to
combine between the Seed and its ID to have the key, an operation that not require many
computation processes.
FIGURE 4: Key protocol energy cost.
5.2 Time Evaluation
The time of generation of a symmetric key is negligible. However, the key distribution takes a
significant time, with the increase in the number of nodes, the time spent in key distribution
increases linearly, and this makes the graph follow a linear trend (Fig. 5).
Several factors can influence the time of the distribution key as devices gathering, network
topology, routing protocol, a device response time, total number of devices on a net-work,
average number of neighboring devices, etc.. This will affect any used key distribution protocol.
To accelerate time distribution and key management, we used the idea of levels. During the
generation and distribution of keys, the devices need to exchange messages between them, so
more than the number of devices increase the more it will take much time, and we fall into a
redundancy in processing the same information several times. Separate devices in levels, where
each level device communicates only with the upper or lower level devices, will limit the number
of communicating to each device and therefore transmit faster the information. Thus, the same
information will propagate from one level to another instead of spread from one device to another
that will accelerate the distribution of information through the entire network in a very short time.
8. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 199
FIGURE : Key management (generation and distribution) time
5.3 Scalability
In distributed networks, two key elements are important to take into consideration, flexibility and
scalability; we deal with these two concepts by designing a model that tolerates changes in
topology and do not depend in a specific infrastructure. Our model is flexible towards changes in:
topology, devices positions, and network density, because each device has a specific key sharing
with the base station, in any physical position the device takes in the network, both can establish
a secure communication using their shared key. A device can easily change a gateway by
another, for any reason: optimization, due to a malfunction of an equipment, a change of position,
or for some other reason, it will request the connection establishment with this new router, it has
only forward its request to the base station for verification and exchanging keys. In case of a new
device is being add to the network, it must be previously added to the base station database, if it
is OK, it only has to make a solicitation to join the network to the more nearest router to establish
a connection in the same way mentioned above.
5.4 Adaptability
Our schema can be adapted to any LR WPAN network, it has been designed is based on the
exchange of information between the devices themselves, without relying on a given
infrastructure or specific devices.
Our solution facilitates the establishments of new trust relationships between devices without
sharing pre-shared information, devices must only be subscribed in the base station database to
join the network and communicate with network devices. In addition, the key distribution method
in our schema does not depend on a specific topology; even clustered or mesh topology can
implement this solution.
Key generation mechanism are simple and used in all symmetric cryptography algorithms, the
device has only to combine between the received seed and its ID to generate a key; we left to the
user the choice of the appropriate function according to its context. Even generated key function
can be negotiated between the base station and a device . For example, if network devices
generate a key with a hush function and does not implement this function, the base station can
ordred it to generate the key only by XORing the seed and its ID.
5.5 Security
Our solution ensures confidentiality, authentication and authorization of communications within
the network. All communications and data exchanged in the network are encrypted, the only
information exchanged in plaintext is the seed generated by the base station that represents only
one element among others that are well secured to establish the key. Thus, no outside device
unless those defined in the base station database has permission to join the network, or has the
possibility of establishing a security key because it does not have mechanism that make it able to
9. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 200
generate the key, the thing that will make it legitimate and can join the network as a normal
device. To generate the key, an intruder must be subscribed in the base station, i.e. the base
station database must possess its ID, which is difficult as for non-authorized person to add or
modify in this database as it is localized in the base station, a powerful and well secured machine.
In addition, a compromised device and a disclosure of its secrets presents no danger to the
network since it does not affect any other device. Our solution proposes two types of keys: a
unique pairwise key shared between the network device and the base station, and a pairwise key
shared only between communicated nodes. Unlike solutions that are based on group key or
network key solutions, a compromised node divulge only its own key and its shared key with its
neighboring nodes. Even if, as devices change and update their keys and their neighbors
frequently, the attacker can only decrypts the actual and new encrypted messages as he is not
possess the old keys, the keys of ended sessions.
We avoided sharing of any information that may present a risk to the network; the key generation
is done in the device itself. Thus, we do not share in the network devices IDs, so no intruder can
take a legitimate device ID by a sniffing at-tack. The base station is a powerful machine; it was
given the role of monitoring the network basing on its database of legitimate network devices.
6. CONCLUSION
We presented a settlement security keys for symmetric cryptography in order to secure the
bootstrapping phase of LR WPANs. This model is based on the establishment of two security
pairwise keys: The first is generated by a single device with a seed sent by the base station,
shared between the two in order to secure them communication. The second is also unique to
each device; it can be share with one or more other adjacent devices to update their routing
tables.
This model ensures the confidentiality and devices authentication as no intruder cannot get a
false ID or set the security key to integrate the network. The analysis showed that this model
meets the measures that must be taken into account for LR WPANs, such as energy
conservation, adaptation to the network flexibility and scalability.
