Enhanced Secure Data Transmission using Node-By-Node Authentication Mechanism in WSN
Create New

Enhanced Secure Data Transmission using Node-By-Node Authentication Mechanism in WSN

Project period

05/07/2017 - 06/05/2018

Views

201

1



Enhanced Secure Data Transmission using Node-By-Node Authentication Mechanism in WSN
Enhanced Secure Data Transmission using Node-By-Node Authentication Mechanism in WSN

 A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to the main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. Nowadays, such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.

The WSN is built of "nodes" – from a few to several hundred or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.

The motivation of this system is to enhance secure data transmission using Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).

For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to the lack of scalability and resilience to node compromise attacks.

Why: Problem statement

A WSN consists of hundreds to thousands of sensor nodes (SNs) performing wireless communication. WSNs not only measure environmental conditions such as temperature and sound but also gather sensitive data about people. Therefore, to prevent privacy issues, all communications should be carried out securely. Moreover, security is an important area in the study of WSNs because it uses actual data. Insider threats are also a critical security issue in WSNs because general security techniques such as authentication and authorization cannot detect insider attackers. This is a serious threat for many applications such as military surveillance systems that monitor battlefields and other critical infrastructures.

The existing system is divided into two parts, i.e., symmetric key-based and public key-based. Moreover, there are various other methods of key management, such as pairwise key management, pre-distributed random key management, and location-based key management. Because of the hardware restrictions of SNs, the main objectives of key management for WSNs are efficiency, scalability, and heterogeneity.

In WSNs, location information is important for the generation of shared keys and is highly applicable. Thus, location-based key management is a core part of the research into WSN key management. Grid-based key management in location-based key management dictates that an SN should be located in an assigned grid.

Network Model

We propose a WSN model that is discussed in Figure 1. The network model is composed of a base station (BS), a cluster head (CH), anchor nodes (ANs), and SNs. An SN finds the neighbor node, senses and collects data, and sends them in a hop-by-hop form to a CH. ANs transmit different nonces to SNs according to a power level. The SN generates a pairwise key using the nonces received from the AN.

Threat Model

 We consider a variety of insider attacks and outsider attacks. An insider attack is more critical than an outsider attack because it bypasses authentication and authorization and drops critical packets. Various types of insider attacks include modification, misrouting, eavesdropping, and packet drops. The packet drop attack is particularly difficult to detect. Packet drop attacks can also decrease network performance. Packet drop attacks consist of a black hole attack, a gray hole attack, or an on-off attack. Because of the characteristics of a gray hole and on-off attacks, they are more difficult to detect than blackhole attacks.

Extraction of the Existing system:

The disadvantages of the existing system are as follows,

High computational and communication overhead.

Lack of scalability and resilience to insider attacks.

Most of the key management schemes do not deal with insider threats.

How: Solution description

The existing energy Location-Based Key Management with security is to use Hop by Hop Message authentication scheme for ensuring data confidentiality. Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.

While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without undergoing the threshold problem. Also, our scheme can provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.

Modules:

Network Configuration

Source Anonymous Message Authentication (SAMA)

Hop-by-hop message authentication

Network Configuration:

Sensor nodes are randomly distributed in the sensing field. In this project, we are using wireless sensor networks. In this network, the nodes are static and fixed. The sensor nodes sense the information and then send to the server. If the source node sends the packet, it will send through the intermediate node. The nodes communicate only within the communication range. So, we have to find the node’s communication range.

Source Anonymous Message Authentication (SAMA):

In this project, we propose the Source Anonymous Message Authentication scheme (SAMA) for secure message sending. The proposed scheme allows any node to transmit an unlimited number of messages without suffering from the threshold problem. We are using the ElGamal signature for message authentication. In this, the scheme enables the nodes to authenticate the message so that all corrupted messages can be detected and dropped. We develop the SAMA code on elliptic curves that can provide unconditional source anonymity. We propose an efficient key management framework to ensure isolation of the compromised nodes.

Node-by-Node Message Authentication:

In this project, we also proposed Node-by-Node message authentication scheme to protect the data. We are using the ElGamal signature for message authentication. Along with this signature, we can provide the security for data packets and also by using the signature we can detect the adversaries. The message receiver should be able to verify the message sent by the authorized node and also those modified by the adversaries. Every forwarder can verify if the message is authenticated or not. If the forwarder detects the intruder or finds the message has been modified, the forwarder will drop the packet or change the routing path. Along with this proposed scheme, we can get accurate data without modifying and also can easily detect the adversaries. If the forwarder detects the intruder or finds the message has been modified, the forwarder will drop the packet or change the routing path. 

Advantages:

A novel and efficient SAMA based on ECC. While ensuring message sender privacy, SAMA can be applied to any message to provide message content authenticity.
To provide hop-by-hop message authentication without the weakness of the built-inn the threshold of the polynomial-based scheme, we then proposed a hop-by-hop message authentication scheme based on the SAMA.
When applied to WSNs with fixed sink nodes, we also discussed possible techniques for compromised node identification.

How is it different from competition

  • An algorithm based on market competition for Wireless Sensor Networks
  • Joint Resource and Price competition in Wireless Sensor Networks
  • Competition at the Network MAC layer in Wireless Sensor Networks

Who are your customers

In all types of application the sensor networks are used, specially for monitoring and detecting purpose

  • Military Application
  • Battlefield surveillenInce
  • Environmental Application
  • Forest Fire Detection
  • Landslide Detection
  • Flood Detection
  • Health Application
  • Telemonitoring of human physiological data
  • Managing Inventory control

Project Phases and Schedule

Project work (Phase-I)

1. Survey (completed)

2. Defined the Existing system problem

3. Defined the title and solution for the existing problem.

Project work (Phase-II)

1. Proposed system Design

2. Executed the output for the proposed system.

Resources Required

Hardware Requirements:

  • Processor              - Pentium Dual core
  • RAM                    - 1 GB
  • Speed                    - 125 Ghz.

Software Requirements:

  • Operating System     - Windows 7/xp
  • Front End                  - Otcl (Object Oriented Tool Command Language)
  • Implementation         - NS-2.

Comments

Leave a Comment

Post a Comment