Upload
jordan-mckenzie
View
214
Download
0
Embed Size (px)
Citation preview
THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS
Presented By :Ankita Jaiswal
Guided By :Dr. Agrawal sir
CONTENTS
IntroductionWSNMobile sinkChallengesThree-tier security networkAdvantagesConclusion
INTRODUCTION
In wireless sensor network collecting data from sensor node is complex process because attacker can compromise the network easily q-composite key pre-distribution techniques used in existing techniques.
If attacker captures fraction of nodes than he will compromise .
Here we are going to strength the authentication mechanism by three tier security scheme.
Blundo scheme provides clear security guarantee in wireless sensor networks and having polynomial pools.
Here attacker compromising network is complex because he have to get at least one polynomial from mobile pool.
Contd…….
A wireless sensor network (WSN) of spatially distributed autonomous sensor to monitor physical or environmental conditions, such as temperature, sound, pressure, etc.
WSN
MOBILE SINK Mobile sink are vital in many WSN application
for efficient data accumulation for distinguishing and revoking compromised sensors.
The problem of authentication and pairwise key establishment in sensor networks with is still not solved in the face of mobile sink replication attacks.
The problem with the basic:• probabilistic key pre-distribution scheme
-q-composite key pre-distribution schemes. -random pairwise keys scheme
Existing system and challenges
THE THREE-TIER SECURITY SCHEME
In the proposed scheme, we use two separate polynomial pools:
•The mobile polynomial pool
•The static polynomial pool.
Stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering.
Fig. The three-tier security scheme in WSN with mobile sinks.
The three-tier security scheme provides better network resilience and also provides pairwise key establishment.
To avoid Mobile sink replication attack they used the three tier security scheme.
Contd……..
MODULES
Sensor Module
Access Point Module
Mobile Sink Module
Mobile polynomial pool
Static polynomialpool
Start
Mobile Sink
Stationary access node
Sensor node
Do transaction
End
If secure path
establis-hed
Access Denied
Flow chart
km
key1
key2
kmyes
no
km
km
Advantages
The three-tier security scheme more robust against a stationary access node replication attack
The authentication mechanism between the stationary access nodes and sensor nodes using one-way hashing algorithm.
Using two separate key pools and having few sensor nodes that carry keys from the mobile key pool.
we proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes.
conclusion
We have further improved the security performance of the proposed scheme against stationary access node replication attack by strengthening the authentication mechanism between stationary access nodes and sensor nodes.The proposed key distribution scheme reduces thecomputational cost in the nodes.
FUTURE SCOPE
Wireless sensor network promise exciting new applications in the near future.
WSN become more and more crucial to everyday life availability faults become less tolerable.
High availability of the nodes critical and must hold even under malicious conditions.
REFRENCES
‘The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks’Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE- May-2012
‘Technique to Secure Wireless Sensor Network’ Pramod D Mane 1, Prof. D.H.Kulkarni2Vol. 4 (6) , 2013, 751-
754
Amar Rasheed, Student Member, IEEE, and Rabi N.Mahapatra, Senior Member, IEEE ”The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Transactions on Parallel And Distributed Systems, vol. 23, no. 5, May 2012.
Amr Rasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE Computer Society, VOL. 23, NO. 5, pp 958-965.
THANK YOU