final_journal

advertisement
Secure Data Transmission By Using Digital Signature Method In IBS And
IBOOS Protocols For Cluster Based Wireless Sensor Network
GEETHANJALI.S.G
Dr. B,R.PRASAD BABU
M.Tech Student
Department of CSE - R&D Centre
SEACET, BANGALORE – 560049.
geethanjali013@gmail.com
Prof &Head
Department of Computer Science and Engineering
SEACET, BANGALORE – 560049.
brprasadbabu@gmail.com
Abstract: Clustering is a key technique to improve the
network lifetime, reduce the energy consumption and
increase the scalability of the sensor network. Secure data
transmission is a critical issue for wireless sensor networks
(WSNs). Clustering is an effective and practical way to
enhance the system performance of WSNs. A new type of
signature scheme is proposed. It consists of two phases .The
first phase is performed off-line, before the message to be
signed is even known .The second phase is performed online, once the message to be signed is known, and is
supposed to be very fast. Two secure and efficient data
transmission (SET) protocols for CWSNs, called SET-IBS
and SET-IBOOS, by using the identity-based digital
signature (IBS) scheme and the identity-based online/offline
digital signature (IBOOS) scheme, respectively. SET-IBOOS
reduces the computational overhead for protocol security
and also We show the feasibility of the SET-IBS and SETIBOOS protocols with respect to the security requirements
and security analysis against various attacks. The results
show that the new type of signature method and the
proposed protocols have better performance than the
existing secure protocols for cluster based wireless sensor
network, in terms of security overhead and energy
consumption.
Index Terms: Cluster – based WSNs, ID based digital
signature,ID based online / offline digital signature, CH,CH
selection ,RSA,DES.
I. INTRODUCTION
Efficient data transmission is one of the most important
issues for WSNs. A wireless sensor network (WSN) is a
network system comprised of spatially distributed devices
using wireless sensor nodes to monitor physical or
environmental conditions, such as sound and temperature.
The individual nodes are sending data to one or more
collection points in a WSNs. The individual nodes are
capable of sensing their environments and processing the
information data locally. In a digital signature scheme, each
user U publishes a public key while keeping secret a secret
key. U’s signature of a message m is a value σ, depending on
m and his secret key, such that U(using his secret key) can
quickly generate σ and anyone can quickly verify the
validity of σ, using U’s public key. However, it is hard to
forge U’s signatures without knowledge of his secret key.
II. RELATED WORK
Cluster based data transmission in WSNs have been
investigated by researchers are order to achieve the network
scalability and management. In a cluster based WSNs every
cluster has a leader sensor node regarded as cluster
head(CH). CH aggregates the data collected by the leaf
nodes and sends the aggregation to the base station. In order
to prevent quick energy consumption of the set of CHs
LEACH(Low Energy Adaptive Clustering Hierarchy)
randomly rotates CH among all sensor nodes and achieves
improvements in terms of network lifetime.
A.Cluster head capabilities:
Mobility:CH can be stationary or mobile. But
movements are limited within the region for better network
performance. Node types:Deployed sensor nodes equipped
with more computation and communication resources are
selected as CHs. Role :CHs relay the traffic, fuse or
aggregate the sense data.
B. Selection criteria for CH:
Initial energy :When any algorithm starts it considers
the initial energy of the CH and the initial energy must be
high. Residual energy: After few rounds of selection, the
CH election should be based on remaining energy of the
node. Energy consumption rate : This rate is defined as Vi(t)
= [Initial– Ei(t)] / r Where Initialis the initial energy, Ei(t) is
the residual energy and r is the current round of CH
selection.
Average energy of the network : It is the
reference energy (ideal energy) of each node in current
round to keep the network alive.
.
III.PROPOSED SYSTEM
In this paper we propose two Secure and Efficient
data Transmission (SET) protocols for CWSNs, called SETIBS and SETIBOOS, by using the IBS scheme and the
IBOOSscheme, respectively. The key idea of both SET-IBS
and SET-IBOOS is to authenticate the encrypted sensed
data, by applying digital signatures to message packets,
which are efficient in communication and applying the key
management for security. In the proposed protocols, secret
keys and pairing parameters are distributed and preloaded in
all sensor nodes by the BS initially, which overcomes the
key escrow problem described in ID-based crypto-systems.
SET-IBOOS is proposed in order to further reduce the
computational overhead for security using the IBOOS
scheme, in which security relies on the hardness of the
discrete logarithmic problem. Both SET-IBS and
SETIBOOS solve the orphan node problem in the secure
data transmission with a symmetric key management.We
extends the above to add secure node mobility for allowing
nodes to move from one cluster to another by obtaining the
secure token to the existing cluster and the new cluster head
receives the token and validates the joining node, this allows
mobility of nodes between cluster and prevents
unauthenticated node to enter network.To achieve this we
will use the hash based token generation approach.
