However, the potentially hostile environment in which sensors are located also introduces new challenges in defending the network, e. In this mesh topology, sensor nodes must not only capture and disseminate their own data, but also serve as relays for other sensor nodes, that is, they must collaborate to propagate sensor data towards the base station. A survey of security issues in wireless sensor networks. Detection of various attacks using zero knowledge protocol in. We propose in this paper a computationally efficient security scheme for identifying network members in wireless sensor networks. This is the difference between the mobile network to the wireless sensor network as in mobile network the cell phones are denied of the service once too many phones are. The algorithms developed for wireless adhoc networks cannot be used for.
Secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process. A key distribution protocol for wireless sensor networks. Hence these networks have always been in quest for efficient and inexpensive authentication mechanisms. Dec 01, 2009 security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. Feasibility of basic security schemes in wireless sensor networks security is a broadly used term encompassing the characteristics of authentication, integrity, privacy, nonrepudiation, and antiplayback 5. The architectures of the networks employed, data rates, network size, span, power management and security protocols are all affected, if not dictated, by the communications protocols chosen for the application. Superimposed sdisjunct code in this section, we introduce the basics of. Authentication in wireless sensor networks using zero. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off. May 17, 20 wireless sensor network security model using zero knowledge protocol in java email. Wireless sensor networks use batteryoperated computing and sensing devices. In 5 security properties for sensor networks are analyzed.
Implementation of zero knowledge protocol in wireless security. With attachment of unique fingerprint to each node we address the clone attack. Wireless sensor network security model using zero knowledge. We propose a method for identifying the compromisedcloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol 5,15. Manets have high degree of mobility, while sensor networks are mostly stationary. Wireless sensor network security model using zero knowledge protocol. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of. Additionally, the finished creation consists of multiparty protocols that. One of the main limitations is the identification of nodes. Attacks are generally classified into active, passive, inside, outside. Unlike previous methods for key distribution in wsns, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Its main purpose is to let the communication between two devices.
Malicious node security wireless sensor network zero knowledge protocol. A new stage of privacypreserving scope for locationbased. In proceedings of 2011 ieee international conference on communications icc pp. Dec 20, 20 secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process. Oct 26, 2009 nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task. Authentication in wireless sensor networks using zero knowledge. Detection of various attacks using zero knowledge protocol. Obstacle to sensor security a wireless sensor network is a special network which has many constraints compared to a traditional computer network. In order to provide an efficient method to verify the. A hybrid security approach for nodes authentication in. The book highlights power efficient design issues related to wireless sensor networks, the existing wsn applications, and discusses the research efforts being undertaken in this field which put the reader in good pace to be able to understand more advanced research and. As cryptographic schemes tend to exhaust sensor network resources, this paper investigates the use of zero knowledge protocol for the authentication of sensor nodes.
Security models for wireless sensor networks 5 note that a lot of research is still being conducted in perfecting the protocol stack for sensor network, so the exact protocols are yet to be concreted. Section 1 lists the introduction of wireless sensor network. Wireless sensor networks technology and applications. Implementation of zero knowledge protocol in wireless security ibrahim aziz patwekar1, dr. Network security projects final year projects in network.
The zeroknowledge proof zkp in cryptography can secure the. Wsn nodes have less power, computation and communication compared to manet nodes. Sensor nodes are prone to failures due to harsh environments and energy constraints. Wireless sensor network security model using zero knowledge protocol in java email. A survey of security issues in wireless sensor networks yong wang university of nebraskalincoln. Security protocols for use with wireless sensor networks. C kotak2 1shah and anchor kutchhi engineering college, mumbai 2principle, shah and anchor kutchhi engineering college, mumbai abstract wireless sensor networks wsn is excellent technology which provide great potential for situations like. Secure and efficient data transmission in wireless sensor.
The topology of a sensor network changes very frequently due to failures or mobility. Meeting these goals requires careful design of both the sensor hardware and the network protocols. Together, these technologies have combined to enable a new generation of wsns that differ greatly from wireless networks developed. Presented by chetan rana u08co2 intoduction wireless sensor networks are networks that consists of sensors which are distributed in an ad hoc manner.
The security mechanism are not used directly in wireless sensor networks. Loureiro federal university of minas gerais, mg,brazil. Introduction to wireless sensor networks february 2012 this standard defines a communication layer at level 2 in the osi open system interconnection model. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementation of a complete security solution for a sensor network. The zero knowledge protocol is used to ensure non transmission of crucial cryptographic information in the wireless network in order to avoid maninthe middle attack and replay attack. Modular sensor board msb430 is a hardware platform for wireless sensor networks created by scatterweb 11. Stankovic department of computer science university of virginia charlottesville, virginia 22904 email.
