Wireless sensor network security using zero knowledge protocol pdf

On the security of clusterbased communication protocols for. Security in wireless sensor network is vital to the acceptance and use of sensor networks. Feasibility of basic security schemes in wireless sensor networks security is a broadly used term encompassing the characteristics of authentication, integrity, privacy, nonrepudiation, and antiplayback 5. Security is a common concern for any network system, but security in wireless sensor network is of great importance to ensure its application success. For example, when sensor network is used for military purpose, it is very important to keep the sensed information con.

Leap is also a very popular security solution in wireless sensor networks and it was proposed by zhu et al in 2004. Recent advances insemiconductor, networking and material science technologies are driving the ubiquitous deployment of largescale wireless sensor networks wsns. The zero knowledge protocol is used to ensure non transmission of crucial cryptographic information in the wireless network in order to avoid maninthe middle attack and replay attack. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of unique identifiers becomes infeasible 2. Ensuring authentication and security using zero knowledge.

This section describes the routing security in wireless sensor network. Nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task. Authentication in wireless sensor networks using zero. These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. The aim of this book is to present few important issues of wsns, from the application, design and technology points of view.

Wireless sensor and actor network security analysis. Wireless sensor networks use batteryoperated computing and sensing devices. Wireless sensor network security model using zero knowledge protocol. We propose in this paper a computationally efficient security scheme for identifying network members in wireless sensor networks. On the security of clusterbased communication protocols. Sensor network, seismic, message authentication code, hopping, spread spectrum etc. Once the base station is authenticated, the others members of the network can then be authenticated by the base station. Wireless sensor network security model using zero knowledge protocol international organization of scientific research 5 p a g e. In proceedings of 2011 ieee international conference on communications icc pp. Its main purpose is to let the communication between two devices.

Together, these technologies have combined to enable a new generation of wsns that differ greatly from wireless networks developed. The book highlights power efficient design issues related to wireless sensor networks, the existing wsn applications, and discusses the research efforts being undertaken in this field which put the reader in good pace to be able to understand more advanced research and. The architectures of the networks employed, data rates, network size, span, power management and security protocols are all affected, if not dictated, by the communications protocols chosen for the application. Manets have high degree of mobility, while sensor networks are mostly stationary. The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network. Secure data aggregation in wireless sensor networks. Security protocols for wireless sensor network network. Superimposed sdisjunct code in this section, we introduce the basics of. Hence these networks have always been in quest for efficient and inexpensive authentication mechanisms. In 5 security properties for sensor networks are analyzed. Manet wireless sensor networks may be considered a subset of mobile adhoc networks manet.

A survey of security issues in wireless sensor networks. Wireless sensor networks wsns can be used to monitor environments, and. Network architecture consider a cwsn consisting of a fixed bs and a large number of wireless sensor nodes, which are homogeneous in functionalities and capabilities. Oct 26, 2009 nevertheless, the inclusion of a routing protocol in a wireless sensor network is not a trivial task. Wireless sensor network security model using zero knowledge. Modular sensor board msb430 is a hardware platform for wireless sensor networks created by scatterweb 11. Wireless embedded designers must assess these tradeoffs and make multiple decisions, such as transducer and. Detection of various attacks using zero knowledge protocol. Introduction to wireless sensor networks february 2012 this standard defines a communication layer at level 2 in the osi open system interconnection model. Wsn nodes have less power, computation and communication compared to manet nodes. This section presents the network architecture, security vulnerabilities, and protocol objectives. Wireless sensor network, security, attacks, passive and active attacks, diverse layer attacks, cryptographic attacks.

Wireless sensor networks technology and applications. Pdf wireless sensor network security model using zero. The proposed scheme was evaluated based on the simulation results. Authentication in wireless sensor networks using zero knowledge protocol. Sensor nodes are prone to failures due to harsh environments and energy constraints. Security protocols for use with wireless sensor networks. Detection of various attacks using zero knowledge protocol in. Stankovic department of computer science university of virginia charlottesville, virginia 22904 email. Hence the network layer attacks are listed with its counter measures. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off. Usually, wsns are connected to a legacy network ip network or 3 g network using one or more sink nodes or base stations. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementation of a complete security solution for a sensor network.

While increasing network lifetime, data aggregation protocols may degrade important quality of service metrics in wireless sensor networks, such as data accuracy, latency, faulttolerance, and security. In the wireless sensor network non transmission of crucial cryptographic. In particular, wireless sensor network product in industry will n ot get acceptance unless there is a. Additionally, the finished creation consists of multiparty protocols that. This is the difference between the mobile network to the wireless sensor network as in mobile network the cell phones are denied of the service once too many phones are present in the area while in the wireless sensor network the service increases as more nodes are present in the network. This is the difference between the mobile network to the wireless sensor network as in mobile network the cell phones are denied of the service once too many phones are. Dec 01, 2009 security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. Unlike previous methods for key distribution in wsns, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment.

