Upload
shrinidhi-gowda
View
229
Download
0
Embed Size (px)
Citation preview
7/25/2019 Report on wsn
1/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
CHAPTER 1
INTRODUCTION
A Network is defined as the group of people or systems or organizations who tend to
share their information collectively for their business purpose. In Computer terminology the
definition for networks is similar as a group of computers logically connected for the sharing
of information or services (like print services, multitasking, etc.!. Initially Computer
networks were started as a necessity for sharing files and printers but later this has moved
from that particular "ob of file and printer sharing to application sharing and business logic
sharing. #hese networks may be fi$ed (cabled, permanent! or temporary. A network can becharacterized as wired or wireless. %ireless can be distinguished from wired as no physical
connectivity between nodes are needed. #he wireless network can again further be classified
being mobile ad hoc networks and wireless sensor networks.
A %ireless &ensor Network (%&N! consists of spatially distributed autonomous
sensors connected via a (wireless! communications infrastructure to cooperatively monitor,
record and store physical or environmental conditions, such as temperature, sound, vibration,
pressure, motion or pollutants. A %ireless &ensor Network is a selfconfiguring network of
small sensor nodes communicating among themselves using radio signals, and deployed in
'uantity to sense, monitor and understand the physical world. %ireless &ensor nodes are
called motes. %&N provide a bridge between the real physical and virtual worlds. Allow the
ability to observe the previously unobservable at a fine resolution over large spatiotemporal
scales. ave a wide range of potential applications to industry, science, transportation, civil
infrastructure, and security.
7/25/2019 Report on wsn
2/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
Fig 1.1 Wireless Sensor Network
%ireless sensor networks have seen tremendous advances and utilization in the past
two decades. &tarting from petroleum e$ploration, mining, weather and even battle
operations, all of these re'uire sensor applications. )ne reason behind the growing popularity
of wireless sensors is that they can work in remote areas without manual intervention. All the
user needs to do is to gather the data sent by the sensors, and with certain analysis e$tract
meaningful information from them. *sually sensor applications involve many sensors
deployed together. #hese sensors form a network and collaborate with each other to gather
data and send it to the base station. #he base station acts as the control centre where the data
from the sensors are gathered for further analysis and processing. In a nutshell, a wireless
sensor network (%&N! is a wireless network consisting of spatially distributed nodes whichuse sensors to monitor physical or environmental conditions. #hese nodes combine with
routers and gateways to create a %&N system. #here are several applications of wireless
sensor networks such as area monitoring, +nvironment+arth monitoring, forest fire detection
and natural disaster like tsunamis, volcanoes, health care, traffic control and home
automation.
&ome of the characteristics of wireless sensor networks are the, ability to withstand
bad environmental conditions, can deal with node failures, portable have dynamic network
topology, communicate failures their node heterogeneity, large scale of deployment,
unattended operation, capacity of a node is scalable, only limited by the bandwidth of a
gateway node. &ecure data transfer is most critical issue for %&N. -enerally, most of %&Ns
are deployed with rough, crude, deffered physical environment for military and healthcare
domain with trustless background. &o, securely data transmission is necessary and most
practical vision in %&N
.
&ecurity in sensor networks includes confidentiality, integrity and availability.
Confidentiality in %&Ns is accomplished by preventing outsiders from eavesdropping on
transmissions. #his is generally achieved by enciphering the relevant parts of a packet.
Integrity in general means that the receiver is assured that the network packet was not
tampered with or the message altered in some way. y ensuring the availability we mean that
the data is available in a timely fashion so that it is useful to the user. Availability in %&Ns is
of great concern to the user of the network. *nfortunately, many e$isting security primitives
7/25/2019 Report on wsn
3/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
cannot be used in %&Ns, either because the computing power of the sensors is too limited or
the additional work created by the protocols causes e$cessive network traffic.
