Wireless sensor network security using zero knowledge protocol pdf

Oct 26, 2009 nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task. It was created by the institute of electrical and electronics engineers ieee, entity. Meeting these goals requires careful design of both the sensor hardware and the network protocols. The security mechanism are not used directly in wireless sensor networks. This section describes the routing security in wireless sensor network. We propose in this paper a computationally efficient security scheme for identifying network members in wireless sensor networks. Conventional authentication schemes are not suitable to the sensor node because of the limitations of memory, computational power and energy in the node. Usually, wsns are connected to a legacy network ip network or 3 g network using one or more sink nodes or base stations. The localized encryption and authentication protocol leap is a key management protocol used to provide security and support to sensor networks. Authentication in wireless sensor networks using zero. Unlike previous methods for key distribution in wsns, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Wireless embedded designers must assess these tradeoffs and make multiple decisions, such as transducer and. In particular, wireless sensor network product in industry will n ot get acceptance unless there is a. On the security of clusterbased communication protocols for.

Obstacle to sensor security a wireless sensor network is a special network which has many constraints compared to a traditional computer network. Analysis of security protocols in wireless sensor network. In 5 security properties for sensor networks are analyzed. In the wireless sensor network non transmission of crucial cryptographic. Stankovic department of computer science university of virginia charlottesville, virginia 22904 email. Manets have high degree of mobility, while sensor networks are mostly stationary.

Secure and efficient data transmission in wireless sensor. The goal of this paper is to develop a security model for wireless sensor networks. Wsn nodes have less power, computation and communication compared to manet nodes. The zeroknowledge proof zkp in cryptography can secure the. C kotak2 1shah and anchor kutchhi engineering college, mumbai 2principle, shah and anchor kutchhi engineering college, mumbai abstract wireless sensor networks wsn is excellent technology which provide great potential for situations like.

Once the base station is authenticated, the others members of the network can then be authenticated by the base station. Each intermediate node must perform routing and forward the data along a multihop path. Its main purpose is to let the communication between two devices. The aim of this book is to present few important issues of wsns, from the application, design and technology points of view. Leap is also a very popular security solution in wireless sensor networks and it was proposed by zhu et al in 2004. Additionally, the finished creation consists of multiparty protocols that. Security is a common concern for any network system, but security in wireless sensor network is of great importance to ensure its application success. This section presents the network architecture, security vulnerabilities, and protocol objectives. Feasibility of basic security schemes in wireless sensor networks security is a broadly used term encompassing the characteristics of authentication, integrity, privacy, nonrepudiation, and antiplayback 5. Network security projects final year projects in network. The book highlights power efficient design issues related to wireless sensor networks, the existing wsn applications, and discusses the research efforts being undertaken in this field which put the reader in good pace to be able to understand more advanced research and.

Security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. Hence the network layer attacks are listed with its counter measures. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off. Security models for wireless sensor networks 5 note that a lot of research is still being conducted in perfecting the protocol stack for sensor network, so the exact protocols are yet to be concreted. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of. A survey of security issues in wireless sensor networks yong wang university of nebraskalincoln. Oliveira, eduardo habib, hao chi wong 1, antonio a. Standardization has yet to occur for a communications system optimal for use with wireless sensor networks. The zero knowledge protocol is used to ensure non transmission of crucial cryptographic information in the wireless network in order to avoid maninthe middle attack and replay attack. Dec 01, 2009 security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. Wireless sensor networks use batteryoperated computing and sensing devices. Implementation of zero knowledge protocol in wireless security ibrahim aziz patwekar1, dr. Network architecture consider a cwsn consisting of a fixed bs and a large number of wireless sensor nodes, which are homogeneous in functionalities and capabilities.

Section 2 discusses constraints, security requirements, threat models, attacks for wireless sensor networks. While increasing network lifetime, data aggregation protocols may degrade important quality of service metrics in wireless sensor networks, such as data accuracy, latency, faulttolerance, and security. In this mesh topology, sensor nodes must not only capture and disseminate their own data, but also serve as relays for other sensor nodes, that is, they must collaborate to propagate sensor data towards the base station. Ensuring authentication and security using zero knowledge. Superimposed sdisjunct code in this section, we introduce the basics of.

Dec 20, 20 secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process. This is the difference between the mobile network to the wireless sensor network as in mobile network the cell phones are denied of the service once too many phones are present in the area while in the wireless sensor network the service increases as more nodes are present in the network. A key distribution protocol for wireless sensor networks. However, the potentially hostile environment in which sensors are located also introduces new challenges in defending the network, e. The algorithms developed for wireless adhoc networks cannot be used for. Conservation of energy in wireless sensor network by preventing. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of unique identifiers becomes infeasible 2.

