A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications (IFITA 2010) Zhenghong Xiao
1 Contents 1.Introduction 2.Related Works 3.Design and Implementation of a Secure Routing Protocol 4.Experimental Results and Analysis 5.Conclusions
2 Introduction ▣ The routing protocols security in WSN can be divided into the key management and the multi-path routing protocols ◈ The key management refers to centralized and pre-allocation approach For centralized key distribution, the base station and each node share a pair of keys For key pre-distribution, a ring consists of randomly chosen partial key from key pool, and the adjacent nodes have the same key among the rings can communicate securely ◈ The multi-path routing protocols are used to deliver message by using multi-path alternately as the path between a source node and a destination node
3 Related Works ▣ Key Management ◈ the ID-based authentication and key negotiation technology and the secret sharing technology are adopted for design of a secure routing protocol ◈ a dynamic key distribution protocol -SDSK based on clustering is proposed, it considers both the residual energy of nodes and its location information to optimize cluster head election mechanism, and uses the dynamic key generated by hash functions to encrypt the data ◈ a hash chain based random key pre-distribution scheme is proposed. Nodes only need to preload a few of secret keys and can establish pair- wise keys amongst its neighboring nodes with high probability through tuning some system parameters, such as the length of hash chain, the number of common auxiliary nodes, the number of hash chain.
4 Related Works ▣ multi-path routing protocols a new routing protocol called SEEM: Secure and Energy-Efficient Multi- path routing protocol is proposed. SEEM uses multi-path alternately as the path for communicating between two nodes, thus it prolongs the lifetime of the network. Its advantages are mitigating the load of sensor nodes by transferring routing related tasks to the base station, extending the lifetime of the whole network by using multi-path to transfer data, reducing the transmission delay through using the shortest and reliable path
5 Design and Implementation of A Secure Routing Protocol ▣ Initial Conditions ◈ Supposing WSN is safe at the initial stage ◈ A unified ID number and a master key K_bs_i are assigned to sensor nodes by base station before the WSN nodes are deployed ◈ A key K_ch_init and hash function Hash(x) are assigned to head-nodes by base station, and a key K_sn_init and hash function Hash(x) are assigned to sensor nodes in the same way, in which the key K_ch_init and the key K_sn_init are equal ▣ Cluster Head Election In this paper, cluster head election is done at the deployment stage. Due to using heterogeneous sensor networks, cluster head nodes have more energy and more capability than sensor nodes, thus it can effectively complete data transmission, extend lifetime of WSN, and provide a meth od to detect typical attacks with the aid of prediction model of energy and traffic for cluster head nodes
6 Design and Implementation of A Secure Routing Protocol ▣ Cluster Formation cluster head sends Hello message to other nodes Chi SNi: E (K_ch_init, Hello) ▣ Data Transmission Phase SNi Chi: E (K_sn_init, data) | data) Chi BS: E (K_ch_init, data) | data) ▣ Prediction Model of Energy Consumption ARMA is used to detect attacks in cluster head election phase
7 Design and Implementation of A Secure Routing Protocol let Pp be predictive value of energy consumption, let Pr be real data of energ y consumption, if |Pp-Pr| > θ, where the threshold is set θ, and N times a nomaly is detected continuously during a given period of time, then the at tacks are therefore considered to occur. ▣ Node Traffic Predicting and Monitoring Kalman filter is used to prevent attacks related with traffic in routing phase let Tp be predictive value of node flow, Tr be real data of node flow, if | Tp- Tr | > θ, where the threshold is set to θ, and M times flow anomaly is detected continuously during a given period of time, then the attacks are therefore considered to occur
8 Design and Implementation of A Secure Routing Protocol ▣ WSN Maintenance When system advances the next round. ◈ the ARMA model is used to predict the energy consumption of nodes to detect attacks in cluster head election phase ◈ we do not take security measures such as authentication, data encryption transmission in the cluster formation phase ◈ Kalman filter model is used to predict and monitor flow of nodes to prevent attacks in routing stages
9 Experimental Results and Analysis ▣ Parameters Configuration ParameterValue Network size1000 m × 1000 m Number of Nodes100 Number of head node5 Initial energy(J)2 Simulation Time400 Windows Size10
Experimental Results and Analysis ▣ Energy Consumption of Node
11 Experimental Results and Analysis ▣ Transmitted data packets of node
12 Conclusions ▣ A secure routing protocol with intrusion detection based on heterogeneous sensor network ▣ A kind of new idea for research on secure routing protocol from the point of intrusion detection
13 Questions or Comments ▣ Any questions or comments?