In a typical %&N, a large number of sensor nodes collect application specific
information from the environment and this information is transferred to a central base station
where it is processed, analyzed, and used by the application. In these resource constrained
networks, the general approach is to "ointly process the data generated by different sensors
while being forwarded toward the base station /01. &uch distributed innetwork processing of
data is generally called as data aggregation and involves combining the data that belong the
same phenomenon. #he main ob"ective of hierarchical data aggregation is to increase the
network lifetime by reducing the resource consumption of sensor nodes (such as battery
energy and bandwidth!. %hile increasing network lifetime, data aggregation protocols maydegrade the important 'uality of service metrics in wireless sensor networks, such as data
accuracy, latency, faulttolerance, and security. #herefore, the design of an efficient data
aggregation protocol is an inherently challenging task because the protocol designer must
tradeoff between energy efficiency, data accuracy, faulttolerance, latency, and security. In
order to achieve this trade off, data aggregation techni'ues are tightly coupled with how
packets are routed through the sensor network. ence, the architecture of the %&N plays a
vital role in the performance of different data aggregation protocols. #here are several
protocols that allow routing and aggregation of network packets simultaneously. #hese
protocols can be categorized into two parts2 clusterbased data aggregation protocols and tree
based data aggregation protocols. #o reduce the latency due to tree based data aggregation,
recent work on data aggregation process tends to group sensor nodes into clusters so that data
are aggregated in each group for improved efficiency.
7/25/2019 Report on wsn
4/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
CHAPTER 2
CLASSIFICATION OF ROUTIN PROTOCOLS
3outing techni'ues are re'uired for sending data between sensor nodes and the base
stations for communication. 4ifferent routing protocols are proposed for wireless sensor
network. #hese protocols can be classified according to different parameters.
(a!3outing 5rotocols can be classified as 5roactive, 3eactive and ybrid, based on their
mode of functioning and type of target applications.
(b!3outing protocols can be classified as 4irect Communication, 6lat and Clustering
5rotocols, according to the 5articipation style of the Nodes.
(c!3outing 5rotocols can be classified as ierarchical, 4ata Centric and location based,
depending on the Network &tructure.
2.1 !ASED ON "ODE OF FUNCTIONIN AND T#PE OF
TARET APPLICATIONS
Pro$%ti&e'(
In a 5roactive 5rotocol the nodes switch on their sensors and transmitters, sense the
environment and transmit the data to a & through the predefined route.
+$amples2 #he 7ow +nergy Adaptive Clustering hierarchy protocol (7+AC! utilizes this
type of protocol.
Re$%ti&e'(
If there are sudden changes in the sensed attribute beyond some predetermined
threshold value, the nodes immediately react. #his type of protocol is used in time critical
applications.
+$amples2 #he #hreshold sensitive +nergy +fficient sensor Network (#++N! is an e$ample
of a reactive protocol.
7/25/2019 Report on wsn
5/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
H)*ri+'(
ybrid protocols incorporate both proactive and reactive concepts. #hey first compute
all routes and then improve the routes at the time of routing.
+$amples2 Adaptive 5eriodic #++N(A5#++N! is an e$ample of a reactive protocol.
2.2 A%%or+ing to t,e P$rti%i-$tion st)le o t,e No+es
Dire%t Co//0ni%$tion'(
In this type of protocols, any node can send information to the ase &tation(&!
directly. %hen this is applied in a very large network, the energy of sensor nodes may be
drained 'uickly. Its scalability is very small.
+$amples2 &5IN is an e$ample of this type of protocol.
Fl$t'(
In this protocol, if any node needs to transmit data, it first searches for a valid route to
the & and then transmits the data. Nodes around the base station may drain their energy
'uickly. Its scalability is average.
+$amples2 3umor 3outing is an e$ample of this type of protocol.
Cl0stering Proto%ols'(
According to the clustering protocol, the total area is divided into numbers of clusters.
+ach and every cluster has a cluster head (C! and this cluster head directly communicates
with the &. All nodes in a cluster send their data to their corresponding C.
