Cluster Based Secure Communication through Shamir Secret Sharing Technique A.B. Vasavi,

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number2- Dec 2014
Cluster Based Secure Communication through
Shamir Secret Sharing Technique
1
A.B. Vasavi,2KavithaKapala
1
1,2
Final M.TechStudent,2Sr.Assistant Professor
Dept.of IT, Aditya Institute Of Technology And Management,Tekkali.,A.P
Abstract:Secure transmission of data over cluster
based wireless sensor networks is one of
interesting research issues.In this paper we are
proposing an efficient cluster based secure
transmission technique in wireless sensor
networks with authenticated Shamir key
generation protocol with data confidentiality. In
this approach we initially cluster the nodes based
on coordinates of the node and we can choose
any cluster for experimental implementation on
nodes in cluster. Our experimental result shows
more efficient results than traditional approaches.
I. INTRODUCTION
In present days wireless sensor networks
are hugely increasing networks to communicate.
In these networks there are many applications
deployed in various locations controlled by
someone and they form adhoc networks. In this
messages are easily broadcasted using routers
and mobiles devices. There are many sensors
expected to provide fast and secure
communication. Generally there are different
types of sensor nodes which form adhoc
networks and it needs group of similar types so
called as clustering. By using clustering all nodes
are accurately divided and grouped for achieving
efficiency and extend the life time of the wireless
sensor networks. [1, 4]
The clustering algorithms in wireless
sensor networks there are cluster heads which
consists of clusters. In this there are some
parameters there are number of clusters, intracluster communication, nodes types and roles,
cluster head selection and mobility[2] [3].
Coming to number of clusters that is cluster
count is the number of clusters. The groups of
cluster heads are described and the number of
ISSN: 2231-5381
clusters is usually complexparameters which
consider the efficiency of the routing protocol. In
clustering methods the communication between a
sensor and its cluster heads are considered as
single hop communication.
In communication process the sensor
nodes are limited or the cluster count is very
huge and the number of cluster heads is bounded.
In mobility let us consider the base station sensor
nodes and the cluster heads are generally very
stable clusters and provide the intra-cluster
network management. In the cluster heads are
also themselves are assumed to be mobile and the
registration of cluster for each node dynamically
change and forcing clusters to involve in time
and need to maintain continuously. The cluster
heads selection is proposed in some algorithms
can be assigned previously[5]. In homogeneous
environment the cluster heads are selected from
the hosted group of nodes and their probabilistic
or completely random way based on more
particular situations for example residential
energy and connectivity etc.[6, 8]
In algorithm complexity the time
complexity is the rate of most cluster procedures
are proposed in presents is very constant. In the
traditional protocols the complexity time has
been allowed to base on the total number of
sensors in the wireless sensor networks and
focusing[7].
Overlapping: In several methods give also
very important on the topic of node overlapping
within various clusters and either for best routing
efficient or for faster cluster generation protocol
execution or for other reasons). Many of the
traditional protocols and tried to have minimum
merging or do not provide the merging at all.
http://www.ijettjournal.org
Page 108
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number2- Dec 2014
The Sensor Network Wireless is much
assumed as very important methods for the 21st
century. The sensor electronics scaled the
ambient situations related to surrounding the
sensors and transform them in to an electrical
signal. In many WSN applications and the
deployment of sensor nodes is performed in an
ad-hoc fashion without careful planning and
engineering. An intensive research that addresses
the potential of collaboration among sensors in
data gathering and processing and in the
coordination and management of the sensing
activities were conducted. The sensor nodes are
constrained in energy supply and bandwidth.
Energy conservation is critical in
Wireless Sensor Networks. Replacing or
recharging batteries is not adoption for sensors
deployed in hostile environments. The
communication electronics in the sensor utilizes
most energy. Stability is one of the major
concerns in advancement of Wireless Sensor
Networks(WSN). A number of applications of
WSN require guaranteed sensing, coverage and
connectivity throughout its operational period.
Death of the first node might cause instability in
the network. Hence all of the sensor nodes in the
network must be alive to achieve the goal during
that period. One of the major obstacles to ensure
these phenomena is unbalanced energy
consumption rate. Numerous techniques were
proposed to improve energy consumption rate
such as clustering, the efficient routing and the
dataaggregation. In a typical WSN application,
sensor nodes are scattered in a region from where
they collect data to achieve certain goals. Data
collection may be continuous, periodic or event
based process. WSN must be very stable in some
obits applications like security monitoring and
motion tracking[8].
