In Wireless Sensor Network adding security is a crucial issue, the system performance is improved by clustering the Network. The Clustering are formed periodically and dynamically by using Position based Aggregator Node Election for Wireless Sensor Network (PANEL). We propose two protocols called SET-IBS and SET-IBOOS using Id-Based Digital Signature and ID-Based Online-Offline Digital Signature respectively which will add the authentication to the sensed data. For Security the data is encrypted at sender (Leaf Node) and Decrypted at receiver (Base Station). The Security is analysed by investigating various attacks are Passive Attack, Active Attack, and Node Compromising Attack. The Calculating and Simulation show the efficiency and security of the protocol and the result also shows that the proposed protocol have better performance and security than the Existing Protocols.
Keywords |
Clustered Wireless Sensor Network, SET-IBS, SET-IBOOS, Digital Signature, and Cryptography. |
INTRODUCTION |
Wireless Sensor Network is a collection of sensor nodes which are specially distributed for monitoring physical or
environmental condition such as temperature, sound, pressure, motion, etc. Each node are capable of sensing the
environment locally and sending the data to another sensor node or a base station in Wireless Sensor Network.
Performance and efficient data transaction is a major issue in Wireless Sensor Network. the most certain applications of
Wireless Sensor Network are Process Management, Health Care Monitoring, Air Pollution Monitoring, Forest Fire
Detection, Natural Disaster Prevention and Military Applications. The Secure and Efficient Data Transmission (SET) is
necessary in Wireless Sensor Network. |
In Wireless Sensor Network the clustering is achieved for Network Scalability and Management which increase the
lifetime of the sensor node and reduces the energy consumption. In the clustered Wireless Sensor Network, every
cluster has a Cluster Head (CH) and the remaining nodes in the cluster are Leaf Nodes (Non Cluster Head Sensor
Node), the data aggregated by the Leaf Node (Non Cluster Head Sensor Nodes) sends to the Cluster Head (CH) and the
Cluster Head (CH) then transmits the data to the Base Station. The Low Energy Adaptive Cluster Hierarchy (LEACH)
is most probably used for Low Energy Consumption of sensor node in Wireless Sensor Network. To avoid the quick
energy consumption of CH’s the LEACH protocol will randomly rotates the CH’s among the sensor nodes which will
leads to improving the Network lifetime. The Protocols which are similar to LEACH are APTEEN and PEACH. |
Implementing Security to the LEACH like protocol is the challenging because the data link and Network Clusters
are dynamically, randomly and periodically rearranged. So the common key distribution and Node to Node trust was
lacking in the protocols like LEACH (The distributed Wireless Sensor Network are existing solution but not for the
Clustered Wireless Sensor Network (CWSN). The most similar protocols to LEACH like protocol are SecLEACH, GSLEACH
and RLEACH, these protocols are most probably uses symmetric key management for security in which will
cause so called orphan node problem. The orphan node is a problem in which any node which does not share the
pairwise key with the other nodes in the preloaded key ring. |
To reduce the storage cost of symmetric key, the key ring was not enough for sharing pairwise symmetric key with
all the nodes in the Wireless Sensor Network so the orphan node will elects themselves as a Cluster Head. It does not
share with any other node then it often decrease energy of the node often a long operation. If the CH’s are elected by
themselves so the energy consumption is more in every Cluster Head’s. The possibility of asymmetric key management
(PANEL) had been recently used in Wireless Sensor Network which compensates the disadvantages from symmetric
key management. The cryptography offering one of the most crucial security services was the Digital Signature in
asymmetric key management, the id and public key was obtained from Digital Certificate. The Id-based Digital
Signature is based on factoring integer from Id-based Cryptography. IBOOS is proposed to reduce computational
overhead in the signature process. We proposed two protocols for clustered Wireless Sensor Network called IBS and
IBOOS by IBS scheme and the IBOOS scheme. The proposed and the key idea behind the proposed protocol IBS and
IBOOS are to authenticate the encrypted data by using digital signature to the sensed data (Message Packet) which are
efficient in communication and applying asymmetric key management for security. The secret key and paring
parameters are preloaded and distributed in all sensor node by the base station initially which will overcomes key
escrow problem. Finally we just compare the proposed protocol with the existing protocol for efficiency and security. |
RELATED WORK |
In Wireless Sensor Network the clustering is achieved for Network Scalability and Management which increase the
lifetime of the sensor node and reduces the energy consumption. The Low Energy Adaptive Cluster Hierarchy
(LEACH) is most probably used for Low Energy Consumption of sensor node in Wireless Sensor Network. To avoid
the quick energy consumption of CH’s the LEACH protocol will randomly rotates the CH’s among the sensor nodes
which will leads to improving the Network lifetime. The Protocols which are similar to LEACH are APTEEN and