A. Protocol initialization :In order to reduce the
computation and storage costs of signature signing
processing in the IBS scheme, we improve SET-IBS by
introducing IBOOS for security in SET-IBOOS. The
operation of the protocol initialization in SET-IBOOS is
similar to that of SET-IBS, however, the operations of key
predistribution are revised for IBOOS. The BS does the
following operations of key pre-distribution in the network:
. Generate an encryption key k for the homomorphic
encryption scheme to encrypt data messages, where k ¡ô [m .
1], m is a large integer.
. Let G be a multiplicative finite cyclic group with
order q. The PKG selects a random generator g for group G
generation, and chooses x ¡ô Z. q at random as the master
secret key.
. Randomly select r ¡ô Z. q for each node private key
generation, and let H be a hash function.
. Preload each sensor node with the public parameters,
given by param2=(k,m,G, q, g, x, r, H).
2)Key management for security :Assume that a sensor
node j transmits a message M, and we denote the cipher-text
of the encrypted message as C, which is encrypted by the
same encryption scheme in SETIBS. Inspired from the
concept of an IBOOS scheme, we construct an IBOOS
scheme based on the DLP in the multiplicative group, and
propose a novel secure data transmission protocol with
IBOOS specifically for CWSNs (SET-IBOOS).
The corresponding private pairing parameters are
preloaded in the sensor nodes during the protocol
initialization. The IBOOS scheme in the proposed SET-
IBOOS consists of following four operations, extraction,
offline signing, online signing and verification.
Extraction: Before the signature process, it first
extracts private keys from the master secret key x and its
identity ID, as sek=(R, si), where
R = gr ,
Si = r + H(R,IDi)x modq.
Offline signing: It generates the offline signature σ i
with the time-stamp of its time slot for transmission, and
store the knowledge for signing online signature when it
sends the message. Notice that, this offline signature can be
done by the sensor node itself or by the trustful third party,
e.g., the BS or the CH sensor node. Let X =gx, then,
gsi = grgH(R,IDi)x modq = RXH(R,IDi)modq.
σi = g-ti
Online signing: At this stage, node Ai computes the
online signature _σi, zi_ based on the encrypted data C and
the offline signature σi.
hi = H(C\\σi).
Zi = σi + hisimodq,
σi = gσi.
Then node Ai sends the encrypted message to its
destination with the signature ID,C.
Verification: Upon receiving the message, each sensor
node verifies the authenticity in the following way. It checks
the current time-stamp for freshness. Then, if the timestamp is correct, the sensor node further computes the value
of RhiXhiH(R,IDi)modqusing the online signature then check if
gzi = σiRhiXhiH(R,IDi)modq.
If it is equal to the equation above in the received message,
the sensor node considers the received message authentic,
accepts it, and propagates the message to the next hop or
user. If the verification above fails, the sensor node
considers the message as either bogus or a replaced one,
even a mistaken one, then rejects or ignores it.
IV. IMPLEMENTATION
In large scale CWSNs, multi-hop data transmission is
used for transmission between the CHs to the BS, where the
direct communication is not possible due to the distance or
obstacles between them. The version of the proposed SETIBS and SET-IBOOSprotocols for CWSNs can be extended
using multi-hop routing algorithms, to form secure data
transmission protocols for hierarchical clusters. The
solutions to this extension could be achieved by applying the
following two routing models.
1) The multi-hop planar model: A CH node transmits data
to the BS by forwarding its data to its neighbor nodes, in
turn the data is sent to the BS. We have proposedan energy
efficient routing algorithm for hierarchically clustered
WSNs in [30], and it is suitable for the proposed secure data
transmission protocols.
2) The cluster-based hierarchical method: The network
is broken into clustered layers, and the data packages travel
from a lower cluster head to a higher one, in turn to the BS.
V. MODULES



Time based system parameter initialization
Cluster head selector module
Data upload manager.
Data Flow Diagram:A data flow diagram (DFD) is a
graphical representation of the "flow" of data through
an information system, modeling its process aspects. Often
they are a preliminary step used to create an overview of the
system which can later be elaborated. DFDs can also be used
for the visualization of data processing (structured design).
A DFD shows what kind of information will be input
to and output from the system, where the data will come
from and go to, and where the data will be stored. It does not
show information about the timing of processes, or
information about whether processes will operate in
sequence or in parallel.
A data-flow
diagram (DFD) is
a graphical
representation of the "flow" of data through an information
system. DFDs can also be used for the visualization of data
processing (structured design).
