Majid Alshammari and Khaled Elleithy

Slides:



Advertisements
Similar presentations
Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No M.Tech.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
1 Cooperative Transmissions in Wireless Sensor Networks with Imperfect Synchronization Xiaohua (Edward) Li, Mo Chen and Wenyu Liu Department of Electrical.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Wireless Sensor Network Security Anuj Nagar CS 590.
Department of Computer Engineering Koc University, Istanbul, Turkey
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
ZigBee.  ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Mehmet C. Vuran Vehbi C. Gungor Özgür B. Akan School of Electrical & Computer Engineering Georgia Institute of Technology Atlanta, GA {mcvuran,
Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-Based Wireless Networks.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Yaxin Hu 2.8 SUMMARY. Outline Summary of different sections of chapter 2 Recent research papers Future works/predictions.
Introduction Research in wireless sensor network (WSN) is receiving lot of attention from the academia, as well as from industries, because of the enormous.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
1 Dynamic Sleeping Scheduling for Real-time Wireless Sensor Networks Department of EECS University of Tennessee, Knoxville Xiaodong Wang, Yanjun Yao.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Variable Bandwidth Allocation Scheme for Energy Efficient Wireless Sensor Network SeongHwan Cho, Kee-Eung Kim Korea Advanced Institute of Science and Technology.
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
ENERGY EFFICIENT TIME SYNCHRONIZATION PROTOCOL FOR MOBILE UNDERWATER ACOUSTIC SENSOR NETWORKS Under the Guidance of Submitted by Mr. P. Mukunthan, AP/CSE.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Jamming for good: a fresh approach to authentic communication in WSNs
Distributed Algorithms for Mobile Sensor Networks
Wireless Sensor Network (WSN)
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
Algorithms for Big Data Delivery over the Internet of Things
Aziz Nasridinov and Young-Ho Park*
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
SEP routing protocol in WSN
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Modeling and Simulation of WSN for Target Tracking
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Optimizing Energy Consumption in Wireless Sensor
Presentation transcript:

