Data Security Using Loc-Trust Method Jnanavi R B , Hemanth S R

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
Data Security Using Loc-Trust Method
Jnanavi R B#1, Hemanth S R*2
1
M Tech student, Dept of computer science, Maharaja Institute of Technology, Mysore,
Karnataka, India
2
Asst Professor, Dept of computer science, Maharaja Institute of Technology, Mysore,
Karnataka, India
Abstract: Wireless sensor networks are broadly distributed
sensors which monitor physical or environmental conditions.
They are vulnerable to various security attacks such as selective
forwarding, black hole and false data injection attack. An
adversary can compromise one or more sensor nodes and get the
information about those nodes. Through those compromised
nodes false data is injected and drains the energy resource in the
en-route nodes. So the filtering should be executed as early as
possible to pacify the energy consumption. To deal with this issue
a filtering mechanism known as Loc-Trust scheme is proposed
which filters false data earlier and provides secure data
transmission. The AODV protocol is used for routing and it is
implemented in NS2, the en-route nodes verifies the reports
based on the relative location information of the node. Only
small amount of injected data needs to be checked by the sink,
this reduces the burden on sink.
Keywords: Wireless Sensor Networks, false data injection,
compromised node, energy consumption.
I. INTRODUCTION
Wireless Sensor Networks comes up as an vital area in
wireless technology. In future, the WSNs is composed by
thousands of inexpensive nodes, each nodes with sensing
capability with limited computational and communication
power and can be deploy in a large-scale sensor network. It is
a new network technique and applied in real life, rescue and
military environment. A large number of tiny and inexpensive
sensor nodes compose a distributed WSN; they are typically
resource constrained, with limited energy lifetime, slow
embedded processor, limited memory, and low-bandwidth
radios[1].
A tiny device in WSN monitors physical or environmental
conditions such as temperature, pressure, motion or pollutants
etc. at different areas[3][4]. Such sensor networks is deployed
in a vast variety of environments for commercial, civil, and
military applications such as surveillance, vehicle tracking,
climate and habitat monitoring, intelligence, medical, and
acoustic data gathering. The key limitation in wireless sensor
networks is storage, power and processing. The main
components of sensor nodes are radio transceiver,
microcontroller, power supply, and the actual sensor[2]. The
sensing bounds measures atmosphere condition related to the
environment surrounding, the sensor then transforms them
into an electric signal. Proceeding such a signal broadcast
some properties about objects located and/or events happening
ISSN: 2231-5381
in the vicinity of the sensor. The sensor sends the collected
data, via radio transmitter, to a base station either directly or
through a intermediate nodes.
Sensor nodes will be deployed in hostile environment and it
doesn’t equip with special tamper-resistant hardware, so an
adversary can easily compromise a sensor node[5]. By using
the compromising nodes the attacker can inject fake sensing
reports, which represent nonexistent events in the field, into
the network with the aim of delude the BSs or depleting the
limited energy resources of forwarding nodes. To prevent
them from fabricating reports, every sensing report should be
witnessed by multiple nodes, through attaching multiple
message authentication codes (MACs) generated by them
using different cryptographic keys. The key challenge in
sensor networks is to maximize the lifetime of sensor nodes
due to the fact that it is not practical to replace the batteries of
thousands of sensor nodes. Therefore, computational
operations of nodes and communication protocols must be
made as energy efficient as possible.
It is crucial to filter false data in WSN[4] which results in
energy deprivation. To deal with this issue, some false data
filtering mechanism have been developed. Some filtering
mechanisms use the symmetric key technique when the node
is compromised. Compromised node can abuse its keys to
generate false reports and the reliability of the filtering
mechanisms is degraded. The node can verify the report based
on the MACs carried in it. This cannot filter false data forged
collaboratively by t compromised nodes from different areas.
In order to overcome this Loc-Trust scheme is used, in this
secure routing is established using the AODV protocol.
Initially the location information of the sensor nodes is
obtained using that information trust value will be calculated.
