IEEE Paper Template in A4 (V1) - Academic Science,International

advertisement
Secure Data Transmission for Cluster based WSN
using Identity based Signatures
Thaznim Thaj
M.Tech Student,
School of Computer Sciences,
Mahatma Gandhi University
Abstract—Wireless Sensor Networks (WSN) provides a bridge
between the real physical and virtual world which monitors
physical and environmental conditions. It contributes a wide
range of applications to industry, health-care, science, utilities
and area monitoring. Data security and authentication are the
crucial security requirements in Wireless Sensor Networks.
Clustering method effectively distributes network energy and
applies aggregation technique in the network. Clustering in
Wireless Sensor Networks can greatly contribute to overall
system scalability, lifetime and energy efficiency. Secure and
efficient data transmission can be achieved by using Digital
Signature. The main Principle is to authenticate the encrypted
data packets, by applying signature, which are efficient in data
transmission and applying the key management for security.
Keywords— Cluster-based WSNs, ID-based digital signature,
I. INTRODUCTION
Wireless sensor networks provide efficient methods of
collecting valuable data from the surroundings for use in
different applications. Hence the popularity of wireless sensor
networks (WSNs) is increasing continuously in different
domains of daily life. The network is composed of randomly
deployed sensor nodes, which are able to collect data of
various types from the deployment field. Sensed data are then,
communicated to the base station (BS) through wireless link.
The BS represents a downstream of all information coming
from the sensor nodes. Routing in WSNs is the vital
functionality which allows the flow of information generated
by sensor nodes to the base station. WSNs suffer from many
constraints, including low computation power, limited energy
resources, small memory and the use of secure-less wireless
communication channels. These constraints make security in
wireless sensor network a challenge.
According to the network topology, there are two
categories of Wireless Sensor Networks: flat and hierarchical
WSNs. In flat WSNs, all sensor nodes are in the same level of
privilege; they are all charged of sensing and communication
tasks. Also, data messages are communicated in a multi-hop
policy. However, in hierarchical WSNs (HWSN) the network
is organized in clusters. Each cluster contains one special node
called cluster head (CH), and its member nodes.
Clustering is an energy efficient method which divides
sensor nodes into many clusters. For each cluster there is a
cluster-head. The routing is from cluster-head sensor nodes to
the base station (BS).CH is the router of data sent by its
members to the BS. In Cluster based WSN, member nodes
Shyni S.T
Assistant Professor
School of Computer Sciences
Mahatma Gandhi University
sleep the most of time to save energy. Clustering algorithms
for sensor networks improves network scalability by handling
the important problems regarding the size and mobility of the
network. They vary according to the overall network
architecture, node deploying methods and based on the
characteristics of the CH node. The number of cluster
members will vary according to the application. A cluster
head is a node which is very rich in energy resources.
The Cluster Heads perform data aggregation, and transmit
data to the base station directly with comparatively high
energy. In addition, all the sensor nodes and the BS are time
synchronized with symmetric radio channels, the nodes are
distributed randomly, and their energy is constrained. In
Cluster based WSNs, sensing, processing, and transmission
consume energy of the sensor nodes. The cost of data
transmission is expensive than that of data processing. Thus,
the method that the Cluster head node aggregates data and
sends it to the sink node is preferred than the method that each
sensor node directly sends data to the BS. For energy saving,
sensor node switches into sleep mode when it does not sense
or transmit data. This is based on the time-division multiple
access (TDMA) control used for data transmission.
The low-energy adaptive clustering hierarchy (LEACH)
protocol [2] is an effective and widely known protocol to
reduce and balance the total energy consumption for CWSNs.
To reduce the quick energy consumption of the set of CHs,
LEACH randomly rotates CHs within all sensor nodes in the
network, in each round. LEACH results an improvement in
network lifetime. Providing security in leach protocol is a
tedious work. Secure and efficient data transmission can be
achieved by using identity based Digital Signature. The main
Principle is to authenticate the encrypted data packets, by
applying id based digital signatures which are efficient in data
transmission and applying the key management for security.
In Identity based Cryptographic schemes nodes uses their own
ID information as keys. ID based schemes eliminate the need
for certificate and ensure security and authentication. This
reduces the expensive computation and verification process
required.
II. RELATED WORKS
An exhaustive literature survey has been conducted to
identify related research works conducted in this area.
Abstracts of some of the most relevant research works are
included below.