Energy-Efficient Key Distribution Protocol for Wireless Sensor Networks Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport, Bridgeport, CT Abstract Key distribution is a challenging issue for Wireless Sensor Networks (WSNs) because sensor nodes are built from resource-constrained devices that carry limited-power batteries. Thus, a key distribution scheme for WSNs must be an energy efficient. However, most proposed key distribution schemes in the literature do not consider energy efficiency. Therefore, we propose an energy-efficient key distribution protocol that is designed to suit the resource-constrained devices such as WSNs. We utilized Arduino UNO microcontroller and OPNET Modeler to investigate our proposed protocol compared to key distribution schemes in the literature. The findings show that the proposed protocol is secure and consumes less energy. Key Refreshment Phase: Sink node: 𝐾 𝑁𝑒𝑤 session 𝑅 0,1 128 and timestamp 𝑇. 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 𝑁𝑒𝑤 session ∥𝑇 . 𝑠𝑒𝑛𝑑 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 𝑁𝑒𝑤 session ∥𝑇 . Sensor nodes: 𝑟𝑒𝑐𝑒 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 𝑁𝑒𝑤 session ∥𝑇 . 𝑃⟵𝐷 𝐴𝐾 𝑛𝑜𝑑𝑒𝑠 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 𝑁𝑒𝑤 session ∥𝑇 . 𝑓 verif 𝑇 = accept , &𝑇≤𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 reject , &𝑇>𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 II. Correspondence Assertions Sequence of events to model authentication. III. Observational Equivalence The adversary could not acknowledge when the data𝐷 get changed. Methodology/implementation We used real hardware implementation and simulation.   I. Hardware implementation. We used Arduino UNO microcontroller [1] to implement key distribution algorithms of the investigated schemes, measuring the time these schemes take to perform key distribution process and then calculating the actual energy consumption. II. Simulation We utilized OPNET Modeler to design and to create a model for a wireless sensor node. The model can calculate the energy consumption of a wireless sensor node as well as the energy consumption that is caused by wireless effects. The power parameters of our model is based on XBee transceiver S1 [2]. Introduction Recent advances in technology allow wireless sensor nodes to be cost-effective and small in size. Thus, they have become rapidly involved in a variety of applications such as in the military, health, agriculture, environment, home and commercial automation, and transportation.  Key distribution plays a crucial role in the security of these applications. However, designing a key distribution scheme for WSNs is challenging because wireless sensor nodes are powered by limited-power batteries. In this poster, we present an energy-efficient hybrid key distribution scheme that is designed to suit resource-constrained devices such as WSNs. Proposed Protocol Pre–Deployment Phase: { 𝐾 𝑃 , 𝐾 𝑅 } ⟵ 𝑅𝑆𝐴 𝐺𝑒𝑛 . 𝐾 𝑃 ≝ 𝐴𝐾 𝑠𝑖𝑛𝑘 and 𝐾 𝑅 ≝ 𝐴𝐾 𝑛𝑜𝑑𝑒𝑠 . 𝑆𝑖𝑛𝑘 𝑛𝑜𝑑𝑒≔ 𝐴𝐾 𝑠𝑖𝑛𝑘 and 𝑆𝑒𝑛𝑠𝑜𝑟 𝑛𝑜𝑑𝑒 ≔ 𝐴𝐾 𝑛𝑜𝑑𝑒𝑠 .   Key Distribution Phase: Sink node: 𝐾 session 𝑅 0,1 128 and timestamp 𝑇. 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 session ∥𝑇 . 𝑠𝑒𝑛𝑑 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 session ∥𝑇 . Sensor nodes: 𝑟𝑒𝑐𝑒 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 session ∥𝑇 . 𝑃⟵𝐷 𝐴𝐾 𝑛𝑜𝑑𝑒𝑠 𝐶⟵ 𝐸 𝐴𝐾 𝑠𝑖𝑛𝑘 𝐾 session ∥𝑇 . 𝑓 verif 𝑇 = accept , &𝑇≤𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 reject , &𝑇 >𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 . Post-Key distribution phase: Data𝐷, and timestamp 𝑇. 𝐶⟵ 𝐸 𝐾 session ⊥ Data𝐷∥𝑇 𝑠𝑒𝑛𝑑 𝐶⟵ 𝐸 𝐾 session ⊥ Data𝐷∥𝑇 . 𝑟𝑒𝑐𝑒 𝐶⟵ 𝐸 𝐾 session ⊥ Data𝐷∥𝑇 . 𝑃⟵𝐷 𝐾 session ⊥ 𝐶⟵ 𝐸 𝐾 session ⊥ Data𝐷∥𝑇 . 𝑓 verif 𝑇 = accept , &𝑇≤𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 reject , &𝑇>𝑡𝑖𝑚𝑒 𝑡ℎ𝑟𝑒ℎ𝑠𝑜𝑙𝑑 . Efficiency Analysis we examine the energy efficiency of our proposed scheme compared to the following key distribution schemes[3], [4], and [5]   . Conclusion Each time the distance double between two wireless sensor nodes, four times the amount of power are required. Therefore, proposing a key distribution scheme without considering the number of frames that are involved in key distribution process is not practical for such resource-constrained devices. Also, ignoring the wireless channel effects is not realistic because every wireless channel has effects that contribute to energy consumption. Therefore, when we designed our scheme, we consider all that issues. Security Analysis We utilized ProVerif, the automatic cryptographic protocol verifier to automatically analyze the security of our proposed scheme and verify it in a formal model. The Adversary model is based on Dolev-Yao model [6]. I. Reachability and Secrecy Investigating the reachability of sensor data𝐷 to an adversary. References [1] A. Coorporation, "Atmel ATmega328P Datasheet," ed, 2011. [2] X. P. D. Sheet, "nd< www. sparkfun. com/ datasheets/ Wireless/Zigbee," XBee-Datasheet. pdf. [3] H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 2005, pp. 524-535. [4] L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 41-47. [5] Y. Zhang, "The scheme of public key infrastructure for improving wireless sensor networks security," in Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, 2012, pp. 527-530. [6] D. Dolev and A. Yao, "On the security of public key protocols," IEEE Transactions on information theory, vol. 29, pp. 198-208, 1983.