Seminar On Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission Presented By Swapnil S. Jagtap Under The Guidance of Guide Name Department of Computer Engineering, Vidya Pratishthan’s College of Engineering, Baramati. October 19, 2018
Contents 1 Introduction 2 Literature Survey 3 Motivation 4 Cluster Network Architecture 5 Proposed Protocols 6 Comparison 7 Conclusion 8 References
Introduction A wireless sensor network (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. Many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings. WSN comes under IEEE 802.15.4 standard. The WSN is built for the application oriented network. Swapnil S. Jagtap CWSN October 19, 2018 1 / 17
Wireless Sensor Node Figure: Components of the Wireless Sensor Node Swapnil S. Jagtap CWSN October 19, 2018 2 / 17
Literature Survey Authors Year Paper Title Description Huang Lu, 2012 Secure & Efficient SET-IBS & Jie Li Data Transmission SET-IBOOS protocols for CWSNs Y. Wang, 2006 A Survey of Security Data aggregation in WSNs G. Attebury, Issues in WSNs for military operations, B. Ramamurthy Symmetric key cryptography Deng Jing, 2004 Balanced Energy Balanced-energy scheduling(BS), Han Yunghsiang, Sleep scheduling Randomized scheduling (RS), Heinzelman Weni scheme for high Distance-based scheduling (DS) density CWSNs Schemes Jamal Al-Karaki, 2004 Routing Techniques Flat-based routing, Ahmed E. Kamal in Wireless Sensor Hierarchical-based routing, Networks Location-based routing Chris Karlof, 2003 Secure Routing in Sinkhole attack, David Wagner Wireless Sensor Hello Flood attack Networks Swapnil S. Jagtap CWSN October 19, 2018 3 / 17
Motivation Day by day we are getting surrounded by number of sensor nodes around us, or we can say that we are becoming dependent on these sensor nodes which we come across in our daily life. This thing motivated me to study about the technology known as Cluster-based Wireless Sensor Networks (CWSNs), which is now a days widely used every where in the industry, medical, agricultural, military, disaster management, environmental fields. Swapnil S. Jagtap CWSN October 19, 2018 4 / 17
Sensors in Smartphone Swapnil S. Jagtap CWSN October 19, 2018 5 / 17
Cluster Network Architecture Figure: Simple Cluster Network Architecture Swapnil S. Jagtap CWSN October 19, 2018 6 / 17
Proposed Protocols 1 Secure and Efficient data Transmission using Identity-Based digital Signature (SET-IBS) 2 Secure and Efficient data Transmission using Identity-Based Online/Offline digital Signature (SET-IBOOS) Swapnil S. Jagtap CWSN October 19, 2018 7 / 17
Phases in the proposed system Figure: Operation in the proposed system Swapnil S. Jagtap CWSN October 19, 2018 8 / 17
Steps for SET-IBS Protocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Signature signing: Given a message M, time-stamp t and a signing key θ, the sending node generates a signature SIG. Verification: Given the ID, M and SIG, the receiving node (CH node) outputs “accept”if SIG is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 9 / 17
Operation in SET-IBS Protocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, ci Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, cj Step 4. CHi ⇒ Gs : IDi, Ts, sched(IDj/tj), σi, ci Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, cj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, ci Swapnil S. Jagtap CWSN October 19, 2018 10 / 17
Steps for SET-IBOOS Protocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Offline signing: Given public parameters and time-stamp t, the CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster. Online signing: From the private key sekID, SIGoffline and message M, a sending node (leaf node) generates an online signature SIGonline. Verification: Given ID, M and SIGonline, the receiving node (CH node) outputs “accept”if SIGonline is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 11 / 17
Operation in SET-IBOOS Protocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, zi Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, zj Step 4. CHi ⇒ Gs : IDi, Ts, alloc(IDj/tj/σj), σi, zi Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, zj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, zi Swapnil S. Jagtap CWSN October 19, 2018 12 / 17
Message Size of Data Transmission For SET-IBS, |IDj| + |ti| + |C| + |σj| + |h(C ti θ)| where, |IDj| and |ti| are 2 bytes |C| is 20 bytes and the hash value |h(C ti θ)| is 20 bytes The total message size is 44+|σj| bytes in SET-IBS. For SET-IBOOS, |IDj| + |tj| + |C| + |σj| + |zj| where, |σj| + |zj| is the online signature of size 2 bytes The total message size is 46 bytes in SET-IBOOS. Swapnil S. Jagtap CWSN October 19, 2018 13 / 17