On a DFD, data items flow from an external data
source or an internal data store to an internal data store or an
external data sink, via an internal process.
A DFD provides no information about the timing or
ordering of processes, or about whether processes will
operate in sequence or in parallel. It is therefore quite
different from a flowchart, which shows the flow of
control through an algorithm, allowing a reader to determine
what operations will be performed, in what order, and under
what circumstances, but not what kinds of data will be input
to and output from the system, nor where the data will come
from and go to, norwhere the data will be stored (all of
which are shown on a DFD). When it comes to conveying
how information data flows through systems (and how that
data is transformed in the process), data flow diagrams
(DFDs) are the method of choice over technical descriptions
for three principal reasons.
(1) DFDs are easier to understand by technical and
nontechnical audiences.
(2) DFDs can provide a high level system overview,
complete with boundaries and connections to other systems.
(3) DFDs can provide a detailed representation of
system components.
DFDs help system designers and others during initial
analysis stages visualize a current system or one that may be
necessary to meet new requirements. Systems analysts prefer
working with DFDs, particularly when they require a clear
understanding of the boundary between existing systems and
postulated systems. DFDs represent the following:
1. External devices sending and receiving data
2. Processes that change that data
3. Data flows themselves
4. Data storage locations
It is common practice to draw the context-level data
flow diagram first, which shows the interaction between the
system and external agents which act as data sources and
data sinks. This helps to create an accurate drawing in the
context diagram. The system's interactions with the outside
world are modelled purely in terms of data flows across
the system boundary. The context diagram shows the entire
system as a single process, and gives no clues as to its
internal organization.
This context-level DFD is next "exploded", to produce
a Level 1 DFD that shows some of the detail of the system
being modeled. The Level 1 DFD shows how the system is
divided into sub-systems (processes), each of which deals
with one or more of the data flows to or from an external
agent, and which together provide all of the functionality of
the system as a whole. It also identifies internal data stores
that must be present in order for the system to do its job, and
shows the flow of data between the various parts of the
system.
Data flow diagrams were proposed by Larry
Constantine, the original developer of structured
design, based on Martin and Estrin's "data flow graph"
model of computation.
Data flow diagrams are one of the three essential
perspectives of the structured-systems analysis and design
method SSADM. The sponsor of a project and the end users
will need to be briefed and consulted throughout all stages of
a system's evolution. With a data flow diagram, users are
able to visualize how the system will operate, what the
system will accomplish, and how the system will be
implemented. The old system's dataflow diagrams can be
drawn up and compared with the new system's data flow
diagrams to draw comparisons to implement a more efficient
system. Data flow diagramscan be used to provide the end
user with a physical idea of where the data they input
ultimately has an effect upon the structure of the whole
system from order to dispatch to report. How any system is
developed can be determined through a data flow diagram
model.
In the course of developing a set of levelled data flow
diagrams the analyst/designers is forced to address how the
system may be decomposed into component sub-systems,
and to identify the transaction data in the data model.
Data flow diagrams can be used in both Analysis and
Design phase of the SDLC.
Time based system parameter initialization :
Data & secret
key
Ti
content
System
initialization
process
Cipher generation
process
IDs key generation
process
Node i
Online signature
generation
process
Offline signature
& Ti
Key distribution
process
Node n
Cluster head selector module:
Data send process
End
ID
assignment
message
Message receiver
process
Join
message
Flow Charts:
Cluster election
process
If selected
as cluster
head
Join process
Offline signature
generator
Signature receiver
process
End
A flowchart is a type of diagram that represents
an algorithm, workflow or process, showing the steps as
boxes of various kinds, and their order by connecting them
with arrows. This diagrammatic representation illustrates a
solution to a given problem. Flowcharts are used in
analyzing, designing, documenting or managing a process or
program in various fields.
Flowcharts are used in designing and documenting
complex processes or programs. Like other types of
diagrams, they help visualize what is going on and thereby
help the people to understand a process, and perhaps also
find flaws, bottlenecks, and other less-obvious features
within it. There are many different types of flowcharts, and
each type has its own repertoire of boxes and notational
conventions. The two most common types of boxes in a
flowchart are:
 a processing step, usually called activity, and
denoted as a rectangular box
 a decision, usually denoted as a diamond.
Data upload Process (Nodes):
A flowchart is described as "cross-functional" when the
page is divided into different swim-lanes describing the
control of different organizational units. A symbol appearing
in a particular "lane" is within the control of that
organizational unit. This technique allows the author to
locate the responsibility for performing an action or making
a decision correctly, showing the responsibility of each
organizational unit for different parts of a single process.
