A SEMINAR ON SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS By DeePak M. Birajdar (2015MCS006) Under the Guidance of Mrs. S.S.Solapure
Contents  Introduction  Literature review  Previous Work  Objectives  Proposed Work  Analysis  Conclusion  References
Introduction What is Wireless Sensor Network ?  WSN is a Network System that monitor physical or environmental conditions.  A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes). Fig Architecture of sensor node
Contd.. Types of WSN  Central – Set of node act as source nodes and sink node controls all source nodes.  Hierarchical – The network is grouped into clusters.
Centralized Network There are two different types of nodes - source node and sink nodes
Hierarchical Network Fig A Fig B
Clustering In WSN  Every cluster has leader sensor node called Cluster-head (CH).  CH aggregate data by leaf node in cluster send to base station (BS).  Used to achieve the Scalability and management  Maximize node lifetime and reduce the b/w consumption.
LITERATURE SURVEY [1] S. Sharma and S.K. Jena, “Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.[2] Hierarchical or cluster-base routing protocol for WSNs is the most energy- efficient among other routing protocols. [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3] Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs. [3] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47- 53,[4] The scheme assumes the existence of trusted key generation centres , whose sole purpose is t o give each user a personalized smart card when he first join the network.
Previous Work LEACH Protocol [6]
Two Phase of LEACH
During Set up Phase  Sink node broadcast message to all nodes.  Node generate random number(RN)  Node have RN<T(n) become Cluster Head
During Steady-state phase  Broadcasting message to all other node from CH.  Node other than CH determine which cluster they belong.
Cluster formation  Leaf node transmit sensed information to CH.  CH then transmit data to sink Node.  Adaptive clustering for energy balancing
Pros and Cons of LEACH Pros  it is Powerful and simple.  Network lifetime increased.  Reduce the traffic on sink node as compare to flat topology.
Cons  Failure of CHs leads to lack of robustness.  Selection of CH is random, which does not consider energy Consumption.  Does not work well in large scale networks.  There is no fixed routing path with less energy Consumption.
Objective  The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
SECURE DATA TRANSMISSION PROTOCOLS Proposed Work  SET-IBS. Secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS Secure and efficient data transmission by using the identity-based online/offline digital signature.
SET-IBS  Protocol Initialization  Key Management For Security  Protocol Operation
Contd… Protocol Initialization  Time is divided into successive time intervals from the TDMA control. Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH communication  corresponding private pairing parameters are preloaded in the sensor nodes
 Use the additively homomorphic encryption scheme in [5] to encrypt the plaintext of sensed data  This scheme allows efficient aggregation of encrypted data at the CHs and the BS
 In the protocol initialization, the BS performs the following operations of key predistribution to all the sensor nodes  Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e) Select a generator P of G1 randomly  Choose two cryptographic hash functions: H, hash function which maps strings to elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
 Pick the random integer ┬ € Z* as the master key msk , set Ppub = ┬ P as the network public key  Preload each sensor node with the security parameters  Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
Key Management  leaf sensor node j transmits a message m to its CH i  encrypts the data using the encryption key k from the additively homomorphic encryption scheme [5].  It contain three operation -Extraction -Signature signing -Verification
Extraction Node j first obtains its private key as sekj = ┬ H(Idj || tj ) Signature signing  The sensor node j picks a random number αj € Z* and compute θj =e(P,P) αj  Sensor node compute cj =h(Cj || tj || θj ) бj = cj sekj + αj P  Where< бj || cj > is the digital signature of node j on the encrypted message Cj.
Verification  Upon receiving the message, each sensor node verifies the authenticity  It checks the time stamp of current time interval tj  if the time stamp is correct, the sensor node further computes using the time stamp of current time interval tj.
the formula below if the received message is authentic If h( Cj || tj || θj ’ )= h( Cj || tj || θj )= cj then considered message is authentic. If the verification above fails then considered message is not authentic.