+$amples2 #++N is an e$ample of this type of protocol.
2. De-en+ing on t,e Network Str0%t0re
D$t$ Centri%'(
4ata centric protocols are 'uery based and they depend on the naming of the desired
data, thus it eliminates much redundant transmissions. #he & sends 'ueries to a certain area
for information and waits for reply from the nodes of that particular region. &ince data is
re'uested through 'ueries, attribute based naming is re'uired to specify the properties of the
data. 4epending on the 'uery, sensors collect a particular data from the area of interest and
7/25/2019 Report on wsn
6/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
this particular information is only re'uired to transmit to the & and thus reducing the
number of transmissions.
+$amples2 &5IN was the first data centric protocol.
Hier$r%,i%$l'(
ierarchical routing is used to perform energy efficient routing, i.e., higher energy
nodes can be used to process and send the information8 low energy nodes are used to perform
the sensing in the area of interest.
+$amples2 7+AC, #++N, A5#++N.
Lo%$tion !$se+'(
7ocation based routing protocols need some location information of the sensor nodes.7ocation information can be obtained from -5& (-lobal 5ositioning &ystem! signals,
received radio signal strength, etc. *sing location information, an optimal path can be formed
without using flooding techni'ues.
+$amples2 -eographic and +nergyAware 3outing(-+A3!
7/25/2019 Report on wsn
7/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
CHAPTER
SECURIT# CHALLENES IN WSN
#he nature of large, adhoc, wireless sensor networks presents significant challengesin designing security schemes. A wireless sensor network is a special network which has
many constraint compared to a traditional computer network.
Wireless "e+i0/
#he wireless medium is inherently less secure because its broadcast nature makes
eavesdropping simple. Any transmission can easily be intercepted, altered, or replayed by an
adversary. #he wireless medium allows an attacker to easily intercept valid packets and easily
in"ect malicious ones. Although this problem is not uni'ue to sensor networks, traditional
solutions must be adapted to efficiently e$ecute on sensor networks.
A+(Ho% De-lo)/ent
#he adhoc nature of sensor networks means no structure can be statically defined. Nodes
may be deployed by airdrop, so nothing is known of the topology prior to deployment. &ince
nodes may fail or be replaced the network must support self configuration. &ecurity schemes
must be able to operate within this dynamic environment.
Hostile En&iron/ent
#he ne$t challenging factor is the hostile environment in which sensor nodes function. 9otes
face the possibility of destruction or capture by attackers. #he highly hostile environment
represents a serious challenge for security researchers.
I//ense S%$le
7/25/2019 Report on wsn
8/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
#he proposed scale of sensor networks poses a significant challenge for security mechanisms.
&imply networking tens to hundreds of thousands of nodes has proven to be a substantial
task.
Se%0rit) o$ls For Sensor Networks
#he security goals are classified as primary and secondary. #he primary goals are known as
&tandard security goals such as Confidentiality, Integrity, authentication and Availability
(CIAA!. #he secondary goals are 4ata 6reshness, &elf )rganization, #ime &ynchronization
and &ecure 7ocalization.
D$t$ Coni+enti$lit)'
Confidentiality is the ability to conceal messages from a passive attacker so that any
message communicated via the sensor network remains confidential. #his is the most
important issue in network security. A sensor node should not reveal its data to the neighbors.
D$t$ A0t,enti%$tion
Authentication ensures the reliability of the message by identifying its origin. An
adversary is not "ust limited to modifying the data packet. It can change the whole packet
stream by in"ecting additional packets. &o the receiver needs to ensure that the data used in
any decisionmaking process originates from the correct source. )n the other hand, when
constructing the sensor network, authentication is necessary for many administrative tasks
(e.g. network reprogramming or controlling sensor node duty cycle!. 6rom the above, we can
see that message authentication is important for many applications in sensor networks.
