SlideShare a Scribd company logo
1 of 8
Effective Key Management in Dynamic Wireless Sensor
Networks
ABSTRACT:
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety
of applications, including military sensing and tracking, patient status monitoring,
traffic flow monitoring, where sensory devices often move between different
locations. Securing data and communications requires suitable encryption key
protocols. In this paper, we propose a Certificate Less-Effective Key Management
(CL-EKM) protocol for secure communication in dynamic WSNs characterized by
node mobility. The CL-EKM supports efficient key updates when a node leaves or
joins a cluster and ensures forward and backward key secrecy. The protocol also
supports efficient key revocation for compromised nodes and minimizes the impact
of a node compromise on the security of other communication links. A security
analysis of our scheme shows that our protocol is effective in defending against
various attacks. We implement CL-EKM in Contiki OS and simulate it using
Cooja simulator to assess its time, energy, communication, and memory
performance.
EXISTING SYSTEM:
 Existing System Techniques use: symmetric key encryption and asymmetric
key based approaches have been proposed fordynamic WSNs.
 Asymmetric key based approaches found the security weaknesses of existing
ECC-based schemes that these approaches are vulnerable to message
forgery, key compromise and known-key attacks. Also, we analyzed the
critical security flaws of that the static private key is exposed to the other
when both nodes establish the session key. Moreover, these ECC-based
schemes with certificates when directly applied to dynamic WSNs, suffer
from the certificate management overhead of all the sensor nodes and so are
not a practical application for large scale WSNs. The pairing operationbased
ID-PKC schemes are inefficient due to the computational overhead for
pairing operations.
DISADVANTAGES OF EXISTING SYSTEM:
 Sensor devices are vulnerable to malicious attacks such as impersonation,
interception, capture or physical destruction, due to their unattended
operative environments and lapses of connectivity in wireless
communication
 Security is one of the most important issues in many critical dynamic WSN
applications.
 Symmetric key encryption suffers from high communication overhead and
requires large memory space to store shared pairwise keys. It is also not
scalable and not resilient against compromises, and unable to support node
mobility. Therefore symmetric key encryption is not suitable for dynamic
WSNs.
 Asymmetric key based approaches suffer from the certificate management
overhead of the entire sensor nodes and so are not a practical application for
large scale WSNs.
PROPOSED SYSTEM:
 In this paper, we present a Certificate Less Effective Key Management (CL-
EKM) scheme for dynamic WSNs. In Certificate Less Public Key
Cryptography (CL-PKC), the user’s full private key is a combination of a
partial private key generated by a key generation center (KGC) and the
user’s own secret value. The special organization of the full private/public
key pair removes the need for certificates and also resolves the key escrow
problem by removing the responsibility for the user’s full private key. We
also take the benefit of ECC keys defined on an additive group with a 160-
bit length as secure as the RSA keys with 1024-bit length.
 In order to dynamically provide both node authentication and establish a
pairwise key between nodes, we build CL-EKM by utilizing a pairing-free
certificate less hybrid signcryption scheme (CL-HSC)
ADVANTAGES OF PROPOSED SYSTEM:
 To support node mobility, our CL-EKM also supports lightweight processes
for cluster key updates executed when a node moves, and key revocation is
executed when a node is detected as malicious or leaves the cluster
permanently.
 CL-EKM is scalable in case of additions of new nodes after network
deployment. CL-EKM is secure against node compromise, cloning and