Protocol Operation  After the protocol initialization and key management for security , SET- IBS operates in round during communication  Each round consist two phases  Setup Phase  Stedy -State Phase
SET-IBOOS  To reduce the computation and storage costs of signature signing processing in the IBS scheme, we improve SET-IBS by introducing IBOOS for security in SET-IBOOS  The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency  Protocol Initialization – It is similar to that of SET-IBS  Key Management For Security  Protocol Operation
Key Management  Extraction  offline signing  Online signing  Verification
 Extraction:- Same as that in the IBS scheme.  Offline Signing store the knowledge for signing online signature when it sends the message ,node j generates the offline value < б^ j>  Online Signing :- Node j computes the online signature < б^ j, Zj> based on the encrypted data Cj and the offline signature б^ j online signature, in the form of < Idj, tj, Rj , б j ,Zj, Cj>  Verification : Upon receiving the message, each sensor node verifies the authenticity It checks the time stamp of current time interval tj
Operation
Analysis  Results demonstrate that the proposed SET IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
Security Analysis  Attack Models Passive Attacks on Wireless Channel Active Attacks on Wireless Channel Sinkhole bogus and replayed routing information attack
Solutions to Attacks  Passive Attacks - The sensed data are encrypted by the homomorphic encryption scheme from [5], which deals with eavesdropping.  Active Attack - attackers do not have valid digital signature.
Applications
Conclusion  The main goal is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks  The protocols SET-IBS have better performance than the existing secure protocols for CWSN.
Future Scope • Reduces the computational overhead for protocol security. • To maximize the life time of sensor nodes. • To provide more secure way of data transmission in WSN.
Refrences [1] “Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani IEEE Transactions on Parallel and Distributed Systems. [2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. [3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007 [4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53, [5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005. [6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation, Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

  • 1.
    A SEMINAR ON SECUREAND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS By DeePak M. Birajdar (2015MCS006) Under the Guidance of Mrs. S.S.Solapure
  • 2.
    Contents  Introduction  Literaturereview  Previous Work  Objectives  Proposed Work  Analysis  Conclusion  References
  • 3.
    Introduction What is WirelessSensor Network ?  WSN is a Network System that monitor physical or environmental conditions.  A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes). Fig Architecture of sensor node
  • 4.
    Contd.. Types of WSN Central – Set of node act as source nodes and sink node controls all source nodes.  Hierarchical – The network is grouped into clusters.
  • 5.
    Centralized Network There aretwo different types of nodes - source node and sink nodes
  • 6.
  • 7.
    Clustering In WSN Every cluster has leader sensor node called Cluster-head (CH).  CH aggregate data by leaf node in cluster send to base station (BS).  Used to achieve the Scalability and management  Maximize node lifetime and reduce the b/w consumption.
  • 8.
    LITERATURE SURVEY [1] S. Sharmaand S.K. Jena, “Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.[2] Hierarchical or cluster-base routing protocol for WSNs is the most energy- efficient among other routing protocols. [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007[3] Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs. [3] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47- 53,[4] The scheme assumes the existence of trusted key generation centres , whose sole purpose is t o give each user a personalized smart card when he first join the network.
  • 9.
  • 10.
  • 11.
    During Set upPhase  Sink node broadcast message to all nodes.  Node generate random number(RN)  Node have RN<T(n) become Cluster Head
  • 12.
    During Steady-state phase Broadcasting message to all other node from CH.  Node other than CH determine which cluster they belong.
  • 13.
    Cluster formation  Leafnode transmit sensed information to CH.  CH then transmit data to sink Node.  Adaptive clustering for energy balancing
  • 14.
    Pros and Consof LEACH Pros  it is Powerful and simple.  Network lifetime increased.  Reduce the traffic on sink node as compare to flat topology.
  • 15.
    Cons  Failure ofCHs leads to lack of robustness.  Selection of CH is random, which does not consider energy Consumption.  Does not work well in large scale networks.  There is no fixed routing path with less energy Consumption.
  • 16.
    Objective  The objectiveof the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
  • 17.
    SECURE DATA TRANSMISSIONPROTOCOLS Proposed Work  SET-IBS. Secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS Secure and efficient data transmission by using the identity-based online/offline digital signature.
  • 18.
    SET-IBS  Protocol Initialization Key Management For Security  Protocol Operation
  • 19.