PEACH. Implementing Security to the LEACH like protocol is the challenging because the data link and Network
Clusters are dynamically, randomly and periodically rearranged. So the common key distribution and Node to Node
trust was lacking in the protocols like LEACH (The distributed Wireless Sensor Network are existing solution but not
for the Clustered Wireless Sensor Network (CWSN). The most similar protocols to LEACH like protocol are
SecLEACH, GS-LEACH and RLEACH, these protocols are most probably uses symmetric key management for
security in which will cause so called orphan node problem. The orphan node is a problem in which any node which
does not share the pairwise key with the other nodes in the preloaded key ring. |
PROPOSED ALGORITHM |
The proposed and the key idea behind the proposed protocol IBS and IBOOS are to authenticate the encrypted data
by using digital signature to the sensed data (Message Packet) which are efficient in communication and applying
asymmetric key management for security. The secret key and paring parameters are preloaded and distributed in all
sensor node by the base station initially which will overcomes key escrow problem. |
Design Considerations: |
• Create a Network model. |
• Initialization of Protocol (IBS). |
• Operation of Protocol (IBS). |
• Initialization of Protocol (IBOOS). |
• Operation of Protocol (IBOOS). |
• Performance Evaluation. |
Description of the Proposed Algorithm: |
Aim of the proposed protocol is to add Security and Authentication of the sensed data and also the reduction of
energy consumption of sensor nodes. The proposed protocol having the following steps. |
Step 1: Create a network model. |
An undirected graph G (V,E) where the set of vertical V represent the sensor node in the network and E represents
set of edges in the graph which represents the physical and logical links between the sensor nodes. |
Let n denotes the Number of sensor nodes of n1,n2,n3,............nm and D is the data d1,d2,d3,.........dn, the sender and receiver
node which is represented as Ni and Nj.tij Denotes the delay of data transmission. |
Step 2: Initialization of Protocol (IBS): |
Setup Phase: Base Station will predistribute the key to all the Sensor Node. |
- Generate a Encryption key K, where |
- Generate the pairing parameters |
- Choose two hash function G1 and h |
- Pick a random integer as the master key set |
- Sensor Nodes are preloaded by system parameters |
Extraction Phase:
from master key and IDj where IDJ and tj is the time stamp of node j’s time
interval in the current round that is generated by its CH’s I from the TDMA control |
Signature Signing: The sensor node j picks a randomnumber and computes The sensor
node further computes |
|
|
Verification Phase: The Base Station finally authenticate the data by current time interval whether the received
Message is currently sent |
|
Step3:Operation of Protocol (IBS) |
Once the Initialization of protocol is over, the communication was done in rounds by the following steps. In the
verification phase the CH I sends the message to all the leaf nodes in the cluster. |
The leaf node will send the aggregated data by encrypting and adding digital signature with it by the param to its
Cluster Head. Cluster Head sends the aggregated data to the Base Station. Finally the Encrypted data is decrypted in the
Base Station. |
Step 4: Initialization of Protocol (IBOOS) |
Setup Phase: Base Station will predistribute the key to all the Sensor Node. |
- Generate a Encryption key K, where |
- Generate the pairing parameters |
- Choose two hash function G1 and h |
- Pick a random integer as the master key set |
- Sensor Nodes are preloaded by system parameters |
Extraction Phase: from master key and IDj where IDj and tj is the time stamp of node j’s time
interval in the current round that is generated by its CH’s I from the TDMA control. |
Offline Signing Phase: Node will generate the offline value with the time stamp |
|
Online Signing Phase: Node will generate the online value |
|
|
|
Verification Phase: The Base Station finally authenticate the data by current time interval tj whether the received
Message is currently sent |
|
Step5:Operation of Protocol (IBOOS) |
Once the Initialization of protocol is over, the communication was done in rounds by the following steps. In the
verification phase the CH I sends the message to all the leaf nodes in the cluster. |
The leaf node will send the aggregated data by encrypting and adding digital signature with it by the param to its
Cluster Head. Cluster Head sends the aggregated data to the Base Station. Finally the Encrypted data is decrypted in the
Base Station. |
Step6:Performance Evaluation |
The existing and the proposed protocols performance are evaluated. |
In the existing protocol the LEACH, SecLEACH are used for providing security and authentication of sensed data
in the Wireless Sensor Network. In the proposed protocol we have proposed protocol Id-Based digital Signature (IBS)
and Id-Based digital Signature (IBOOS) which are used for security and authentication. Here we are comparing the
proposed protocol with the existing protocol for the performance evaluation. |
SIMULATION RESULTS |
The simulation studies involve the deterministic small network topology with 30 nodes as shown in Fig.1. The
proposed secure and performance of clustered Wireless Sensor Network is implemented in NS-2. the simulation results