Our simulation results indicate that our proposed scheme ensures high security to the network with minimal. We used the concept of zero knowledge protocol which. While increasing network lifetime, data aggregation protocols may degrade important quality of service metrics in wireless sensor networks, such as data accuracy, latency, faulttolerance, and security. Security in wireless sensor network is vital to the acceptance and use of sensor networks.
Section 2 discusses constraints, security requirements, threat models, attacks for wireless sensor networks. Hence, security and data authentication are the major requirements for the wireless sensor networks. Leap is also a very popular security solution in wireless sensor networks and it was proposed by zhu et al in 2004. Wireless sensor network security model using zero knowledge protocol international organization of scientific research 5 p a g e. We implement zero knowledge protocol zkp for the verification of sender sensor nodes. Sensor network, seismic, message authentication code, hopping, spread spectrum etc.
Recent advances insemiconductor, networking and material science technologies are driving the ubiquitous deployment of largescale wireless sensor networks wsns. Conclusion in this project, we proposed a new security model to address three important active attacks namely cloning attack, mitm attack and replay attack. Wireless sensor networks wsns can be used to monitor environments, and. In particular, wireless sensor network product in industry will n ot get acceptance unless there is a. The authentication process is done by first identifying the base station as being the authentic one with the use of fingerprinting information. Network architecture consider a cwsn consisting of a fixed bs and a large number of wireless sensor nodes, which are homogeneous in functionalities and capabilities. Security is a common concern for any network system, but security in wireless sensor network is of great importance to ensure its application success. Conservation of energy in wireless sensor network by preventing. If in around 1985 and attacker had to have sophisticated.
Wireless sensor network, security, attacks, passive and active attacks, diverse layer attacks, cryptographic attacks. Ensuring authentication and security using zero knowledge. Pdf wireless sensor network security model using zero. On the security of clusterbased communication protocols for. We propose a method for verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol for identifying the compromisedcloned nodes.
Because sensor networks pose unique challenges, traditional security techniques used in traditional networks cannot be applied directly. In the wireless sensor network non transmission of crucial cryptographic. The aim of this book is to present few important issues of wsns, from the application, design and technology points of view. This section describes the routing security in wireless sensor network. Analysis of security protocols in wireless sensor network. Secure data aggregation in wireless sensor networks. Introduction as a result of the growth of networks, over the years the network attack tools and methods have greatly evolved. Pdf wireless sensor networks wsns offer an excellent opportunity to monitor. Once the base station is authenticated, the others members of the network can then be authenticated by the base station. As sensors are used to monitor sensitive areas therefore security and energy.
Therefore, it is widely used in offices, banks, and many other organizations. Conventional authentication schemes are not suitable to the sensor node because of the limitations of memory, computational power and energy in the node. Section 3 lists the security solutions for establishing a secure sensor network. Multihop networks have a wider range of applications at the cost of higher control complexity. Each intermediate node must perform routing and forward the data along a multihop path.
The main features of the hardware and the operating system are described below. These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of unique identifiers becomes infeasible 2. For example, when sensor network is used for military purpose, it is very important to keep the sensed information con.
It was created by the institute of electrical and electronics engineers ieee, entity. Manet wireless sensor networks may be considered a subset of mobile adhoc networks manet. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementa. Oliveira, eduardo habib, hao chi wong 1, antonio a. Hence the network layer attacks are listed with its counter measures. The proposed scheme was evaluated based on the simulation results. Authentication in wireless sensor networks using zero knowledge protocol. We propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol zkp for verifying the authenticity of the sender sensor. Security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. The goal of this paper is to develop a security model for wireless sensor networks. On the security of clusterbased communication protocols. Wireless sensor and actor network security analysis. Standardization has yet to occur for a communications system optimal for use with wireless sensor networks. The localized encryption and authentication protocol leap is a key management protocol used to provide security and support to sensor networks.
This paper investigates the use of an identity mechanism called zero knowledge protocol zkp, for the authentication of sensor nodes. This section presents the network architecture, security vulnerabilities, and protocol objectives. Usually, wsns are connected to a legacy network ip network or 3 g network using one or more sink nodes or base stations. Security protocols for wireless sensor network network. The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network. Wireless embedded designers must assess these tradeoffs and make multiple decisions, such as transducer and. Nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task.
833 958 1067 1072 580 127 258 548 1125 45 1229 1573 416 362 436 1392 628 620 1359 1470 839 1202 778 912 165 1239 1231 366 400 466 151 1019