3
Providing End-to-End Secure Communications in Wireless Sensor Networks Abstract: Provid ing des ira ble dat a sec uri ty, tha t is, con fid ent ial ity , aut hen tic ity , and availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number of resource constraint sensor nodes that are generally del oyed in unattende d!ho stile environments and, hence , are e"os ed to many tyes of severe insider attacks due to node comromise# $"isting security designs mostly rovide a ho%by%ho security aradigm and thus are vulnerable to such attacks# &urthermore, e"isting security designs are also vulnerable to many tyes of denial of service ('oS) attacks, such as reort disrution attacks and selective forwarding attacks and thus ut data availability at stake# n this aer, we seek to overcome these vulnerabilities for large%scale static WSNs# We come u with a location%aware end%to%end security framework in which secret keys are bound to geograhic locations and each node stores a few keys based on its own location# his location%aware roerty effectively limits the imact of comromised nodes only to their vicinity without affecting end%to%end data security# he roosed multifunctional key management framework assures both node%to%sink and node% to%node authentication along the reort forwarding routes# *oreover, the roosed data delivery aroach guarantees efficient en%route bogus data filtering and is highly robust against 'oS attacks# he evaluation demonstrates that the roosed design is highly resilient against an increasing number of comromised nodes and effective in energy savings# $"isting System:

13) Providing End-To-End Secure Communications In

Embed Size (px)

DESCRIPTION

doc

Citation preview

7/18/2019 13) Providing End-To-End Secure Communications In

http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 1/3

Providing End-to-End Secure Communications

in Wireless Sensor Networks

Abstract:

Providing desirable data security, that is, confidentiality, authenticity, and

availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually

consists of a large number of resource constraint sensor nodes that are generally

deloyed in unattended!hostile environments and, hence, are e"osed to many

tyes of severe insider attacks due to node comromise# $"isting security designs

mostly rovide a ho%by%ho security aradigm and thus are vulnerable to such

attacks# &urthermore, e"isting security designs are also vulnerable to many tyes of 

denial of service ('oS) attacks, such as reort disrution attacks and selective

forwarding attacks and thus ut data availability at stake# n this aer, we seek to

overcome these vulnerabilities for large%scale static WSNs# We come u with a

location%aware end%to%end security framework in which secret keys are bound to

geograhic locations and each node stores a few keys based on its own location#his location%aware roerty effectively limits the imact of comromised nodes

only to their vicinity without affecting end%to%end data security# he roosed

multifunctional key management framework assures both node%to%sink and node%

to%node authentication along the reort forwarding routes# *oreover, the roosed

data delivery aroach guarantees efficient en%route bogus data filtering and is

highly robust against 'oS attacks# he evaluation demonstrates that the roosed

design is highly resilient against an increasing number of comromised nodes and

effective in energy savings#

$"isting System:

7/18/2019 13) Providing End-To-End Secure Communications In

http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 2/3

In many Wireless Sensor Networks (WSNs), providing end to end secure

communications etween sensors and t!e sink is important "or secure

network management# W!ile t!ere !ave een many works devoted to !op y

!op secure communications, t!e issue o" end to end secure communications

Is largely ignored

Proposed System$

In t!is paper, we design an end to end secure communication protocol in

randomly deployed WSNs#

Speci"ically, our protocol is ased on a met!odology called di""erentiated key

pre-distriution# %!e core idea is to distriute di""erent numer o" keys to

di""erent sensors to en!ance t!e

resilience o" certain links# %!is "eature is leveraged during routing, w!ere

nodes route t!roug! t!ose links wit! !ig!er resilience# &sing rigorous

t!eoretical analysis, we derive an e'pression "or t!e uality o" end to end

secure communications, and use it to determine optimum protocol

parameters# E'tensive per"ormance evaluation illustrates t!at our solutions

can provide !ig!ly secure communications etween sensor nodes and t!e sink 

in randomly deployed WSNs# We also provide detailed discussion on a

potential attack (i#e# iased node capturing attack) to our

solutions, and propose several countermeasures to t!is attack# in WSNs, we

need to use ho by ho based encrytion!decrytion in  roviding end to end secure

communications#

7/18/2019 13) Providing End-To-End Secure Communications In

http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 3/3

*odules:

ClientServer

router(Sensor)

*+W*+E *N S.%W*+E +E/&I+E0EN%S

So"tware +euirements$

+anguage : -#N$

echnologies : *icrosoft#N$ &ramework,

A'.#N$'$ : /isual Studio 0112

3ackend : S4+ Server 0115

.erating System : *icrosoft Windows 6P SP0 or +ater /ersion

ardware +euirements$

Processor : ntel Pentium or more

7A* : 580 *3 ( Minimum)

  9ard 'isk : 1 ;3