A. An Application Specific Protocol Architecture for Wireless
Microsensor Networks
LEACH, protocol architecture for microsensor networks
combines the ideas of energy-efficient cluster-based routing
and application-specific data aggregation. This provides good
performance in terms of system latency, lifetime and
efficiency. In LEACH there is a distributed cluster formation
technique which enables organization of large numbers of
nodes, adaptive clustering algorithms and rotating cluster head
positions to distribute the energy load evenly among all the
nodes. Also there are techniques to enable distributed signal
transmission to save communication resources.
In LEACH, the nodes themselves create local clusters. In
each cluster one node acts as the cluster head. All non-cluster
head nodes send their data to the CH, while the cluster head
node collects data from all the cluster members, performs data
fusion, and transmits data to the remote Base Station.
Therefore, being a cluster head is much more energy intensive
than being a non-cluster head node.
B. PEGASIS: Power Efficient Gathering in Sensor
Information Systems
PEGASIS protocol is based on the chain structure. Cluster
head is selected randomly from the dedicated chain and
accountable for data transmission to the BS. Major drawback
of this algorithm is that it needs the global knowledge of the
network, based on which chain can be constructed using
greedy algorithm. There is a proper load matching as a sensor
node receive the data from its neighbor, available in the chain,
aggregate the same with own data and send to the another
neighbour node which is the part of chain. Another drawback
of PEGASIS is the significant delay. It is due to the fact that
the data have to be sequentially transmitted in the chain and
the cluster head waits until all the messages are received
before transmitting to the BS.
C. Identity-Based Cryptosystems and Signature Schemes
The idea of identity based cryptography is to enable a user
to use any arbitrary string that uniquely identifies him as his
public key. Identity based cryptographic scheme serves as an
efficient alternative to Public Key Infrastructure (PKI) based
systems.
An identity-based scheme resembles an ideal mail system:
If you know somebody's name and address you can send him
messages that he can read, and you can verify the signatures
that he could have produced. It makes the cryptographic
aspects of the communication almost transparent, and it can be
used effectively by a user who knows nothing about keys or
protocols.
ID based encryption is a type of public key encryption in
which public key of a user is some unique information about
the user. Any party to generate a public key from known ID,
Private Key Generator (PKG) generates corresponding private
key. To operate PKG, first generate a master public key and
retains a master private key. If master public key is given, any
party can compute a public key corresponding to ID by
combining master public key with ID. To obtain private key,
the authorized party use PKG which uses master private key
to generate ID.
In the case of ID-based signature (IBS), verification takes
only the identity together with the message and signature pair
as input and executes the algorithm directly. This is different
from the traditional public-key cryptography, in which an
extra certificate verification algorithm is needed which is
equivalent to the process of two signatures verification.
Identity-based cryptography could particularly be suitable for
WSN. The absence of certificate eliminates the costly
certificate verification process.
D. Design and Implementation Issues of Clustering in WSN
Clustering offers a wide range of advantages for a sensor
network but it has some drawbacks, issues and challenges.
Issues related to Node Mobility, Traffic Load, Overlapping
Clusters, Load Balancing, Dynamic Cluster Control, Intercluster Coordination, Data Aggregation, Fault Tolerance,
Scalability, Number of Clusters, etc. are to be considered.
The decision of a sensor node to become cluster head or
to join an existing cluster is typically based on the following
metrics.
1) Time: A node may become a CH on a time dependable
basis. For example a CH may be the first node in its
neighborhood that declares itself as a CH.
2) Probability: A node may become a CH depending on a
probabilistic measure. The probability may depend on the
number of nodes in the network , global aggregate energy,
local residual energy, number of times the nodes has been a
CH, cluster size etc.
3) Weight: A weight is an application specific number
assigned to every node in the network. The weight may
depend on multiple measures such as the node degree,
distance to neighbours, movement speed, and energy left
capabilities. A node in the sensor network may become a CH
if it has the highest weight among a group of nodes.
4) Semantics: Semantic refer to the relationship between pairs
of nodes or among nodes in a group. Semantic properties
include distance between nodes, paths available between
nodes, relative mobility, and event type or location attribute
detected. Clusters are formed based on similar semantic
properties of nodes.
The decision process may depend on more than one of the
above metrics. The nodes are grouped based on the semantic
information and the CH is chosen depending on the weight.
E. On-Line/Off-Line Digital Signatures
In order to reduce the computational cost of signature
generation, online/offline signature is preferable in WSN.A
new type of signature scheme is introduced which consists of
two stages. The first stage is off-line, before the message to be
signed. The second stage is performed on-line, after the
message to be signed is known, and is supposed to be very
fast. In WSN, the offline stage is activated at the base station,
while the online stage is activated in the WSN node. The
online stage is comparatively very fast, and hence can be
efficiently executed.
