Enhancing the Life Time of Wireless Sensor Networks Using SOBAS 1 2 K.Dhana Bhavithra, PG Student, Kongu Engineering College, Perundurai dhanabhavithrait@gmail.com Dr.S.Anandamurugan, Assistant Professor (SLG), Kongu Engineering College, Perundurai valasuanand@yahoo.com Abstract: for malicious nodes to eavesdrop, intercept, or loose be made aware of the presence of the network. is Thus, SOBAS provides energy efficient and an introduced, to securely synchronize the events in effective technique to securely synchronize the the network, without the transmission of explicit nodes on the data delivery path in the network. The Secure Synchronization sOurce-BAsed (SOBAS) protocol synchronization control messages. Nodes use their local time value and initial vector value as a Key Words: SOBAS, Loose Synchronization, one-time dynamic key to encrypt each message. SOBAS provides an effective dynamic en-route Wireless Sensor Network, Dynamic En-Route filtering mechanism, where the malicious data is Filtering. filtered from the network. Instead of 1 Introduction synchronizing each sensor globally, SOBAS focuses on ensuring that each source node is synchronized with the sink such that event reports generated by the sink are ordered properly. Hence, the objective of the SOBAS protocol is to provide a loose synchronization protocol for WSNs rather than a perfect synchronization among the nodes. With loose synchronization, it reduces the number of control messages needed for a WSN to operate providing the key benefits of reduced energy consumption as well as reducing the opportunity Wireless Sensor Networks serves as the most attractive field for many researchers. But it consists of many micro devices called sensor nodes which are powered by batteries. They are widely employed in many applications such as environment monitoring, earthquake detection, etc where replacement of batteries is not practical. Therefore they should be managed carefully to minimize the consumption of energy. Sensor node is a device that includes three basic components: Sensing subsystem Processing subsystem Wireless communication system public key server directory to allow public key 1.1 KEY sharing. PGP server directory keys may be In cryptography, a key is a variable value updated but not removed. that is applied using an algorithm to a string or block of unencrypted text to produce encrypted 2 LITERATURE REVIEW text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it Pottie G.J and Kaiser W.J (2000) proposed that the opportunities for Wireless Integrated will be to decrypt the text in a given message. Network Sensors (WINS) depend on the development of scalable, low cost, sensor 1.1.1 Private Key network architecture. This requires that sensor In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. information be conveyed to the user at low bit rate with low power transceivers. Continuous sensor signal processing must be provided to enable constant monitoring of events in an environment. By coming to decisions on these events, short message packets suffice. Future applications of distributed embedded processors and sensors will require massive numbers of devices. Conventional methods for sensor networking would present impractical demands on cable installation and network bandwidth. Through processing at source, the burden on 1.1.2 Public Key communication system components, networks, A public key may be placed in an open and human resources are drastically reduced. access directory for decryption of the digital The physical considerations that lead to the signature of the sender; the public key of the design of densely distributed sensor networks, message recipient message. Public encrypts Key the sender’s Infrastructure (PKI) and reviewed the advantages of layered and heterogeneous processing/networking produces public and private keys. The open architectures for these applications. The close access public key may also be e-mailed to intertwining of processing of networking is a trusted contacts and users. Pretty Good Privacy central feature of systems that connect the (PGP) is a popular form of public key physical and virtual cryptography. Public PGP keys are housed in a platforms are now available that will more easily worlds. Development enable a broader community to engage in event fundamental research in networking and new expenditure applications, functionality. advancing us towards truly pervasive computing. detection with and minimum congestion energy resolution Uluagac S, Lee C, Beyah R, and Akan O and Akyildiz I (2005) proposed that Copeland J (2008) proposed that Wireless WSN are event based systems that rely on the Sensor Networks (WSNs) are adhoc networks collective effort