May 17, 20 wireless sensor network security model using zero knowledge protocol in java email. Introduction to wireless sensor networks february 2012 this standard defines a communication layer at level 2 in the osi open system interconnection model. With attachment of unique fingerprint to each node we address the clone attack. For example, when sensor network is used for military purpose, it is very important to keep the sensed information con. Wireless sensor network security model using zero knowledge protocol international organization of scientific research 5 p a g e. We propose a method for identifying the compromisedcloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol 5,15. These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. Loureiro federal university of minas gerais, mg,brazil.

Presented by chetan rana u08co2 intoduction wireless sensor networks are networks that consists of sensors which are distributed in an ad hoc manner. Sensor nodes are prone to failures due to harsh environments and energy constraints. One of the main limitations is the identification of nodes. Pdf wireless sensor network security model using zero. The proposed scheme was evaluated based on the simulation results. Pdf wireless sensor networks wsns offer an excellent opportunity to monitor. Section 3 lists the security solutions for establishing a secure sensor network. As cryptographic schemes tend to exhaust sensor network resources, this paper investigates the use of zero knowledge protocol for the authentication of sensor nodes. Wireless sensor network security model using zero knowledge protocol in java email. Attacks are generally classified into active, passive, inside, outside. Hence, security and data authentication are the major requirements for the wireless sensor networks.

Security in wireless sensor network is vital to the acceptance and use of sensor networks. Hence these networks have always been in quest for efficient and inexpensive authentication mechanisms. A new stage of privacypreserving scope for locationbased. Secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process. Authentication in wireless sensor networks using zero knowledge. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementation of a complete security solution for a sensor network.

Recent advances insemiconductor, networking and material science technologies are driving the ubiquitous deployment of largescale wireless sensor networks wsns. A survey of security issues in wireless sensor networks. Section 1 lists the introduction of wireless sensor network. Conclusion in this project, we proposed a new security model to address three important active attacks namely cloning attack, mitm attack and replay attack. The architectures of the networks employed, data rates, network size, span, power management and security protocols are all affected, if not dictated, by the communications protocols chosen for the application. A hybrid security approach for nodes authentication in. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementa. In order to provide an efficient method to verify the. Nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task. Wireless sensor network, security, attacks, passive and active attacks, diverse layer attacks, cryptographic attacks. Detection of various attacks using zero knowledge protocol. Therefore, it is widely used in offices, banks, and many other organizations. Security protocols for use with wireless sensor networks. Multihop networks have a wider range of applications at the cost of higher control complexity.

As sensors are used to monitor sensitive areas therefore security and energy. In proceedings of 2011 ieee international conference on communications icc pp. If in around 1985 and attacker had to have sophisticated. Malicious node security wireless sensor network zero knowledge protocol. This is the difference between the mobile network to the wireless sensor network as in mobile network the cell phones are denied of the service once too many phones are. Because sensor networks pose unique challenges, traditional security techniques used in traditional networks cannot be applied directly. Introduction as a result of the growth of networks, over the years the network attack tools and methods have greatly evolved. We used the concept of zero knowledge protocol which. The main features of the hardware and the operating system are described below. We propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol zkp for verifying the authenticity of the sender sensor. Wireless sensor network security model using zero knowledge protocol. We propose a method for verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol for identifying the compromisedcloned nodes. Sensor network, seismic, message authentication code, hopping, spread spectrum etc.

The authentication process is done by first identifying the base station as being the authentic one with the use of fingerprinting information. The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network. Authentication in wireless sensor networks using zero knowledge protocol. Implementation of zero knowledge protocol in wireless security. Wireless sensor networks wsns can be used to monitor environments, and. We implement zero knowledge protocol zkp for the verification of sender sensor nodes. Manet wireless sensor networks may be considered a subset of mobile adhoc networks manet. Security protocols for wireless sensor network network. This paper investigates the use of an identity mechanism called zero knowledge protocol zkp, for the authentication of sensor nodes. Wireless sensor networks technology and applications.

Wireless sensor network security model using zero knowledge. Wireless sensor and actor network security analysis. Our simulation results indicate that our proposed scheme ensures high security to the network with minimal. Modular sensor board msb430 is a hardware platform for wireless sensor networks created by scatterweb 11. Secure data aggregation in wireless sensor networks. Together, these technologies have combined to enable a new generation of wsns that differ greatly from wireless networks developed. The topology of a sensor network changes very frequently due to failures or mobility. Detection of various attacks using zero knowledge protocol in.

310 911 670 863 1554 1037 1121 650 1338 655 887 986 100 365 1627 202 1100 129 1043 1197 41 534 454 416 610 344 596 396 913 42 512