This paper investigates the use of an identity mechanism called zero knowledge protocol zkp, for the authentication of sensor nodes. However, the potentially hostile environment in which sensors are located also introduces new challenges in defending the network, e. Since wireless sensor networks are formed by a significant number of nodes, the manual assignation of. The localized encryption and authentication protocol leap is a key management protocol used to provide security and support to sensor networks. Each intermediate node must perform routing and forward the data along a multihop path. Authentication in wireless sensor networks using zero knowledge. Security and energy efficiency in wireless sensor network wsn is the most questing issue nowadays because of various attacks on mobile nodes. Conclusion in this project, we proposed a new security model to address three important active attacks namely cloning attack, mitm attack and replay attack. Analysis of security protocols in wireless sensor network. In this mesh topology, sensor nodes must not only capture and disseminate their own data, but also serve as relays for other sensor nodes, that is, they must collaborate to propagate sensor data towards the base station. Loureiro federal university of minas gerais, mg,brazil. Attacks are generally classified into active, passive, inside, outside. The algorithms developed for wireless adhoc networks cannot be used for. Wireless sensor network security model using zero knowledge protocol in java email.

The goal of this paper is to develop a security model for wireless sensor networks. Malicious node security wireless sensor network zero knowledge protocol. Multihop networks have a wider range of applications at the cost of higher control complexity. A survey of security issues in wireless sensor networks yong wang university of nebraskalincoln. We propose a method for verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol for identifying the compromisedcloned nodes.

It was created by the institute of electrical and electronics engineers ieee, entity. The topology of a sensor network changes very frequently due to failures or mobility. Hence, security and data authentication are the major requirements for the wireless sensor networks. If in around 1985 and attacker had to have sophisticated. The authentication process is done by first identifying the base station as being the authentic one with the use of fingerprinting information. C kotak2 1shah and anchor kutchhi engineering college, mumbai 2principle, shah and anchor kutchhi engineering college, mumbai abstract wireless sensor networks wsn is excellent technology which provide great potential for situations like. Secure and efficient data transmission in wireless sensor. Secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process. We implement zero knowledge protocol zkp for the verification of sender sensor nodes. A key distribution protocol for wireless sensor networks.

We propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol zkp for verifying the authenticity of the sender sensor. Section 3 lists the security solutions for establishing a secure sensor network. The zeroknowledge proof zkp in cryptography can secure the. Obstacle to sensor security a wireless sensor network is a special network which has many constraints compared to a traditional computer network. The main features of the hardware and the operating system are described below. The security mechanism are not used directly in wireless sensor networks. Conservation of energy in wireless sensor network by preventing. Our simulation results indicate that our proposed scheme ensures high security to the network with minimal. Therefore, it is widely used in offices, banks, and many other organizations. With attachment of unique fingerprint to each node we address the clone attack. Meeting these goals requires careful design of both the sensor hardware and the network protocols. Implementation of zero knowledge protocol in wireless security ibrahim aziz patwekar1, dr. Security models for wireless sensor networks 5 note that a lot of research is still being conducted in perfecting the protocol stack for sensor network, so the exact protocols are yet to be concreted. Pdf wireless sensor networks wsns offer an excellent opportunity to monitor.

As sensors are used to monitor sensitive areas therefore security and energy. The paper studies an authenticated routing protocol and a twoparty key agreement protocol, and demonstrates that our security building blocks greatly facilitate the implementa. Implementation of zero knowledge protocol in wireless security. We used the concept of zero knowledge protocol which. Because sensor networks pose unique challenges, traditional security techniques used in traditional networks cannot be applied directly. Conventional authentication schemes are not suitable to the sensor node because of the limitations of memory, computational power and energy in the node. We propose a method for identifying the compromisedcloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol 5,15.

A hybrid security approach for nodes authentication in. Standardization has yet to occur for a communications system optimal for use with wireless sensor networks. Oliveira, eduardo habib, hao chi wong 1, antonio a. Section 1 lists the introduction of wireless sensor network. Presented by chetan rana u08co2 intoduction wireless sensor networks are networks that consists of sensors which are distributed in an ad hoc manner. Introduction as a result of the growth of networks, over the years the network attack tools and methods have greatly evolved. Network security projects final year projects in network.

May 17, 20 wireless sensor network security model using zero knowledge protocol in java email. In order to provide an efficient method to verify the. As cryptographic schemes tend to exhaust sensor network resources, this paper investigates the use of zero knowledge protocol for the authentication of sensor nodes. Section 2 discusses constraints, security requirements, threat models, attacks for wireless sensor networks. Dec 20, 20 secure communication over wireless body area network wban is a key issue in the design and deployment of wban systems, in which the authentication of sensor node is a critical process.

1392 206 126 1085 1116 9 47 6 611 1515 1172 874 1540 1026 956 1484 1059 784 190 884 427 856 1389 555 1267 1372 3 72 696 1305 1042 1478 428 429 1163 986 558 1426 806 1222 116 415 906 588