impersonation, and ensures forward and backward secrecy. The security
analysis of our scheme shows its effectiveness.
SYSTEM MODEL:
SYSTEM ARCHITECTURE:
N4
N5
N1
N2
N3 N6
STORAGE
NODE
MODULES:
 Network Model
 Pairwise Key Generation
 Cluster Formation
 Key Update
MODULES DESCSRIPTION:
Network Model
In the first module, we develop network deployment module. We consider a
heterogeneous dynamic wireless sensor network. The network consists of a number
of stationary or mobile sensor nodes and a BS that manages the network and
collects data from the sensors. Sensornodes can be of two types:
(i) nodes with high processing capabilities, referred to as H-sensors, and
(ii) nodes with low processing capabilities, referred to as L-sensors.
Nodes may join and leave the network, and thus the network size may dynamically
change. The H-sensors act as cluster heads while L-sensors act as cluster members.
They are connected to the BS directly or by a multi-hop path through other H-
sensors. H-sensors and L-sensors can be stationary or mobile.
After the network deployment, each H-sensor forms a cluster by discovering the
neighboring L-sensors through beacon message exchanges. The L-sensors can join
a cluster, move to other clusters and also re-join the previous clusters. To maintain
the updated list of neighbors and connectivity, the nodes in a cluster periodically
exchange very lightweight beacon messages. The H-sensors report any changes in
their clusters to the BS, for example, when a L-sensor leaves or joins the cluster.
The BS creates a list of legitimate nodes, M, and updates the status of the nodes
when an anomaly node or node failure is detected.
Pairwise Key Generation
After the network deployment, a node may broadcast an advertisement message to
its neighborhood to trigger the pairwise key setup with its neighbors. The
advertisement message contains its identifier and public key. At first, two nodes set
up a long-term pairwise master key between them, which is then used to derive the
pairwise encryption key. The pairwise encryption key is short-term and can be
used as a session key to encrypt sensed data.
Cluster Formation
Once the nodes are deployed, each H-sensor discovers neighboring L-sensors
through beacon message exchanges and then proceeds to authenticate them. If the
authentication is successful, the H-sensor forms a cluster with the authenticated L-
sensors and they share a common cluster key. The H-sensor also establishes a
pairwise key with each member of the cluster. To simplify the discussion, we focus
on the operations within one cluster and consider the j th cluster.
Key Update
In order to protect against cryptanalysis and mitigate damage from compromised
keys, frequent encryption key updates are commonly required. In this section we
provide the pairwise key update and cluster key update operations.
1) Pairwise Key Update: To update a pairwise encryption key, two nodes
which shared the pairwise key perform a Pairwise Encryption Key
Establishment process. On the other hand, the pairwise master key does not
require periodical updates, because it is not directly used to encrypt each
session message. As long as the nodes are not compromised, the pairwise
master keys cannot be exposed. 3
2) However, if a pairwise master key is modified or needs to be updated
according to the policy of the BS, the Pairwise Master Key Establishment
process must be executed.
2) Cluster Key Update: Only cluster head H-sensors can update their cluster key. If
a L-sensor attempts to change the cluster key, the node is considered a malicious
node.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA
 IDE : Netbeans 8.0.2
 Database : MYSQL
REFERENCE:
Seung-Hyun Seo, Member, IEEE, Jongho Won, Student Member, IEEE, Salmin
Sultana, Member, IEEE, and Elisa Bertino, Fellow, IEEE, “Effective Key
Management in Dynamic Wireless Sensor Networks”, IEEE TRANSACTIONS
ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 2,
FEBRUARY2015.