II. RELATED WORK
In many techniques already proposed to
increase network time span wireless sensor
networks. The clustering techniques are used in
wireless ado networks, mobile ado networks with
sensor networks. Clustering is a method is hosted
ISSN: 2231-5381
in sensor networks are set into clusters. The
sensor node is responsible for base station in the
communication in a cluster. The sensor node is
also called as cluster head and the remaining
nodes in the cluster are known as followers.
There are various clustering methods are
established for wireless sensor networks. The
techniques cannot used in wireless sensor
networks because of the moderate the need
energy efficient than mobile networks and there
are very differences in energy of the sensor
nodes[2] [9].
In previous traditional algorithms the
routing algorithm merges hierarchical routing
that is performed in greedy habitats. The method
of data packet sending from the source peers and
the destination location to the base station have
two phases such as inter cluster routing and intra
cluster routing.
In inter cluster routing the greedy method
is apt to send data packets from the cluster heads
of the destination locations to the base station. In
intra cluster routing is to used pass the packet
inside the group of the cluster until nodes are less
than the threshold. In other approach packet in
destination cluster which means the cluster head
segregates the destination cluster into sub
locations and generates the similar number of
query packet and the global node in sub location.
In another algorithm is ACE is distributed
clustering method which creates clusters into two
stages such as swapping and migration. There are
much iteration in every phase and the distance
between two successive iterations uniform
distribution. In the spawning stage the novel
clusters are generated in elective manner and as
nodes predicts to become its followers. In ACE
result in cluster creations with packets efficient is
very closure to packing. It does not consider the
energy of the nodes until the selecting cluster
heads.
Distributed algorithms are also called as
HEED [1] the residual energy of sensor nodes
which outputs in the generation of clusters by
http://www.ijettjournal.org
Page 109
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number2- Dec 2014
statistically distributing the cluster heads across
the network. It selects cluster heads according to
a hybrid parameter and which consists of primary
parameter the energy of a node and a secondary
parameter such as propinquity of a node to its
neighbors or node degree. HEED converges in 0
(1)iterations using low messaging overhead and
achieves uniform cluster head distribution across
the network. It chooses the initial percentage of
cluster heads randomly. This random choice
remains as a severe limitation of this algorithm.
Optimal energy aware clustering [2]
solves
the
balanced-clustering
problem
optimally, where k signifies the number of master
nodes that can be in the network. The algorithm
is based on the minimum weight matching. It
optimizes the sum of spatial distances between
the member sensor nodes and the master nodes in
the whole network. It effectively distributes the
network load on althea masters and reduces the
communication overhead and the energy
dissipation. However, this research work does not
consider of residual energy level while choosing
anode as the master.
A number of research attempts to improve
network stability period by various techniques
like routing, scheduling, aggregation etc.
However, in this paper we attempt to improve the
network stability period using clustering as it can
serve as a better platform for upper layer
functionality such as broadcasting, aggregation
etc. In previous approach ESRPSDC exploits the
underlying method of Energy-Efficient Level
Based Clustering Routing Protocol [5]. In our
proposal, we have incorporated the security
methods as specified in [6] [10].
III. PROPOSED WORK
We are proposing an empirical model of secure
cluster based data transmission technique with
authenticated Shamir secret sharing and IDEA
cryptographic algorithm. Initially nodes can be
clustered with K means algorithm, to group the
similar type or nearest objects based on geo
parameters of nodes, and then we can perform
ISSN: 2231-5381
cluster based secure transmission between any
nodeswithin the cluster. Data can be encrypted
with IDEA algorithm to maintain data
confidentiality along with key generated by
Shamir secret key generation algorithm.
Nodes clustering:
Nodes can be clustered based on
Euclidean distance between nodes, based on
geocodlings
of
nodes.
In
k
means
clustering,initially k number of centroids selected
from dataset and compute Euclidean distance
between k centroids and other data points, place
the data point or node which is nearest tocentroid
and continue the same process until maximum
number of iterations reached.