Comparison Table: Comparison of characteristics of the proposed protocols with other secure data transmission protocols SET-IBS / SET-IBOOS Other Protocols Key Asymmetric Symmetric management Neighborhood Yes Limited authentication Storage Comparatively low Comparatively high cost Network Comparatively high Comparatively low scalability Communication Deterministic Probabilistic overhead Computational Comparatively high Low ∼ High overhead Attack Active and Passive attacks on wireless channel resilience Swapnil S. Jagtap CWSN October 19, 2018 14 / 17
Conclusion We first studied about the wireless sensor nodes and then the wireless sensor networks. We then studied two secure and efficient data transmission protocols for CWSNs, SET-IBS and SET-IBOOS which are efficient in communication and which achieves security requirements in CWSNs. Swapnil S. Jagtap CWSN October 19, 2018 15 / 17
References 1 Huang Lu, Jie Li, and Mohsen Guizani, “Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks,”IEEE Trans. on Parallel and Distributed Systems, 2012. 2 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,”IEEE Commun. Surveys Tuts., vol. 8, no. 2, 2006. 3 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, 2002. 4 A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol,”IEEE Trans. Parallel Distrib. Syst., vol. 13, 2002. 5 P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,”in Proc. IEEE NCA, 2007. Swapnil S. Jagtap CWSN October 19, 2018 16 / 17
6 G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra-Low Power Public Key Cryptography for WSNs,”in Proc. IEEE PerCom Workshops, 2005. 7 R. Yasmin, E. Ritter, and G. Wang, “An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures,”in Proc. IEEE CIT, 2010. 8 H. Lu, J. Li, and H. Kameda, “A Secure Routing Protocol for Cluster-Based WSNs Using ID-Based Digital Signature,”in Proc. IEEE GLOBECOM, 2010. 9 W. Diffie and M. Hellman, “New directions in cryptography,”IEEE Trans. Inf. Theory, vol. 22, no. 6, 1976. 10 Y. Jia, L. Zhao, and B. Ma, “A Hierarchical Clustering-based Routing Protocol for WSNs Supporting Multiple Data Aggregation Qualities,”IEEE Trans. Parallel Distrib. Syst., vol. 4, no. 1-2, 2008. Swapnil S. Jagtap CWSN October 19, 2018 17 / 17
THANK YOU

Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient Data Transmission

  • 1.
    Seminar On Cluster-based WirelessSensor Network (WSN) Methods for Secure and Efficient Data Transmission Presented By Swapnil S. Jagtap Under The Guidance of Guide Name Department of Computer Engineering, Vidya Pratishthan’s College of Engineering, Baramati. October 19, 2018
  • 2.
    Contents 1 Introduction 2 LiteratureSurvey 3 Motivation 4 Cluster Network Architecture 5 Proposed Protocols 6 Comparison 7 Conclusion 8 References
  • 3.
    Introduction A wireless sensornetwork (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. Many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings. WSN comes under IEEE 802.15.4 standard. The WSN is built for the application oriented network. Swapnil S. Jagtap CWSN October 19, 2018 1 / 17
  • 4.
    Wireless Sensor Node Figure:Components of the Wireless Sensor Node Swapnil S. Jagtap CWSN October 19, 2018 2 / 17
  • 5.
    Literature Survey Authors YearPaper Title Description Huang Lu, 2012 Secure & Efficient SET-IBS & Jie Li Data Transmission SET-IBOOS protocols for CWSNs Y. Wang, 2006 A Survey of Security Data aggregation in WSNs G. Attebury, Issues in WSNs for military operations, B. Ramamurthy Symmetric key cryptography Deng Jing, 2004 Balanced Energy Balanced-energy scheduling(BS), Han Yunghsiang, Sleep scheduling Randomized scheduling (RS), Heinzelman Weni scheme for high Distance-based scheduling (DS) density CWSNs Schemes Jamal Al-Karaki, 2004 Routing Techniques Flat-based routing, Ahmed E. Kamal in Wireless Sensor Hierarchical-based routing, Networks Location-based routing Chris Karlof, 2003 Secure Routing in Sinkhole attack, David Wagner Wireless Sensor Hello Flood attack Networks Swapnil S. Jagtap CWSN October 19, 2018 3 / 17
  • 6.
    Motivation Day by daywe are getting surrounded by number of sensor nodes around us, or we can say that we are becoming dependent on these sensor nodes which we come across in our daily life. This thing motivated me to study about the technology known as Cluster-based Wireless Sensor Networks (CWSNs), which is now a days widely used every where in the industry, medical, agricultural, military, disaster management, environmental fields. Swapnil S. Jagtap CWSN October 19, 2018 4 / 17
  • 7.
    Sensors in Smartphone SwapnilS. Jagtap CWSN October 19, 2018 5 / 17
  • 8.
    Cluster Network Architecture Figure:Simple Cluster Network Architecture Swapnil S. Jagtap CWSN October 19, 2018 6 / 17
  • 9.
    Proposed Protocols 1 Secureand Efficient data Transmission using Identity-Based digital Signature (SET-IBS) 2 Secure and Efficient data Transmission using Identity-Based Online/Offline digital Signature (SET-IBOOS) Swapnil S. Jagtap CWSN October 19, 2018 7 / 17
  • 10.
    Phases in theproposed system Figure: Operation in the proposed system Swapnil S. Jagtap CWSN October 19, 2018 8 / 17
  • 11.