III. CLUSTER BASED WIRELESS SENSOR NETWORK
A. Architecture
In clustered wireless sensor network, sensor nodes are
grouped into clusters, and each cluster has a cluster Head
(CH) as shown in fig 1. The Cluster Head is elected
autonomously. The CHs executes data aggregation, and
transmit data to the BS straight away with reasonably high
energy.
Fig.2 Protocol Operation
This property avoids the requirement of using
certificates and associates an implicit public key (user
identity) to each user within the system. In the case of IDbased signature, verification takes only the identity together
with the message and signature pair as input and executes the
algorithm directly. Fig 3 illustrates the process of encryption
and decryption using the keys generated. Private Key is
generated from nodes ID and the mask (msk) function of Base
station (BS). Similarly, public key is generated from msk
function of Cluster head. Security can be provided by
applying keys to the data.This can greatly reduce computation
cost and communication overhead, which is an important
factor in the design of WSN.
Fig.1 Cluster based Wireless Sensor Network
B. Cluster Formation
Nodes that are decided to become CHs in that round
broadcast an advertisement message (adv) to all sensor nodes
in the network, which is concatenated with the digital
signature. Then the nodes that decide to be leaf nodes pick a
CH to join in, which is based on the largest received signal
strength of adv message. It is then communicated with the CH
by sending a join request (join) message. After that the CHs
broadcast an allocation message to their cluster members. The
communication between CH and leaf nodes takes place during
the steady-state phase.
C. Protocol Operation
Each round consists of a setup phase and a steady-state
phase shown in fig 2. Let all sensor nodes know the starting
and ending time of each round because of the time
synchronization. Setup phase is for constructing clusters and a
steady-state phase for transmitting data from sensor nodes to
the BS. In each round, TDMA control divides the timeline
into consecutive time slots. Sensor nodes transmit the sensed
data to the CHs in each frame of the steady-state phase. Leaf
nodes send their data to the Cluster head. Cluster head then
aggregates all the data and is transmitted to the BS.
IV. IDENTITY BASED SIGNATURE
In an ID-based cryptography, public key of each user
is easily computable from a string corresponding to the user’s
identity.
Fig.3 Identity based Signature
V. SIMULATION
NS2 is an open-source event-driven simulator
designed specifically for research in computer communication
networks. NS2 can be used for simulating wired as well as
wireless network functions and protocols (e.g.,routing
algorithms, TCP, UDP). NS2 provides users with a way of
specifying such network protocols and simulating their
corresponding behaviours. Design of NS2 is illustrated in the
fig 4.
This system can be extended such that CH node can
transmit data to the BS by forwarding its data to its neighbour
nodes, in turn the data are sent to the BS.
REFERENCES
[1] Huang Lu, Jie Li, and Mohsen Guizani, “Secure and Efficient Data
Transmission for Cluster-Based Wireless Sensor Networks,”IEEE Trans.
Parallel and Distributed Systems, vol. 25, no. 3, March 2014
[2] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE
Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002
[3] S. Lindsey and C. S. Raghavendra, “PEGASIS: power efficient gathering
in sensor information systems”, Proc.IEEE International Journal of Advanced
Fig.4 NS2 Design
Research in Computer and Communication Engineering
Aerospace
Conference, Big Sky, MT, USA, pp 1125-1130, March 2002
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc.
To use NS-2, a user programs in the OTcl script
language. An OTcl script will do the following.
 Initiates an event scheduler.
 Network topology set up using the network objects.
 Inform traffic sources when to start/stop transmitting
packets through the event scheduler.
Flow of events for a Tcl file in NS2 is illustrated in
fig 5.
Fig.5 Flow of Events for a Tcl File
VI. CONCLUSION AND FUTURE ENHANCEMENT
Secure routing in cluster based wireless sensor network is
achieved by applying the ID-based cryptosystems. It reduces
the communication overhead inside clustered wireless sensor
network.
Advances in Cryptology (CRYPTO), pp. 47-53, 1985
[5] K. Pradeepa, W.R. Anne, and S. Duraisamy, “Design and Implementation
Issues of Clustering in Wireless Sensor Networks,”Int’l J. Computer
Applications, vol. 47, no. 11, pp. 23-28, 2012.
[6] S. Even, O. Goldreich, and S. Micali, “On-Line/Off-Line Digital
Signatures,” Proc. Advances in Cryptology (CRYPTO), pp. 263-275, 1990.
Download