    Contd… Protocol Initialization  Timeis divided into successive time intervals from the TDMA control. Time stamps Ts for BS-to-node communication and by tj for leaf-to-CH communication  corresponding private pairing parameters are preloaded in the sensor nodes
  • 20.
     Use theadditively homomorphic encryption scheme in [5] to encrypt the plaintext of sensed data  This scheme allows efficient aggregation of encrypted data at the CHs and the BS
  • 21.
     In theprotocol initialization, the BS performs the following operations of key predistribution to all the sensor nodes  Generate the pairing parameters (p, q, E/Fp,G1 ,G2, e) Select a generator P of G1 randomly  Choose two cryptographic hash functions: H, hash function which maps strings to elements in G1, h for mapping arbitrary inputs to fixed-length outputs.
  • 22.
     Pick therandom integer ┬ € Z* as the master key msk , set Ppub = ┬ P as the network public key  Preload each sensor node with the security parameters  Param = (k,m,p, q, E/Fp,G1 ,G2, e,H,h,P, ┬ )
  • 23.
    Key Management  leafsensor node j transmits a message m to its CH i  encrypts the data using the encryption key k from the additively homomorphic encryption scheme [5].  It contain three operation -Extraction -Signature signing -Verification
  • 24.
    Extraction Node j firstobtains its private key as sekj = ┬ H(Idj || tj ) Signature signing  The sensor node j picks a random number αj € Z* and compute θj =e(P,P) αj  Sensor node compute cj =h(Cj || tj || θj ) бj = cj sekj + αj P  Where< бj || cj > is the digital signature of node j on the encrypted message Cj.
  • 25.
    Verification  Upon receivingthe message, each sensor node verifies the authenticity  It checks the time stamp of current time interval tj  if the time stamp is correct, the sensor node further computes using the time stamp of current time interval tj.
  • 26.
    the formula belowif the received message is authentic If h( Cj || tj || θj ’ )= h( Cj || tj || θj )= cj then considered message is authentic. If the verification above fails then considered message is not authentic.
  • 27.
    Protocol Operation  Afterthe protocol initialization and key management for security , SET- IBS operates in round during communication  Each round consist two phases  Setup Phase  Stedy -State Phase
  • 29.
    SET-IBOOS  To reducethe computation and storage costs of signature signing processing in the IBS scheme, we improve SET-IBS by introducing IBOOS for security in SET-IBOOS  The SET-IBOOS protocol is designed with the same purpose and scenarios for CWSNs with higher efficiency  Protocol Initialization – It is similar to that of SET-IBS  Key Management For Security  Protocol Operation
  • 30.
    Key Management  Extraction offline signing  Online signing  Verification
  • 31.
     Extraction:- Sameas that in the IBS scheme.  Offline Signing store the knowledge for signing online signature when it sends the message ,node j generates the offline value < б^ j>  Online Signing :- Node j computes the online signature < б^ j, Zj> based on the encrypted data Cj and the offline signature б^ j online signature, in the form of < Idj, tj, Rj , б j ,Zj, Cj>  Verification : Upon receiving the message, each sensor node verifies the authenticity It checks the time stamp of current time interval tj
  • 32.
  • 33.
    Analysis  Results demonstratethat the proposed SET IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
  • 34.
    Security Analysis  AttackModels Passive Attacks on Wireless Channel Active Attacks on Wireless Channel Sinkhole bogus and replayed routing information attack
  • 35.
    Solutions to Attacks Passive Attacks - The sensed data are encrypted by the homomorphic encryption scheme from [5], which deals with eavesdropping.  Active Attack - attackers do not have valid digital signature.
  • 36.
  • 37.
    Conclusion  The maingoal is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks  The protocols SET-IBS have better performance than the existing secure protocols for CWSN.
  • 38.
    Future Scope • Reducesthe computational overhead for protocol security. • To maximize the life time of sensor nodes. • To provide more secure way of data transmission in WSN.
  • 39.