Flowcharts depict certain aspects of processes and they
are usually complemented by other types of diagram. For
instance, Kaoru Ishikawa defined the flowchart as one of the
seven basic tools of quality control, next to
the histogram, Pareto chart, check sheet, control chart, cause-
and-effect diagram, and the scatter diagram. Similarly,
in UML, a standard concept-modeling notation used in
software development, the activity diagram, which is a type
of flowchart, is just one of many different diagram types.
Common alternative names include: flowchart, process
flowchart, functional flowchart, process map, process chart,
functional process chart, business process model, process
model, process flow diagram, work flow diagram, business
flow diagram. The terms "flowchart" and "flow chart" are
used interchangeably.
Time based system parameter initialization Flow Diagram:
start
Define time interval Ti
& Ts
Generate master key
ID generation
process
No of
Nodes &
Ti
Initialize node in s
Key
distribution
process
Send ID key to nodes
If distribution
successful
No
Yes
VI. CONCLUSION
In this paper,we reviewed the security for cluster based
wireless sensor network in secure data transmission.
Clustering is a good technique to reduce energy consumption
and to provide stability in wireless sensor network. SET–IBS
& SET-IBOOS are efficient in communication & applying
the ID based cryptosystem. Which achieves security
requirement is CWSNs. The result show that the proposed
SET–IBS and the SET–IBOOS protocols have better
performance than existing secure protocols.
REFERENCES
[1] T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless
Sensor Network Technologies for the Information Explosion Era,
Studies in Computational Intelligence,vol. 278. Springer-Verlag,
2010.
[2] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of
SecurityIssues in Wireless Sensor Networks,” IEEE Comm.
Surveys &Tutorials,vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
[3] A.A. Abbasi and M. Younis, “A Survey on Clustering
Algorithmsfor Wireless Sensor Networks,”ComputerComm.,vol.
30, nos. 14/15, pp. 2826-2841, 2007.
[4] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
“AnApplication-Specific Protocol Architecture for Wireless
Microsen-sorNetworks,”IEEE Trans. Wireless Comm.,vol. 1, no. 4,
pp. 660-670, Oct. 2002.
[5] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An
AnalyticalModel for Information Retrieval in Wireless Sensor
NetworksUsing Enhanced APTEEN Protocol,”IEEE Trans. Parallel
&Distributed Systems,vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
[6] S. Yi et al., “PEACH: Power-Efficient and Adaptive
ClusteringHierarchy
Protocol
for
Wireless
Sensor
Networks,”ComputerComm.,vol. 30, nos. 14/15, pp. 2842-2852,
2007.
[7] K. Pradeepa,W.R.Anne, andS.Duraisamy,“Design and
Implementation Issues of Clustering in Wireless Sensor Networks,”Int’l J. Computer Applications, vol. 47, no. 11, pp. 23-28,
2012.
[8] L.B. Oliveira et al., “SecLEACH-On the Security of
ClusteredSensor Networks,” Signal Processing, vol. 87, pp. 28822895,2007.
[9] P. Banerjee, D. Jacobson, and S. Lahiri, “Security and
PerformanceAnalysis of a Secure Clustering Protocol for Sensor
Networks,”Proc. IEEE Sixth Int’l Symp. Network Computing and
Applications(NCA),pp. 145-152, 2007.
[10] K. Zhang, C. Wang, and C. Wang, “A Secure Routing
Protocol forCluster-Based Wireless Sensor Networks Using Group
KeyManagement,”Proc. Fourth Int’l Conf. Wireless Comm.,
Networkingand Mobile Computing (WiCOM),pp. 1-5, 2008.
[11] S. Sharma and S.K. Jena, “A Survey on Secure
HierarchicalRouting Protocols in Wireless Sensor Networks,”Proc.
Int’l Conf.Comm., Computing & Security (ICCCS),pp. 146-151,
2011.
[12] G. Gaubatz et al., “State of the Art in Ultra-Low Power
Public KeyCryptography for Wireless Sensor Networks,”Proc.
IEEE ThirdInt’l Conf. Pervasive Computing and Comm.
Workshops (PerCom),pp. 146-150, 2005.
[13] W. Diffie and M. Hellman, “New Directions in
Cryptography,”IEEE Trans. Information Theory,vol. IT-22, no. 6,
pp. 644-654, Nov.
1976.
[14] A. Shamir, “Identity-Based Cryptosystems and
SignatureSchemes,” Proc. Advances in Cryptology (CRYPTO), pp.
47-53,1985.
[15] D.W. Carman, “New Directions in Sensor Network Key
Manage-ment,”Int’l J. Distributed Sensor Networks,vol. 1, pp. 315, 2005.
Download