More Related Content

What's hot

OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLZachariah Pabi
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksijassn
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd Iaetsd
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
 

What's hot (20)

OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
 
Virtualization
VirtualizationVirtualization
Virtualization
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 

Similar to Effective Key Management in Dynamic Wireless Sensor Networks

Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksNagamalleswararao Tadikonda
 
Effective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkEffective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkPvrtechnologies Nellore
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
 
Effective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor NetworksEffective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor Networks1crore projects
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksLogicMindtech Nologies
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Key Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxKey Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxparuvathavardhinij
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...LogicMindtech Nologies
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 

Similar to Effective Key Management in Dynamic Wireless Sensor Networks (20)

Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
Effective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkEffective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor network
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
Effective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor NetworksEffective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor Networks
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
Paper copy
Paper   copyPaper   copy
Paper copy
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Key Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxKey Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptx
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 

More from vishnuRajan20

Toll management system (1) (1)
Toll management system (1) (1)Toll management system (1) (1)
Toll management system (1) (1)vishnuRajan20
 
Integral erection portal yuvakshetra
Integral erection portal yuvakshetraIntegral erection portal yuvakshetra
Integral erection portal yuvakshetravishnuRajan20
 
Disease inference from health-related uestions vissparse deep learning
Disease inference from health-related uestions vissparse deep learningDisease inference from health-related uestions vissparse deep learning
Disease inference from health-related uestions vissparse deep learningvishnuRajan20
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectorsvishnuRajan20
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMvishnuRajan20
 
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNING
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNINGDISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNING
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNINGvishnuRajan20
 
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...vishnuRajan20
 
captcha and graphical
captcha and graphicalcaptcha and graphical
captcha and graphicalvishnuRajan20
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
 

More from vishnuRajan20 (12)

Byzantine
ByzantineByzantine
Byzantine
 
Toll management system (1) (1)
Toll management system (1) (1)Toll management system (1) (1)
Toll management system (1) (1)
 
Integral erection portal yuvakshetra
Integral erection portal yuvakshetraIntegral erection portal yuvakshetra
Integral erection portal yuvakshetra
 
Disease inference from health-related uestions vissparse deep learning
Disease inference from health-related uestions vissparse deep learningDisease inference from health-related uestions vissparse deep learning
Disease inference from health-related uestions vissparse deep learning
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectors
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEM
 
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNING
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNINGDISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNING
DISEASE INFERENCE FROM HEALTH-RELATED QUESTIONS VIA SPARSE DEEP LEARNING
 
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...
Analysis and Comparison of Energy Efficiency of Android based Indoor/Outdoor ...
 
captcha and graphical
captcha and graphicalcaptcha and graphical
captcha and graphical
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Effective Key Management in Dynamic Wireless Sensor Networks