    Refrences [1] “Secure andEfficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani IEEE Transactions on Parallel and Distributed Systems. [2] S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. [3] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007 [4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53, [5] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005. [6] Wireless Sensor Network Remote Triggered Virtual Labs At AMRITA UNIVERSITY (Wireless Remote Sensing, Experimentation, Monitoring and Administration Lab) http://vlab.amrita.edu/index.php?sub=78&brch=256&sim=1558&cnt=1

Editor's Notes

  • #5 Central- Source node sence physical values and send data to sink node. Sink node aggregate the value and process it.
  • #6  A centralized network is chosen for an application if and only if all the source nodes are in the transmission range of sink node. The node density is such that the sink is capable to monitor and control all the source nodes.
  • #7 All leaf node are not in the range of base station. So some leaf nodes are rearrange themselves to form cluster head of different cluster. Leaf node send data to CH and CH send data to BS.
  • #12 where P is a priori determined value which stands for the desired percentage of CHs during one round Ecur is the current energy, and Einit is the initial energy r is the current round number, Gn is the set of sensor nodes that have not been CHs in the last b1=c rounds.
  • #13 Node other than CH determine which cluster they belong based on strength of the received signal.
  • #15 1.LEACH is a completely distributed approach and requires no global information of network. 2. Network lifetime can be increased by the rotation of cluster-Head, aggregating the data by CHs, TDMA assigned to Cluster members by the CH, so that most of the nodes in sleep mode. 3. Single-hop routing is possible from sensor node to cluster head, and by this means we can able to save the energy of the network. 4. a large-scalable network without traffic overload can be deployed and by this also better energy efficient network topology can be achieved as compared to the flat-topology.
  • #16 It significantly relies on cluster heads rather than cluster members of the cluster for communicating to the sink. Due to this it incurs robustness issues like failure of the cluster heads. 2. 3. LEACH support Single Hop Routing, so it does not work well in large scale networks which need high energy for transmitting data from CH to BS directly.
  • #18 Identity-based (IDbased) cryptography, introduced by Shamir Eliminates the necessity for checking the validity of certificates[22] ID-based digital signature security depends on the hardness of Diffie-Hellman problem. Proposed protocol provides confidentiality, authenticity, non-repudiation, integrity and freshness to the communication between sensor nodes.
  • #21 We adopt the additively homomorphic encryption scheme in [29] to encrypt the plaintext of sensed data, in which a specific operation performed on the plaintext is equivalent to the operation performed on the ciphertext.
  • #22 p, q are large numbers E/Fp lindicate an elliptic curve y2 = x3 + ax + b (4a3+ 27b2 !=0) over a finite field Fp. G1 denote by a q-order subgroup of the additive group of points in E=Fp G2 a q-order subgroup of the multiplicative group in the finite field Fp. The pairing is a mapping e : G1 * G1 ->G2, which is a bilinear map
  • #23 H, for the point mapping hash function which maps strings to elements in G1, and h, for mapping arbitrary inputs to fixed-length outputs. Pick a random integer T C- Zq* as the master key msk, set Ppub = tP as network public key.
  • #29 a nonce is an arbitrary number that may only be used once.
  • #30 improve the efficiency
  • #32 store the knowledge for signing online signature when it sends the message. Notice that, this offline signature can be done by the sensor node itself or by the trustful third party CH sensor node generates an offline signature SIGoffline, and transmit it to the leaf nodes in its cluster.
  • #34 These attacks are pointed to CHs of acting as intermediary nodes because of the limited functions by the leaf nodes in a cluster-based architecture. Since attackers do not have valid digital signature to concatenate with broadcast messages for authentication, attackers cannot pretend as the BS or CHs to trigger attacks Fig. 5 shows the comparison of alive nodes’ number, in which the proposed SET-IBS and SET-IBOOS protocols versus LEACH and SecLEACH protocols. The results demonstrate that the proposed SET-IBS and SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational overhead for security of either IBS or IBOOS process
  • #35 Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch otherattacks like selective forwarding attack, acknowledge spoofing attackand drops or altered routing information.
  • #36 2 SET-IBS and SET-IBOOS are resilient, and robust to the sinkhole and selective forwarding attacks because the CHs being attacked are capable to ignore all the communication packets with bogus node IDs or bogus digital signatures