18
THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Embed Size (px)

Citation preview

Page 1: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS

Presented By :Ankita Jaiswal

Guided By :Dr. Agrawal sir

Page 2: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

CONTENTS

IntroductionWSNMobile sinkChallengesThree-tier security networkAdvantagesConclusion

Page 3: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

INTRODUCTION

In wireless sensor network collecting data from sensor node is complex process because attacker can compromise the network easily q-composite key pre-distribution techniques used in existing techniques.

If attacker captures fraction of nodes than he will compromise .

Page 4: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Here we are going to strength the authentication mechanism by three tier security scheme.

Blundo scheme provides clear security guarantee in wireless sensor networks and having polynomial pools.

Here attacker compromising network is complex because he have to get at least one polynomial from mobile pool.

Contd…….

Page 5: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

A wireless sensor network (WSN) of spatially distributed  autonomous sensor to monitor physical or environmental conditions, such as temperature, sound, pressure, etc.

WSN

Page 6: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

MOBILE SINK Mobile sink are vital in many WSN application

for efficient data accumulation for distinguishing and revoking compromised sensors.

Page 7: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

The problem of authentication and pairwise key establishment in sensor networks with is still not solved in the face of mobile sink replication attacks.

The problem with the basic:• probabilistic key pre-distribution scheme

-q-composite key pre-distribution schemes. -random pairwise keys scheme

Existing system and challenges

Page 8: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

THE THREE-TIER SECURITY SCHEME

In the proposed scheme, we use two separate polynomial pools:

•The mobile polynomial pool

•The static polynomial pool.

Stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering.

Page 9: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Fig. The three-tier security scheme in WSN with mobile sinks.

Page 10: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

The three-tier security scheme provides better network resilience and also provides pairwise key establishment.

To avoid Mobile sink replication attack they used the three tier security scheme.

Contd……..

Page 11: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

MODULES

Sensor Module

Access Point Module

Mobile Sink Module

Page 12: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Mobile polynomial pool

Static polynomialpool

Start

Mobile Sink

Stationary access node

Sensor node

Do transaction

End

If secure path

establis-hed

Access Denied

Flow chart

km

key1

key2

kmyes

no

km

km

Page 13: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Advantages

The three-tier security scheme more robust against a stationary access node replication attack

The authentication mechanism between the stationary access nodes and sensor nodes using one-way hashing algorithm.

Using two separate key pools and having few sensor nodes that carry keys from the mobile key pool.

Page 14: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

we proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes.

conclusion

We have further improved the security performance of the proposed scheme against stationary access node replication attack by strengthening the authentication mechanism between stationary access nodes and sensor nodes.The proposed key distribution scheme reduces thecomputational cost in the nodes.

Page 15: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

FUTURE SCOPE

Wireless sensor network promise exciting new applications in the near future.

WSN become more and more crucial to everyday life availability faults become less tolerable.

High availability of the nodes critical and must hold even under malicious conditions.

Page 16: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

REFRENCES

‘The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks’Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE- May-2012

‘Technique to Secure Wireless Sensor Network’ Pramod D Mane 1, Prof. D.H.Kulkarni2Vol. 4 (6) , 2013, 751-

754

Page 17: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

Amar Rasheed, Student Member, IEEE, and Rabi N.Mahapatra, Senior Member, IEEE ”The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Transactions on Parallel And Distributed Systems, vol. 23, no. 5, May 2012.

Amr Rasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE Computer Society, VOL. 23, NO. 5, pp 958-965.

Page 18: Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir

THANK YOU