K Means Clustering
Step1: Select K points as initial centroids for
initial iteration
Step 2: until Termination condition is met (user
specified maximum no of iterations)
Step 3: Measure Euclidean distance data point
and centroid
Step 4: Assign each point to its closest centroid
to form K clusters
Step 5:
Recomputed the centroid within
individual clusters
Step6 .Continue steps from 2 to 5
Secure Key Generation:
A secure session key can be generated
between the required clusters based on
destination node, Shamir secret sharing one of
the efficient group protocols for generation secret
key. All users request at key generation center
with Random challenge, in turn it forwards a
secret share to the respective user .Every Group
Member forwards a random challenge (Ri) to
group manager, in turn it forward a secret share
(xi,yi),data member computes (xi, (yi XOR Ri)) and
forwards the verification share to group manager
and group manager verifies the user
authentication with reverse XOP operation with
random challenge, if it generates the
corresponding member secret share ,then member
is an authorized member
http://www.ijettjournal.org
Page 110
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number2- Dec 2014
Key generation centergenerates the
key randomly it can be treated as a0 and
generates a quadratic equation ,so generate two
constant values ,with all these parameters ,find
the points which satisfies the equation, these
points can be forwarded to users to reconstruct
the key input to construct the Lagrange’s
polynomial equation f(x).
key cannot be exchanges directly in proposed
architecture ,transmits indirectly in terms of
points to reconstruct the key,it leads to much
security because security depends on key which
is used to encrypt the data packets.
10
8
6
4
2
0
Traditional
The main objective is to divide secret key S
into pieces of data D1,…Dn
in
such a way that:
1. Aware of any k points from D can
compute the secret key k
2. Details of k-1 shares cannot determine the
secret key S
This mechanism is called (k,n) threshold scheme
or Shamir secret share technique. If
then
all users are required for reconstruction of the
secret key.
Rch ----Random_challenge
Sshare---Secret_share
Vshare----verification_share
P={p1,p2…pn}-------points for construction of
Lagrange’s equation
After generation of the secure session key
data can be transmitted through clustered nodes
by encrypting the data with IDEA cryptographic
algorithm to maintain data confidentiality
For
experimental
analysis
we
implemented in java and compare with various
factors in both traditional and proposed approach
with time complexity i.e time taken to transmit
data packets from source to destination, in
traditional approach and cluster based proposed
approach. Transmission speed varies from
traditional approach, because data packets need
not transmit through all nodes ,transmits only
through cluster based nodes. For secure
transmission of data packets between the nodes
ISSN: 2231-5381
Proposed
Fig: Performance Evaluation
IV. CONCLUSION
We are concluding our current research work
with efficient and secure Cluster based data
transmission technique. K means clustering
algorithm groups the nodes based on geo
parameters, Clusters can be selected based on
destination node availability. A secure key can be
generated between the nodes in selected cluster,
for secure transmission and to maintain data
confidentiality, it can be encrypted with IDEA
cryptographic algorithm
REFERENCES
1. Huang Lu, Jie Li and Mohsen Guizani “Secure and
Efficient Data Transmission for Cluster-Based Wireless
Sensor Networks” Ieee Transactions On
Parallel And Distributed Systems, Vol. 25, No. 3, March
2014.
2. Deng, Jing; Han, Yunghsiang S.; Heinzelman, Wendi B.;
and Varshney, Pramod K., "Balanced energy sleep
scheduling scheme for high density
cluster-based
sensor
networks"
(2004).Electrical
Engineering and Computer Science. Paper 102.
3. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey
of Security Issues in Wireless Sensor Networks,” IEEE
Commun. Surveys Tuts., vol. 8, no.
2, pp. 2–23, 2006.
4. A. Abbasi and M. Younis, “A survey on clustering
algorithms
for
wireless
sensor
networks,”
Comput.Commun., vol. 30, no. 14-15, pp. 2826–2841,
2007.
http://www.ijettjournal.org
Page 111
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number2- Dec 2014
5. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
“An Application-Specific Protocol Architecture for
Wireless Microsensor Networks,” IEEE
Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,
2002.
6. Mohamed Younis, Moustafa Youssef, KhaledArisha,
“Energy-Aware Routing in Cluster-Based Sensor
Networks”.
7. Jamal N. Al-Karaki, The Hashemite University Ahmed
E. Kamal, Iowa State University “Routing Techniques In
Wireless Sensor Networks: A
Survey”, , 1536-1284/04/$20.00 © 2004 IEEE IEEE
Wireless Communications, December 2004
8. K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design
and Implementation Issues of Clustering in Wireless
Sensor Networks,” Int. J. Comput.
Applications, vol. 47, no. 11, pp. 23–28, 2012.
9. Chris Karlof , David Wagner., “Secure routing in
wireless sensor networks: attacks and countermeasures,”
1570-8705/$ - see front matter _ 2003
Elsevier.
10. R.Shanmugapriya,” Secure Transmission Approach for
Multi Cluster Wireless Sensor Network”, conference
publication
ISSN: 2231-5381
http://www.ijettjournal.org
Page 112
Download