  • 1. Effective Key Management in Dynamic Wireless Sensor Networks ABSTRACT: Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a Certificate Less-Effective Key Management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks. We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance. EXISTING SYSTEM:  Existing System Techniques use: symmetric key encryption and asymmetric key based approaches have been proposed fordynamic WSNs.  Asymmetric key based approaches found the security weaknesses of existing ECC-based schemes that these approaches are vulnerable to message forgery, key compromise and known-key attacks. Also, we analyzed the critical security flaws of that the static private key is exposed to the other when both nodes establish the session key. Moreover, these ECC-based
  • 2. schemes with certificates when directly applied to dynamic WSNs, suffer from the certificate management overhead of all the sensor nodes and so are not a practical application for large scale WSNs. The pairing operationbased ID-PKC schemes are inefficient due to the computational overhead for pairing operations. DISADVANTAGES OF EXISTING SYSTEM:  Sensor devices are vulnerable to malicious attacks such as impersonation, interception, capture or physical destruction, due to their unattended operative environments and lapses of connectivity in wireless communication  Security is one of the most important issues in many critical dynamic WSN applications.  Symmetric key encryption suffers from high communication overhead and requires large memory space to store shared pairwise keys. It is also not scalable and not resilient against compromises, and unable to support node mobility. Therefore symmetric key encryption is not suitable for dynamic WSNs.  Asymmetric key based approaches suffer from the certificate management overhead of the entire sensor nodes and so are not a practical application for large scale WSNs.
  • 3. PROPOSED SYSTEM:  In this paper, we present a Certificate Less Effective Key Management (CL- EKM) scheme for dynamic WSNs. In Certificate Less Public Key Cryptography (CL-PKC), the user’s full private key is a combination of a partial private key generated by a key generation center (KGC) and the user’s own secret value. The special organization of the full private/public key pair removes the need for certificates and also resolves the key escrow problem by removing the responsibility for the user’s full private key. We also take the benefit of ECC keys defined on an additive group with a 160- bit length as secure as the RSA keys with 1024-bit length.  In order to dynamically provide both node authentication and establish a pairwise key between nodes, we build CL-EKM by utilizing a pairing-free certificate less hybrid signcryption scheme (CL-HSC) ADVANTAGES OF PROPOSED SYSTEM:  To support node mobility, our CL-EKM also supports lightweight processes for cluster key updates executed when a node moves, and key revocation is executed when a node is detected as malicious or leaves the cluster permanently.  CL-EKM is scalable in case of additions of new nodes after network deployment. CL-EKM is secure against node compromise, cloning and impersonation, and ensures forward and backward secrecy. The security analysis of our scheme shows its effectiveness.
  • 5. MODULES:  Network Model  Pairwise Key Generation  Cluster Formation  Key Update MODULES DESCSRIPTION: Network Model In the first module, we develop network deployment module. We consider a heterogeneous dynamic wireless sensor network. The network consists of a number of stationary or mobile sensor nodes and a BS that manages the network and collects data from the sensors. Sensornodes can be of two types: (i) nodes with high processing capabilities, referred to as H-sensors, and (ii) nodes with low processing capabilities, referred to as L-sensors. Nodes may join and leave the network, and thus the network size may dynamically change. The H-sensors act as cluster heads while L-sensors act as cluster members. They are connected to the BS directly or by a multi-hop path through other H- sensors. H-sensors and L-sensors can be stationary or mobile. After the network deployment, each H-sensor forms a cluster by discovering the neighboring L-sensors through beacon message exchanges. The L-sensors can join a cluster, move to other clusters and also re-join the previous clusters. To maintain the updated list of neighbors and connectivity, the nodes in a cluster periodically exchange very lightweight beacon messages. The H-sensors report any changes in their clusters to the BS, for example, when a L-sensor leaves or joins the cluster.
  • 6. The BS creates a list of legitimate nodes, M, and updates the status of the nodes when an anomaly node or node failure is detected. Pairwise Key Generation After the network deployment, a node may broadcast an advertisement message to its neighborhood to trigger the pairwise key setup with its neighbors. The advertisement message contains its identifier and public key. At first, two nodes set up a long-term pairwise master key between them, which is then used to derive the pairwise encryption key. The pairwise encryption key is short-term and can be used as a session key to encrypt sensed data. Cluster Formation Once the nodes are deployed, each H-sensor discovers neighboring L-sensors through beacon message exchanges and then proceeds to authenticate them. If the authentication is successful, the H-sensor forms a cluster with the authenticated L- sensors and they share a common cluster key. The H-sensor also establishes a pairwise key with each member of the cluster. To simplify the discussion, we focus on the operations within one cluster and consider the j th cluster. Key Update In order to protect against cryptanalysis and mitigate damage from compromised keys, frequent encryption key updates are commonly required. In this section we provide the pairwise key update and cluster key update operations. 1) Pairwise Key Update: To update a pairwise encryption key, two nodes which shared the pairwise key perform a Pairwise Encryption Key Establishment process. On the other hand, the pairwise master key does not require periodical updates, because it is not directly used to encrypt each
  • 7. session message. As long as the nodes are not compromised, the pairwise master keys cannot be exposed. 3 2) However, if a pairwise master key is modified or needs to be updated according to the policy of the BS, the Pairwise Master Key Establishment process must be executed. 2) Cluster Key Update: Only cluster head H-sensors can update their cluster key. If a L-sensor attempts to change the cluster key, the node is considered a malicious node. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA  IDE : Netbeans 8.0.2  Database : MYSQL
  • 8. REFERENCE: Seung-Hyun Seo, Member, IEEE, Jongho Won, Student Member, IEEE, Salmin Sultana, Member, IEEE, and Elisa Bertino, Fellow, IEEE, “Effective Key Management in Dynamic Wireless Sensor Networks”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 2, FEBRUARY2015.