We have not defined symmetric cryptography algorithms or used of specific applications, to give
to the user the choice according to his needs. This model can also be used for hierarchical
network topologies, and able to add additional security features to make it more robust.
We estimate subsequently try our scheme to other platforms to compare the results we get. Thus,
we intend to try it with other technologies that use the IEEE 802.15.4 standard as Zigbee and
6LoWPAN.
7. REFERENCES
[1] F. Chen, N. Wang, R. German, et F. Dressler, Performance Eval-uation of IEEE 802.15.4 LR-
WPAN for Industrial Applications , in Fifth Annual Conference on Wireless on Demand
Network Sys-tems and Services, 2008. WONS 2008, 2008, p. 89-96.
[2] J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, et B. Heile, IEEE 802.15.4: a
developing standard for low-power low-cost wireless personal area networks , IEEE Netw.,
vol. 15, no 5, p. 12-19, sept. 2001.
[3] J. Zheng et M. J. Lee, Will IEEE 802.15.4 make ubiquitous net-working a reality?: a
discussion on a potential low power, low bit rate standard , IEEE Commun. Mag., vol. 42, no
6, p. 140-146, juin 2004.
[4] S. Tennina, M. Tiloca, J.-H. Hauer, M. Bouroche, M. Alves, A. Koubaa, P. Jurcik, N. Pereira,
R. Severino, E. Tovar, G. Dini, and R. Daidone, Amendments to the IEEE 802.15.4 Protocol,
10. Anass RGHIOUI, Said BOUCHKAREN, Anass KHANNOUS & Mohammed BOUHORMA
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (5) : 2014 201
in IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems
with Quality-of-Service Constraints, Springer Berlin Heidelberg, 2013, pp. 85112.
[5] T. Kennedy et R. Hunt, A Review of WPAN Security: Attacks and Prevention, in Proceedings
of the International Conference on Mobile Technology, Applications, and Systems, New York,
NY, USA, 2008, p. 56:156:8.
[6] S. Ullah, M. Mohaisen, et M. A. Alnuem, A Review of IEEE 802.15.6 MAC, PHY, and Security
Specifications , Int. J. Distrib. Sens. Netw., vol. 2013, avr. 2013.
[7] Y. Wang, G. Attebury, et B. Ramamurthy, A Survey of Security Issues In Wireless Sensor
Networks , CSE J. Artic., janv. 2006.
[8] P. Boyle et T. Newe, Security Protocols for Use with Wireless Sensor Networks: A Survey of
Security Architectures , in Third International Conference on Wireless and Mobile
Communications, 2007. ICWMC 07, 2007, p. 54-54.
[9] X. Chen, K. Makki, K. Yen, et N. Pissinou, Sensor network security: a survey , IEEE
Commun. Surv. Tutor., vol. 11, no 2, p. 5273, Second 2009.
[10] An Liu, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan, Wireless Sensor Network Security,
International Journal of Distribut-ed Sensor Networks, vol. 2013, Article ID 362385, 1 pages,
2013. doi:10.1155/2013/362385
[11] R. Daidone, G. Dini, and G. Anastasi, On evaluating the performance impact of the IEEE
802.15.4 security sub-layer, Comput. Commun., vol. 47, pp. 6576, Jul. 2014.
[12] K. Zhang, C. Wang, and C. Wang, “A secure routing protocol for cluster-based wireless
sensor networks using group key management,” In Proc. 4th IEEE International conference
on Wireless Communications, Networking and Mobile Computing (WiCOM’08), 2008, pp. 1–
5.
[13] I. S. Gawdan, C. O. Chow, T. A. Zia, Q. I. Sarhan, “A Novel Secure Key Management for
Hierarchical Wireless Sensor Networks,” In Proceeding of 2011 Third Conference on
Computational Intelligence, Modeling and Simulation (CIMSiM), 2011 , pp. 312 - 316.
[14] F. Kausar, A. Masood and S. Hussain. “An Authenticated Key Management Scheme for
Hierarchical Wireless Sensor Networks,” In Advances in Communication Systems and
Electrical Engineering, Lecture Notes in Electrical Engineering, Vol. 4, 2008, pp. 85-98.
[15] Y. Cheng and D. Agrawal, “An improved key distribution mechanism for large-scale
hierarchical wireless sensor networks,” Ad Hoc Networks (Elsevier), Vol. 5, No. 1, 2007,
pp. 35–48.
[16] T. Landstra, S. Jagannathan, and M. Zawodniok, “Energy-efficient hybrid key management
protocol for wireless sensor networks," International Journal of Network Security, vol. 9, no. 2,
pp. 121-134, Sep. 2009.