Based on these values the report will be verified by the enroute nodes and filters out the false data.
II. EXISITING SYSTEM
Different works on filtering false data in wireless sensor
networks have been proposed, some are Statistical en-route
filtering, interleaved hop-by-hop authentication and A Double
Key-sharing. The details of these techniques are discussed
below.
http://www.ijettjournal.org
Page 407
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
A. Statistical en-route filtering
Ye et al. proposed a statistical en-route filtering scheme based
on probabilistic key distribution. In this the global key pool
will be divided into n partitions, each partitions contain m
keys. Every node randomly selects k keys from one partition.
When some event occurs, each sensing node creates a
message authentication code (MAC) for its report using one of
its random keys. The cluster head combines the reports from
the sensing nodes and guarantees each aggregated report
contains T MACs that are generated using the keys from T
different partitions, where T is a predefined security parameter.
More than T-1 nodes cannot be compromised; each
forwarding node can detect a false report with a probability
proportional to 1/n. The filtering ability of SEF is independent
of the network topology, but restrained by the value of n. To
increase the filtering ability, the value of n is cut down;
however this allows the adversaries to break all partitions
more easily. Along with this, since the keys are shared by
number of nodes, the compromised nodes can take off other
nodes and report some forged events that “occur” in other
clusters [8].
III. PROPOSED SYSTEM
The design goal of Loc-trust method is to achieve energy
efficient authentication for filtering false data and providing
data security. Sensor nodes are deployed randomly at certain
region. The communication between the two sensors nodes
are bidirectional. The nodes within the transmission range can
directly transfer the data. If the sensor node is far from the
transmission, it makes use of other intermediate nodes to
establish a route. Each sensor node have the node ID’s.
Between the sensor nodes they elect one node as COS based
on battery. Data aggregation is done, it is a process in which
information is gathered and expressed in a summary form.
Once the nodes are deployed secure routing is established
using AODV protocol. Every node will have the node ID
using that ID routing is done. When the nodes sense the event
it obtains its location information. And finally generates a
report with location information binded to the report. En-route
node verifies the report by calculating the trust value, using
the location information in the report. The trust value should
be in the range [0, 1].
B. Interleaved hop-by-hop authentication (IHA)
Zhu et al. proposed an IHA scheme. In this, the base station
periodically initiates an association process enabling each
node to establish pair wise keys with other nodes that are t+1
hops away, where t is called as security threshold value. In
IHA, each sensing node creates a MAC using one of its
multihop pairwise keys and a legitimate report should contain
t+1 distinct MACs. Since every multihop pairwise key is
distinguishable, IHA can tolerate up to t level compromised
nodes in each cluster instead of in the whole network as SEF
does. Moreover, the high communication overhead incurred
by the association process makes IHA unsuitable for the
networks whose topologies change frequently[7].
C. A Double Key-sharing
Sun et al. Proposed Double key sharing based false data
filtering scheme. In DSF, after deployment nodes will be
grouped into clusters and a block region is formed through
pair-wise keys closer to the source node. When an event
occurs, a legitimate report must carry two types of MACs.
And even symmetric keys are added to the clusters. In
filtering phase, each forwarding node has to validate the
correctness of these two types of MACs carried in the report
and drops part of tail of the reports just outside the blocked
region. False report injected by compromised node from
different clusters can be detected and filtered out by binding
the set of keys to the cluster. The cluster head will be elected
based on its ID, it collects the sensing information from the
nodes and generates the report on behalf of the cluster. Later
by checking the MACs the reports will be verified. If the
attached MAC differs from locally computed the report will
be dropped. But in this false report generated by the cluster
can be filtered within only little hops[9].
ISSN: 2231-5381
Fig -1: Flow of stages in proposed model
A. AODV working
AODV builds routes using a route request/route reply cycle.
When a source node needs a route to a destination, it
broadcasts a route request (RREQ) packet.