Informally, data authentication allows a receiver to verify that the data really is sent by the
claimed sender. In the case of twoparty communication, data authentication can be achieved
through a purely symmetric mechanism2 the sender and the receiver share a secret key to
compute the message authentication code (9AC! of all communicated data.
D$t$ Integrit)
4ata Integrity in sensor networks is needed to ensure the reliability of data and refers
to the ability to confirm that the message has not been tempered with, altered or changed.
+ven if the network has confidentiality measures there is still a possibility that the data
integrity has been compromised by alterations. #he integrity of the network will be in trouble
when2 A malicious node present in the network in"ects false data.
D$t$ A&$il$*ilit)
7/25/2019 Report on wsn
9/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
Availability determines whether a node has the ability to use the resources and
whether the network is available for the messages to communicate. owever, failure of the
base station or cluster leader:s availability will eventually threaten the entire sensor network.
#hus availability is of primary importance for maintaining an operational network.
D$t$ Fres,ness'
+ven if 4ata Confidentiality and 4ata Integrity are assured, there is a need to ensure
the freshness of each message. Informally, data freshness suggests that the data is recent, and
it ensures that no old messages have been replayed. #o solve this problem a nonce or another
timerelated counter, can be added into the packet to ensure data freshness.
Sel Org$ni$tion'
A wireless sensor network is typically an adhoc network, which re'uires every sensor
node be independent and fle$ible enough to be selforganizing and selfhealing according to
different situations. #here is no fi$ed infrastructure available for the purpose of network
management in a sensor network. #his inherent feature brings a great challenge to wireless
sensor network security. If selforganization is lacking in a sensor network, the damage
resulting from an attack or even the risky environment may be devastating.
Ti/e S)n%,roni$tion
9ost sensor network applications rely on some form of time synchronization. &ensors
may wish to compute the end to end delay of a packet as it travels between two pair wise
sensors. A more collaborative sensor network may re'uire group synchronization for tracking
applications.
Se%0re Lo%$li$tion
)ften, the utility of a sensor network will rely on its ability to accurately
automatically locate each sensor in the network. A sensor network designed to locate faults
will need accurate location information in order to pin point the location of a fault.
*nfortunately, an attacker can easily manipulate nonsecured location information by
reporting false signal strengths, replaying signals.
7/25/2019 Report on wsn
10/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
CHAPTER 3
APPLICATIONS OF WSN
Are$ /onitoring
Area monitoring is a common application of %&Ns. In area monitoring, the %&N is
deployed over a region where some phenomenon is to be monitored. A military e$ample is
the use of sensors detect enemy intrusion8 a civilian e$ample is the geofencing of gas or oil
pipelines.
He$lt, %$re /onitoring
#he medical applications can be of two types2 wearable and implanted. %earable
devices are used on the body surface of a human or "ust at close pro$imity of the user. #he
implantable medical devices are those that are inserted inside human body. #here are many
other applications too e.g. body position measurement and location of the person, overall
monitoring of ill patients in hospitals and at homes. odyarea networks can collect
information about an individual;s health, fitness, and energy e$penditure.
En&iron/ent$l4E$rt, sensing
#here are many applications in monitoring environmental parameters, e$amples of
which are given below. #hey share the e$tra challenges of harsh environments and reduced
power supply.
Air -oll0tion /onitoring
%ireless sensor networks have been deployed in several cities (&tockholm, 7ondon
and risbane! to monitor the concentration of dangerous gases for citizens. #hese can take
advantage of the ad hoc wireless links rather than wired installations, which also make them
more mobile for testing readings in different areas.
Forest ire +ete%tion
7/25/2019 Report on wsn
11/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
A network of &ensor Nodes can be installed in a forest to detect when a fire has
started. #he nodes can be e'uipped with sensors to measure temperature, humidity and gases
which are produced by fire in the trees or vegetation. #he early detection is crucial for a
successful action of the firefighters8 thanks to %ireless &ensor Networks, the fire brigade willbe able to know when a fire is started and how it is spreading.
