The Three-Tier Security Scheme in Wireless

smileybloatΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

72 εμφανίσεις

The Three
-
Tier Security Scheme in Wireless

Sensor Networks with Mobile Sinks

ABSTRACT:


Recent developments on Wireless sensor networks have made their
application used in a wide range of applications, such as, military sensing
and tracking, health monitor
ing.
Wireless sensor nodes have restricted
computational resources, and are always deployed in a harsh, unattended or
hostile environment. Therefore, network security represents a challenging
task. This work presents a public
-
key based pre
-
distribution sch
eme with
time
-
position nodes for simultaneous exchange of secure keys.
In this paper,
we proposed a general three
-
tier security framework for authentication and
pair wise key establishment between mobile sinks and sensor nodes.
The
proposed defend attack a
nd key management mechanism for sensor network
applications can successfully handle sink mobility and can continually
deliver data to neighboring nodes and sinks. Simulation results indicate that
the proposed mechanism can reduce energy consumption and ext
end the
average network lifetime by about 25%.








ARCHITECTURE:





EXISTING SYSTEM:




The Existing Systems use
d various techniques such as:

o

Asymmetric key technique for the key exchange technique.

o

P
robabilistic key predistribution scheme

o

T
wo key predi
stribution schemes




Although the above security approach makes the network

more
resilient to mobile sink replication attacks

compared to the single
polynomial pool
-
based key predistribution

scheme, it is still
vulnerable to stationary access

node replicati
on attacks. In these types
of attacks, the attacker

is able to launch a replication attack similar to
the mobile sink

replication attack. After a fraction of sensor nodes
have been

compromised by an adversary, captured static polynomials

can be loaded into

a replicated stationary access node that

transmits
the recorded mobile sink’s data request messages

to trigger sensor
nodes to send their aggregated data.




T
he problem of
existing k
ey

establishment in sensor networks with
MSs is still not solved

in the fa
ce of mobile sink replication attacks.


Disadvantages of Existing System:


For the basic

probabilistic

and q
-
composite key pre
-
distribution

schemes, an
attacker can easily obtain a large number of keys

by capturing a small
fraction of the network sensor no
des,

making it possible for the attacker to
take control of the

entire network by deploying a replicated mobile sink,

preloaded with some compromised keys to authenticate

and then initiate data
communication with any sensor node.


PROPOSED SYSTEM:


To addr
ess the above
-
mentioned problem, we have

developed a general
framework

that permits the use

of any pairwise key predistribution scheme
as its basic

component, to provide authentication and pairwise key

establishment between sensor nodes and MSs.


To facili
tate

the study of a new security technique, we first cultivated a

general three
-
tier security framework for authentication

and pairwise key
establishment, based on the polynomial

pool
-
based key predistribution
scheme


To make the three
-
tier security scheme

more robust

against a stationary
access node replication attack, we have

strengthened the authentication
mechanism between the

stationary access nodes and sensor nodes using one
-
way hash

chains algorithm in conjunction with the static polynomial

pool
-
base
d scheme. Our analytical results

indicate that the new security technique
makes the network

more resilient to both mobile sink replication attacks and

stationary access nodes replication attacks compared to the

single
polynomial pool
-
based approach.


Advan
tages of Proposed System:


The proposed

technique will substantially improve network resilience to

mobile sink replication attacks compared to the single

polynomial pool
-
based key pre

distribution approach,

as an attacker would have to
compromise many more

sensor nodes to launch a successful mobile sink
replication

attack.


MODULES:




Sensor Module



Access Po
i
nt Module



Mobile Sink Module



Pair
-
wise

Key Establishment Scheme

Module



Key Distribution scheme
Module


MODULE DESCRIPTION:


Sensor Module

We know that
W
ireless Sensor Networks (WSN)
are

sensing, computing
and communication infrastructure that are able to observe and respond to
phenomena in the natural environment and in our physical and cyber
infrastructure. The sensors themselves can range from small pa
ssive micro
sensors to larger scale, controllable weather
-
sensing platforms.



Access Point Module

In this module first we develop the access point module. In WSN, these
access point

module acts as an intermediate between the sensor node and
sink node.


Mo
bile Sink Module

In this module first we develop the Mobile Sink Module,
where the data are
to be delivered or reached as destination.



Pair
-
wise

Key Establishment Scheme

A hybrid cryptosystem can be constructed using any two separate
cryptosystems:



A
key

encapsulation

scheme, which is a public
-
key cryptosystem,
and



A
data encapsulation

scheme, which is a symmetric
-
key
cryptosystem.

To encrypt a message addressed to Alice in a hybrid cryptosystem, Bob does
the following:

1.

Obtains Alice's public key.

2.

Generat
es a fresh symmetric key for the data encapsulation scheme.

3.

Encrypts the message under the data encapsulation scheme, using the
symmetric key just generated.

4.

Encrypt the symmetric key under the key encapsulation scheme, using
Alice's public key.

5.

Send both
of these encryptions to Alice.

To decrypt this hybrid ciphertext, Alice does the following:

1.

Uses her private key to decrypt the symmetric key contained in the
key encapsulation segment.

2.

Uses this symmetric key to decrypt the message contained in the data
e
ncapsulation segment.


Key Distribution scheme Module




This protocol uses two separate key management schemes; one for
group
-
wide and individual keys and another for sub
-
network key
management.




The group
-
wide key is used for non
-
critical broadcast messag
es
between Nodes. The individual keys are used for secure
communication between nodes creating a subnetwork and setting up a
subnetwork key. The second key management scheme is creating and
distributing the keys for the dynamically created subnetworks.




Securely distributing the keys for the subnetworks created by events
within the sensor network is a non
-
trivial problem since the
subnetworks may contain any arbitrary set of neighboring nodes.
These nodes all must have a mechanism to securely communicate
with each other to distribute the subnetwork key to all the subnetwork
members.



System Requirements:

Hardware Requirements:




System



: Pentium IV 2.4 GHz.



Hard Disk

: 40 GB.



Floppy Drive

: 1.44 Mb.



Monitor


: 15 VGA Colour.



Mouse


: Logitech.



R
am



: 512 Mb.


Software Requirements:




Operating system

:
-

Windows XP.



Coding Language

:
Java.



Tool



: Netbeans 7.0


REFERENCE:

Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior
Member,


The Three
-
Tier Security Scheme in Wireless

Sens
or Networks
with Mobile Sinks”,
IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012.