of several micro sensor nodes. comprised mainly of small sensor nodes with Reliable event detection at the sink is based on limited resources, and can be used to monitor collective in- formation provided by source areas of interest. It proposes a solution for nodes and not on any individual report. Hence, securing heterogeneous hierarchical WSNs with conventional end-to-end reliability definitions an arbitrary number of levels. This solution and solutions are inapplicable in the WSN relies exclusively on symmetric key schemes, is regime and would only lead to a waste of scarce highly distributed, and takes into account node sensor resources. However, the absence of interaction patterns that are specific to clustered reliable transport altogether can seriously impair WSNs. proposed a solution for securing event detection. Hence, the WSN paradigm heterogeneous hierarchical WSNs with arbitrary necessitates a collective event-to-sink reliability number of levels. This project provides security notion rather than the traditional end-to-end for network setup and reconfiguration, as well as notion. Reliable transport in WSNs has not been for the normal network operation traffic. This studied from this perspective before. The notion scheme sets up pair wise keys between a cluster of event-to-sink reliability is necessary for head and each of its children (or group of reliable transport of event features in WSNs. children) using lightweight group key based This is due to the fact that the sink is only mechanisms whenever possible, falling back on interested in the collective information of a more number of source nodes and not in individual whenever necessary. sensor reports. This is also the reason why traditional end-to-end reliability notions and expensive, BS-mediated mechanisms 3 Existing System transport solutions are inappropriate for WSN. Existing system proposed a suite of Based on such a collective reliability notion, a secure time synchronization protocols[2] where new reliable transport scheme for WSN, the different Event-Sink Reliable Transport (ESRT) protocol, addressed with a protection against pulse delay is presented in this paper. ESRT is a novel attacks. However, these protocols require the transport solution developed to achieve reliable nodes to go through the phase of key discovery hop, group synchronization are with their preloaded themselves. static Moreover, Communicates with keys the many among protocols messages increase the communication costs of the network and making them not applicable for militaryscenarios communication where pattern a more may be Time to synchronize the sensor Network with security, It type 4 Problem Formulation feasible preferred. However, the drawback of this work stems from its statistical nature. In the work by Sun, the authors propose a secure time synchronization [2] protocol utilizing Global Positioning System (GPS) devices starting from source nodes. The proposed work requires a shared static key between the communicating nodes and assumes Wireless synchronization Sensor Networks protocol (WSNs) for send separate synchronization messages and uses static pair wise key-based cryptographic mechanisms to ensure that the clocks [10] of each sensor device are securely globally synchronized (i.e., every device has the same clock value). An alternative approach, Secure sOurce-BAsed loose Synchronization (SOBAS) protocol is used to securely synchronize the events in the network, without the transmission of synchronization control messages. 4.1 Proposed System that the source nodes will be equipped with GPS devices, which is more costly due to periodic An effective technique to securely communication to GPS satellites and increased synchronize the data with source and sink node radio activity increases the opportunity for in the network has been proposed, without malicious threats. Also, GPS may not be transmission effective for all sensor applications (e.g., messages separately. Here proposed system underwater medium) as explained in the focus on ensuring that each source node gets previous section. Additionally similar to, the synchronized with sink nodes also event nodes exchange many messages. A secure time ordering on sink node can be achieved and nodes synchronization heterogeneous along the data delivery path such that event sensor networks with a novel adoption of reports is generated by the sink are ordered Identity-Based Cryptography (IBC) and Pairing- properly. In SOBAS[9], source and destination Based Cryptography[6] (PBC) over elliptic nodes are synchronized loosely, so that the data curves, but the work did not present any is delivered accurately. Initially the source node performance clock requests