    Steps for SET-IBSProtocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Signature signing: Given a message M, time-stamp t and a signing key θ, the sending node generates a signature SIG. Verification: Given the ID, M and SIG, the receiving node (CH node) outputs “accept”if SIG is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 9 / 17
  • 12.
    Operation in SET-IBSProtocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, ci Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, cj Step 4. CHi ⇒ Gs : IDi, Ts, sched(IDj/tj), σi, ci Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, cj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, ci Swapnil S. Jagtap CWSN October 19, 2018 10 / 17
  • 13.
    Steps for SET-IBOOSProtocol for CWSN Setup: The BS generates a master key msk and public parameters param for the private key generator (PKG), and gives them to all sensor nodes. Extraction: Given an ID string, a sensor node generates a private key sekID associated with the ID using msk. Offline signing: Given public parameters and time-stamp t, the CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster. Online signing: From the private key sekID, SIGoffline and message M, a sending node (leaf node) generates an online signature SIGonline. Verification: Given ID, M and SIGonline, the receiving node (CH node) outputs “accept”if SIGonline is valid, and outputs “reject”otherwise. Swapnil S. Jagtap CWSN October 19, 2018 11 / 17
  • 14.
    Operation in SET-IBOOSProtocol Setup phase Step 1. BS ⇒ Gs : IDbs, Ts, nonce Step 2. CHi ⇒ Gs : IDi, Ts, adv, σi, zi Step 3. Lj → CHi : IDi, IDj, Ts, join, σj, zj Step 4. CHi ⇒ Gs : IDi, Ts, alloc(IDj/tj/σj), σi, zi Steady state phase Step 5. Lj → CHi : IDi, IDj, tj, C, σj, zj Step 6. CHi → BS : IDbs, IDi, Ts, F, σi, zi Swapnil S. Jagtap CWSN October 19, 2018 12 / 17
  • 15.
    Message Size ofData Transmission For SET-IBS, |IDj| + |ti| + |C| + |σj| + |h(C ti θ)| where, |IDj| and |ti| are 2 bytes |C| is 20 bytes and the hash value |h(C ti θ)| is 20 bytes The total message size is 44+|σj| bytes in SET-IBS. For SET-IBOOS, |IDj| + |tj| + |C| + |σj| + |zj| where, |σj| + |zj| is the online signature of size 2 bytes The total message size is 46 bytes in SET-IBOOS. Swapnil S. Jagtap CWSN October 19, 2018 13 / 17
  • 16.
    Comparison Table: Comparison ofcharacteristics of the proposed protocols with other secure data transmission protocols SET-IBS / SET-IBOOS Other Protocols Key Asymmetric Symmetric management Neighborhood Yes Limited authentication Storage Comparatively low Comparatively high cost Network Comparatively high Comparatively low scalability Communication Deterministic Probabilistic overhead Computational Comparatively high Low ∼ High overhead Attack Active and Passive attacks on wireless channel resilience Swapnil S. Jagtap CWSN October 19, 2018 14 / 17
  • 17.
    Conclusion We first studiedabout the wireless sensor nodes and then the wireless sensor networks. We then studied two secure and efficient data transmission protocols for CWSNs, SET-IBS and SET-IBOOS which are efficient in communication and which achieves security requirements in CWSNs. Swapnil S. Jagtap CWSN October 19, 2018 15 / 17
  • 18.
    References 1 Huang Lu,Jie Li, and Mohsen Guizani, “Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks,”IEEE Trans. on Parallel and Distributed Systems, 2012. 2 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,”IEEE Commun. Surveys Tuts., vol. 8, no. 2, 2006. 3 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, 2002. 4 A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol,”IEEE Trans. Parallel Distrib. Syst., vol. 13, 2002. 5 P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,”in Proc. IEEE NCA, 2007. Swapnil S. Jagtap CWSN October 19, 2018 16 / 17
  • 19.
    6 G. Gaubatz,J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra-Low Power Public Key Cryptography for WSNs,”in Proc. IEEE PerCom Workshops, 2005. 7 R. Yasmin, E. Ritter, and G. Wang, “An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures,”in Proc. IEEE CIT, 2010. 8 H. Lu, J. Li, and H. Kameda, “A Secure Routing Protocol for Cluster-Based WSNs Using ID-Based Digital Signature,”in Proc. IEEE GLOBECOM, 2010. 9 W. Diffie and M. Hellman, “New directions in cryptography,”IEEE Trans. Inf. Theory, vol. 22, no. 6, 1976. 10 Y. Jia, L. Zhao, and B. Ma, “A Hierarchical Clustering-based Routing Protocol for WSNs Supporting Multiple Data Aggregation Qualities,”IEEE Trans. Parallel Distrib. Syst., vol. 4, no. 1-2, 2008. Swapnil S. Jagtap CWSN October 19, 2018 17 / 17
  • 20.