1. Nodes which receive this packet add that entry in their
routing tables for the source. The nodes also keep track of
http://www.ijettjournal.org
Page 408
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
source’s IP address, current sequence number and broadcast
ID. The RREQ also contains the most recent sequence number
for the destination, of which the source node is aware.
2. A node receiving the RREQ may send a route reply(RREP)
in the following case:If it is the destination.
If it has a route to the destination with sequence number
greater than or equal to that contained in the RREQ, indicating
that it has fresh information about the destination. If none of
the above cases are satisfied then the RREQ is forwarded
using a broad-cast. The broadcast ID is used by nodes to
detect already processed RREQs. If they receive a RREQ
which they have already processed, they discard the RREQ
and do not forward.
3. After establishing the path source sends data to Destination.
Fig -3: Energy Consumption (JS) with number of nodes
IV. EXPERIMENTAL RESULTS
The comparison of the proposed routing scheme and basic
AODV routing protocol is done. The results are obtained for
the different combinations of the number of connected nodes
in the network. The secure data transmission mechanism is
evaluated in terms of Packet Delivery Ratio, Average Delay,
Energy consumption and overhead. Its compared with existing
system and found remarkable improvement in their
performances.
Fig -4: Packet Delivery ratio with number of nodes
Fig - 2: Delay (ms) with number of nodes
Fig -5: Overhead with number of nodes
ISSN: 2231-5381
http://www.ijettjournal.org
Page 409
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
CONCLUSION
A major challenge for a wireless sensor network lies in the
energy constraint at each node, which poses a fundamental
limit in the network life time. False data filtering is an
important issue in Wireless Sensor Networks. Multiple
compromised nodes forge a fake report and inject the report
into the network. This type of attack is hard to defend with
existing approach. This method aims to deal with this problem,
by using the location information along with the MAC. The
reports are verified by using the location and trust value. It is
very suitable for filtering false data in wireless sensor
networks and hence compromise-tolerant.
ACKNOWLEDGMENT
We would like to give our sincere gratitude to our guide Mr.
Hemanth who encouraged and guided us throughout this paper.
REFERENCES
[1] W. Su Y. Sankarasubramaniam E. Cayirci Akyildiz, I.F. A survey on
sensor networks. IEEE Communications Magazine, 2002.
[2] Kumar.S.P. Chee-Yee Chong. Sensor networks: Evolution, opportunities,
and challenges. Proc IEEE, August 2003.
[3] Ismail H. Kasimoglui Ian .F. Akyildiz. Wireless sensor and actor research
challenges. (Elsevier) Journal, 2004.
[4]Akylidz.J,Weilian Su,Boyen.X (2003)“A Survey on Wireless Sensor
Networks”. IEEE Communication Magazine 2002 , LNCS, Vol. 2729, pp.
383399, Springer-Verlag,.
[5] F.Y. Ren, H.N. Huang, C. Lin, Wireless sensor networks, Journal of
Software 14 (7) (2003) 1282–1291.
[6] E. Ayday, F. Delgosha, F. Fekri, Location-aware security services for
wireless sensor networks using network coding, IEEE Conference on
Computer Communications, 2007, pp. 1226-1234.
[7] S. Zhu, S. Setia, S. Jajodia, An interleaved hop-by-hop authentication
scheme for filtering of injected false data in sensor networks, in: Proceeding
IEEE symposium on Security and privacy, 2004, pp. 259–271.
[8] F. Ye, H. Luo, L. Zhang, Statistical en-route filtering of injected false data
in sensor networks, in: Proceedings of 23th Annual Joint Conference of the
IEEE Computer and Communications Societies, 2004, pp. 2446–2457.
[9] Qian Sun, Min Wu, A double key-sharing based false data filtering
scheme in wireless sensor networks, Journal of Computers,2013.
[10] Rahul Tiwari, Amit Saxena, A review on energy efficient routing in
wireless sensor networks, Journal of engineering trends and technology,2015
ISSN: 2231-5381
http://www.ijettjournal.org
Page 410
Download