the time based key management module precision values. Furthermore, two pertinent to generate the key, when there is a need to studies based on associating keys with time transfer data between the source and destination information available in sensor nodes were node. Once the source gets the key it requests presented in papers. the neighbour nodes to send public key[3]. The protocol evaluation for to provide of synchronization control neighbour node which has the key it replies that for both WSNs and sensor-based applications key to source node. Then the source node where utmost silence is necessary, as SOBAS is encrypts the data and send to the destination not chatty. throw forwarder node. Then the forward node decrypts the data and checks whether the 5. IMPLEMENTATION decrypted ID and the given ID is same. If it is 1. Time-based Key Management same then encrypt the data and sends to the next 2. Implementing Cryptography Techniques forward node. If it is not same then mark that 3. Performing Filtering-Forward Scheme data packet as malicious and filters that packet using dynamic en-route filtering mechanism. SOBAS uses the full encryption[12] and 5.1 Time-based Key Management The Time-based Key Management selective encryption method to encrypt the data. (TKM)[13] module generates dynamic key by In full encryption technique each and every using the local time and initial vector value. forwarder node do the encryption and decryption When a source node has data it sends to the sink process. The Selective encryptions only a certain due to either an external stimulation by the sink fraction of the nodes along the path do the or a self-initiated periodic report, it uses its local encryption operations. After that the next clock value as the key. forwarder node continues the same process until the packet reaches to the destination node. Two operational modes: Cryptography module is used to check whether Stateless mode the received data is malicious or not. SOBAS Stateful mode provides an effective dynamic en route filtering mechanism, where the malicious data is filtered from the network. With The stateful mode, a receiver sensor can SOBAS, have a table for each sender sensor, where synchronization is achieved at the sink as individual offset values for each sender is quickly, as accurately, and as surreptitiously as recorded. The next time the sensor receives a possible. Simulation results show that SOBAS is packet from the same sender, it will have a tick an energy efficient scheme under normal window centred on the associated offset value operation and attack from malicious nodes. In for this sender. This makes the effort of the addition to being suitable for the applications receiver easier when it tries to find the correct where the centralized decision authority acts on key for the sender. the information collected from the network, SOBAS approach to synchronization with dynamic en-route filtering[14] is also well suited In the stateful mode, a sensor also with the source node along a data delivery path remembers a previously seen malicious node. It toward the sink with the Full-re encryption or doesn’t maintain the tick window table. Selective-re encryption modes of operation. At this module, the forwarder node gets the 5.2 Implementing Cryptography Techniques source’s local clock value from the cryptography The Cryptography module addresses the security part of SOBAS. This module obtains the dynamic key from the Time-based module and updates its local clock value accordingly. Key Management (TKM) module and performs the necessary security service. It is also used to verify the key from the TKM. If the key value received from the TKM module is not correct then a new key is obtained from the TKM module. This process continues until the correct key is found or the packet is marked as malicious to be discarded in the filtering-forwarding-scheme module when all attempts to find the correct key are exhausted within the tick window. 5.3 Performing Filtering-Forward Scheme (FFS) Finally the filtering-forward scheme module performs the function as shown in Figure 1 Cryptography and Forwarding Filtering Module Figure 1. The system eliminates the data if the node failed to produce proper key. The FFS module filters the incoming packet out of the 6 RESULT ANALYSIS 6.1 Nodes Vs Delay network if it is classified as a bad packet or Delay refers, the average time elapsed malicious packet by the cryptography module or after a packet is send and before it is received. otherwise forwards it to the upstream nodes. In Figure 2 shows, the selective-stateful encryption SOBAS, this module is also responsible for the process is well suitable for SOBAS and the synchronization