of message size for transmission and energy consumption is measured for the proposed secure and efficient data
transmission (SET) protocols for CWSNs is presented which is called SET-IBS and SET-IBOOS. Number of nodes is
defined as number of nodes is taken in the network setup. Energy Consumption which refers to the amount of energy
consumed in a WSN. Message size for transmission which is defined as the message packet size for data transmission
in the wireless sensor networks. |
In the above Fig.2.Shows the energy consumption graph. The X-axis denotes the number of nodes. Y-axis
denotes the energy consumption. In the proposed method secure and efficient data transmission (SET) protocols for
CWSNs is presented which is called SET-IBS and SET-IBOOS. In this method, the number of nodes is increased, the
energy consumption is increased. In the above Fig.3Shows the message size graph. The X-axis denotes the number of
nodes. Y-axis denotes message size. In the proposed method secure and efficient data transmission (SET) protocols for
CWSNs is presented which is called SET-IBS and SET-IBOOS. This graph clearly shows that the number of nodes is
increases the message size is increases in the proposed methods. |
In the above Fig.1 Shows the Deployment of Wireless Sensor Network using the Network Simulator
OMNeT++ 3.0 |
In the above Fig.2. Shows the energy consumption is shown in this graph. In the X-axis denotes number of
nodes. Y-axis denotes energy consumption is taken. In the existing system, LEACH protocol is used. The low-energy
adaptive clustering hierarchy (LEACH) protocol is presented which is a widely known and effective one to reduce and
balance the total energy consumption for cluster-based Wireless sensor networks. In the proposed method secure and
efficient data transmission (SET) protocols for CWSNs is presented which is called SET-IBS and SET-IBOOS. In this
method, the number of nodes is increased, the energy consumption is increased. |
In the above Fig.3 shows The message size is shown in this graph. In the X-axis denotes number of nodes. Yaxis
denotes message size. In the existing system, LEACH protocol is used. The low-energy adaptive clustering
hierarchy (LEACH) protocol is presented which is a widely known and effective one to reduce and balance the total
energy consumption for cluster-based Wireless sensor networks. In the proposed method secure and efficient data
transmission (SET) protocols for CWSNs is presented which is called SET-IBS and SET-IBOOS. This graph clearly
shows that the number of nodes is increases the message size is increases in the proposed methods. |
The number of alive nodes is shown in this graph. In the X-axis denotes number of nodes. Y-axis denotes
number of alive nodes. In the existing system LEACH protocol is used. The low-energy adaptive clustering hierarchy
(LEACH) protocol is presented which is a widely known and effective one to reduce and balance the total energy
consumption for cluster-based Wireless sensor networks. This shows that the comparison graph of alive nodesof
protocols of LEACH, SET-IBS and SET-IBOOS protocols. The results demonstrate that the proposed SET-IBS and
SET-IBOOS protocols consume energy faster than LEACH protocol because of the communication and computational
overhead for security of either IBS and/or IBOOS process. |
CONCLUSION AND FUTURE WORK |
The simulation results showed that the proposed algorithm performs better than the existing algorithm with secure
data transmission and energy consumption. In the existing method, the data transmission issues and the security issues
is analysed in CWSNs. The insufficiency of the symmetric key management for secure data transmission has been
discussed. Then the two secure and efficient data transmission protocols are presented which is called SET-IBS and
SET-IBOOS for CWNSs The proposed algorithm provides energy efficient path for data transmission and maximizes
the lifetime of Wireless Sensor Network. The proposed algorithm can be compared with other energy efficient
algorithm. We have used very small network of 30 nodes, as number of nodes increases the complexity will be too. |
For future work in order to provide efficient security some of the modifications are considered in the SET-IBS
and SET-IBOOS protocols. |
|
Figures at a glance |
|
|
|
|
Figure 1 |
Figure 2 |
Figure 3 |
Figure 4 |
|
|
References |
- A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30,Issue nos. 14/ 15,pp. 2826-2841, 2007.
- W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “AnApplication-Specific Protocol Architecture for Wireless Microsensor Networks,”IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660- 670, Oct. 2002.
- Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using EnhancedAPTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
- S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30,nos. 14/15, pp. 2842-2852, 2007.
- K. Pradeepa, W.R. Anne, and S. Duraisamy, “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int’l J. ComputerApplications, vol. 47, no. 11, pp. 23-28, 2012.
- L.B. Oliveira et al., “SecLEACH-On the Security of Clustered Sensor Networks,” Signal Processing, vol. 87, pp. 2882-2895, 2007.
- P. Banerjee, D. Jacobson, and S. Lahiri, “Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks,” Proc. IEEESixth Int’l Symp. Network Computing and Applications (NCA), pp. 145-152, 2007.
|