L$n+sli+e +ete%tion
A landslide detection system makes use of a wireless sensor network to detect the
slight movements of soil and changes in various parameters that may occur before or during a
landslide. #hrough the data gathered it may be possible to know the occurrence of landslides
long before it actually happens.
W$ter 50$lit) /onitoring
%ater 'uality monitoring involves analyzing water properties in dams, rivers, lakes ! 4ecryption2 4ata user decrypt the encrypted message with private key and verifies
receiving output is acceptable or not which depends on attribute matching.
Fig 3.3 Working !lo%k Di$gr$/ O T,e S)ste/
7/25/2019 Report on wsn
16/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
Fig.3.6 Flow%,$rt For O-er$tion In SET(A!E
&+#A))& operates similar way to that of &+#A+. #he main goal in
onlineoffline setting is to allow precomputation of attribute based chipher te$t as possible
without knowing about cipher policy or attribute set.
&+#A))& implemented with five operations2 &etup, +$tract, )ffline +ncryption, )nline
+ncryption and 4ecryption.
?! &et up2 #his algorithm takes input as security parameters and set of attributes in system
and generates master key and public parameters.
! +$tract2 #his algorithm takes input as set of attribute and master key in order to generate
private key associated with set of attribute.
B! )ffline +ncryption2 #his algorithm takes parameter and generates output as intermediate
cipher te$t.
7/25/2019 Report on wsn
17/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
>! )nline +ncryption2 #his algorithm takes input as public parameter, set of attribute and
intermediate cipher te$t and generate output as session key and cipher te$t.
0! 4ecryption2 this algorithm takes input as private key and cipher te$t in order to
decapsulate cipher te$t to get original message and to recover session key only if it satisfy
attribute constrain.
CONCLUSION
%ireless sensor network (%&N! is the network of hundreds and thousands of micro
sensor nodes, connecting each other by a wireless medium.%&N provide reliable sensing of
the environment, detecting and reporting events to the sink. #he main ob"ective of
hierarchical data aggregation is to increase the network lifetime by reducing the resource
consumption of sensor nodes.
In this scheme, design and developed two protocol scheme in order to get secure and
efficient data transfer over %&N, such as &+#A+ and &+#A))& based on Attribute
based encryption. As well as it provide security towards orphan node problem in secure data
7/25/2019 Report on wsn
18/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
transmission. 4ue to use of hierarchical architecture provides balanced energy consumption
on every sensor node.
REFERENCES
/?1 %. einzelman, A. Chandrakasan, and . alakrishnan, An Application&pecific
5rotocol Architecture for %ireless 9icrosensor Networks,D I+++ #rans. %ireless Comm.,
vol. ?, no. >, pp. EEF EGF, )ct. FF.
/1 9an"eshwar, H.A. eng, and 4.5. Agrawal, An Analytical 9odel for Information
3etrieval in %ireless &ensor Networks *sing +nhanced A5#++N 5rotocol,D I+++ #rans.
5arallel < 4istributed &ystems, vol. ?B, no. ?, pp. ?JF?BF, 4ec. FF.
/B1 &. Ki et al.,D 5+AC2 5ower+fficient and Adaptive Clustering ierarchy 5rotocol for
%ireless &ensor Networks D Computer Comm., vol. BF, nos. ?>?0, pp. L>L0, FFG.
7/25/2019 Report on wsn
19/19
Secure And Efcient Data Transer For Hierarchical Based Wireless Sensor
Networks
/>1 Chengchi 7ee,5ei&han chung,and 9in&hiang wang Asurvey on Attributebased
+ncryption &cheme of Access Contol in Cloud +nvironmentD, International Mournal of
Network &ecurity, ol.?0,No.>,55.B?>F,MulyF?B.
/01 &usan ohenberger, rent %aters )nline)ffline Attributeased +ncryptionD,FFG.
/??1 &usan ohenberger, rent %aters Attributeased +ncryption with 6ast 4ecryptionD,L
may F?B.