process of the forwarder node delay is decreased from 3 to 12 % when compared with full-stateful encryption, fullstateless encryption and selective-stateless encryption techniques. Figure 3 Nodes Vs Transmission Energy 6.3 Nodes Vs Computational Energy Computational energy refers, linear dependence of rate and energy. Figure 4 shows, the selective-stateful encryption process is well Figure 2 Nodes Vs Delay suitable for SOBAS and the computational 6.2 Nodes Vs Transmission Energy energy is decreased from 2 to 12 % when Transmission energy refers, energy taken for transmitting the data from source to destination. Figure 3 shows, the selective- compared with full-stateful encryption, fullstateless encryption and selective-stateless encryption techniques. stateful encryption process is well suitable for SOBAS and the transmission energy is decreased from 2.5 to 5% percentage when compared with full-stateful encryption, fullstateless encryption and selective-stateless encryption techniques. Figure 4 Nodes Vs Computational Energy 7 CONCLUSION SOBAS nodes use their local time and initial vector values as one-time dynamic key to encrypt each message. In this way, SOBAS provides an effective dynamic en-route filtering mechanism, where the malicious data is filtered from the network. Loose synchronization in SOBAS, the data are sent to destination as quickly and accurately as possible. The SOBAS decreases the number of opportunities for malicious entities to eavesdrop, intercept packets by reducing the number of messages exchanged between the nodes. Thus, energy savings from the reduced transmission is used for the local security computation. Selective encryption approach to encrypt the data in SOBAS is well suitable to reduce the energy consumption. Future work includes studying further opportunities for increasing the unused key-trial attempts at a node, and addressing insider threats. 7 REFERENCES 1. Akan O. and Akyildiz I., (2005) ‘Event-toSink Reliable Transport in Wireless Sensor Networks’, IEEE/ACM Transaction Networking, Vol. 13, No. 5, pp. 1003-1017. 2. Boukerche and Turgut D., (2007) ‘Secure Time Synchronization Protocols for Wireless Sensor Networks’, IEEE Wireless Communication, Vol. 14, No. 5, pp. 6469. 3. Fluhrer S.R., Mantin I., and Shamir A., (2001) ‘Weaknesses in the Key Scheduling Algorithm of RC4’, Proceeding Revised Papers from the Eighth Annual International Workshop Selected Areas in Cryptography (SAC), pp. 1-24. 4. Ganeriwal S., Capkun S., Han C.C, and Srivastava M.B., (2005) ‘Secure time Synchronization Service for Sensor Networks’, Proceeding ACM Workshop Wireless Security (WiSe), pp. 97-106. 5. Kraub C., Schneider M., Bayarou K., and Eckert C., (2007) ‘Stef: A Secure TicketBased En-Route Filtering Scheme for Wireless Sensor Networks’, Proceeding Second International Conference Availability, Reliability and Security (ARES), pp. 310-317. 6. Passing M. and Dressler F., (2006) ‘Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes’, Proceeding in IEEE International Conference Mobile Adhoc and Sensor Systems (MASS), pp. 882-887. 7. Pottie G.F. and Kaiser W.J., (2000) ‘Wireless Integrated Network Sensors’, Communication ACM, Vol. 43, No. 5, pp. 51-58.Ren F., Lin C., and Liu F., (2008) ‘Self-Correcting Time Synchronization Using Reference Broadcast in Wireless Sensor Network’, IEEE Wireless Communication, Vol. 15, No. 4, pp. 79-85. 8. Roman R., Alcaraz C., and Lopez J., (2007) ‘A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes’, Mobile Networks and Applications, Vol. 12, No. 4, pp. 231244. 9. Selcuk Uluagac A., Raheem Beyah A., and John Copeland A., (2013) ‘Secure sOurceBAsed loose Synchronization (SOBAS) for Wireless Sensor Networks’, IEEE Transactions on Parallel and distributed systems, Vol. 24, No. 4, pp. 803-812. 10. Sun K., Ning P., and Wang C., (2006) ‘Secure and Resilient Clock Synchronization in Wireless Sensor Networks’, IEEE Journal on Selected Areas Communication, Vol. 24, No. 2, pp. 395-408. 11. Uluagac S., Lee C., Beyah R., and Copeland J, (2008) ‘Designing Secure Protocols for Wireless Sensor Networks’, Wireless Algorithms, Systems, and Applications, Vol. 5258, pp. 503-514. 12. Venugopalan R.V., (2003) ‘Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis’, Proceeding of International Conference on Compilers, Architecture and Synthesis for Embedded Systems pp.188-197. 13. Xiao Y., Rayi V.K., Sun B., Du X., Hu F., and Galloway M, (2007) ‘A Survey of Key Management Schemes in Wireless SensorNetworks’, Computer Communication, Vol. 30, No. 11/12, pp. 2314-2341. 14. Yu Z. and Guan Y., (2006) ‘A Dynamic EnRoute Scheme for Filtering False Data Injection in Wireless Sensor Networks’, Proceeding of IEEE INFOCOM, pp. 1-12.