Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

Platform : DOT NET

IEEE Projects Years : 2012 - 13

The Three-Tier Security Scheme in Wireless Sensor

Networks with Mobile Sinks

 

Abstract:

 

Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors.

 

Existing System:

 

The key management problem is an active research area in wireless sensor networks. Proposed a probabilistic key predistribution scheme to bootstrap the initial trust between the sensor nodes. The main idea was to let each sensor node randomly pick a set of keys from a key pool before deployment, so that any two sensor nodes had a certain probability of sharing at least one common key. Chan et al. Further extended this idea and developed two key predistribution schemes: the q-composite key predistribution scheme and the random pairwise keys scheme.

 

Proposed System:

 

To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.

 

 

 

We proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes. The proposed scheme, based on the polynomial pool-based key predistribution scheme substantially improved network resilience to mobile sink replication attacks compared to the single polynomial pool-based key predistribution approach. Using two separate key pools and having few stationary access nodes carrying polynomials from the mobile pool in the network may hinder an attacker from gathering sensor data, by deploying a replicated mobile sink.

 

Hardware Requirements:

 

  • System                 : Pentium IV 2.4 GHz.
  • Hard Disk            : 40 GB.
  • Floppy Drive       : 1.44 Mb.
  • Monitor                : 15 VGA Colour.
  • Mouse                  : Logitech.
  • Ram                     : 256 Mb.

 

Software Requirements:

 

  • Operating system           : - Windows XP Professional.
  • Front End             : - Visual Studio 2008.
  • Coding Language : - Visual C# .Net.

 

Modules:

 

  1. Stationary access nodes module:
  2. Security Analysis Method.
  3. Threat Analysis Method.
  4. Enhanced three-tier security scheme method.

 

 

 

Module Description

 

  1. 1.     Stationary access nodes module:

 

Polynomials from the mobile polynomial pool are used to establish the authentication between mobile sinks and stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering. Thus, an attacker would need to compromise at least a single polynomial from the mobile pool to gain access to the network for the sensor’s data gathering. Polynomials from the static polynomial pool are used to ascertain the authentication and keys setup between the sensor nodes and stationary access nodes.

 

2       Security Analysis Method.

 

We have analyzed the performance of the proposed scheme using two metrics: security and connectivity. For security, we present the probability of a mobile polynomial being compromised; hence, an attacker can make use of the captured mobile polynomial to launch a mobile sink replication attack against the sensor network.

 

3. Threat Analysis Method.

 

We analyze the security performance of the proposed scheme against a mobile sink replication attack. As stated in the previous section, for an attacker to launch a mobile sink replication attack on the network, the adversary has to compromise at least one polynomial from the mobile polynomial pool. To achieve this, the adversary must capture at least a specific number of stationary access nodes that hold the same mobile polynomial.

 

4       Enhanced three-tier security scheme method.

 

As described in the previous section, the three-tier security scheme provides better network resilience against mobile sink replication attack compared to the single polynomial pool approach. This scheme delivers the same security

 

Performance as the single polynomial pool approach when the network is under a stationary access node replication attack. In both schemes, for any sensor node u that needs to authenticate and establish a pairwise key with a stationary access node A, the two nodes must share at least a common polynomial in their polynomial rings. To perform a stationary access node replication attack on a network, the adversary needs to compromise at least a single polynomial from the static pool. This can be obtained easily by capturing arbitrary sensor nodes in the network. Then, the adversary can make use of this compromised polynomial by a replicated stationary access node to enable insecure access to the network.

 

 

 

 

 

 

 

 



NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1