A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.

Slides:



Advertisements
Similar presentations
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Improvement on LEACH Protocol of Wireless Sensor Network
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
1 Routing Techniques in Wireless Sensor networks: A Survey.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
Globecom 2004 Energy-Efficient Self-Organization for Wireless Sensor Networks: A Fully Distributed approach Liang Zhao, Xiang Hong, Qilian Liang Department.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Multimedia & Networking Lab
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Design of a distributed energy efficient clustering (DEEC) algorithm for heterogeneous wireless sensor networks.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Authors: N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Energy-Efficient Protocol for Cooperative Networks.
“LPCH and UDLPCH: Location-aware Routing Techniques in WSNs”. Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Protocols for Wireless Sensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Edinburgh Napier University
Presentation transcript:

A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications (IFITA 2010) Zhenghong Xiao

1 Contents 1.Introduction 2.Related Works 3.Design and Implementation of a Secure Routing Protocol 4.Experimental Results and Analysis 5.Conclusions

2 Introduction ▣ The routing protocols security in WSN can be divided into the key management and the multi-path routing protocols ◈ The key management refers to centralized and pre-allocation approach For centralized key distribution, the base station and each node share a pair of keys For key pre-distribution, a ring consists of randomly chosen partial key from key pool, and the adjacent nodes have the same key among the rings can communicate securely ◈ The multi-path routing protocols are used to deliver message by using multi-path alternately as the path between a source node and a destination node

3 Related Works ▣ Key Management ◈ the ID-based authentication and key negotiation technology and the secret sharing technology are adopted for design of a secure routing protocol ◈ a dynamic key distribution protocol -SDSK based on clustering is proposed, it considers both the residual energy of nodes and its location information to optimize cluster head election mechanism, and uses the dynamic key generated by hash functions to encrypt the data ◈ a hash chain based random key pre-distribution scheme is proposed. Nodes only need to preload a few of secret keys and can establish pair- wise keys amongst its neighboring nodes with high probability through tuning some system parameters, such as the length of hash chain, the number of common auxiliary nodes, the number of hash chain.

4 Related Works ▣ multi-path routing protocols a new routing protocol called SEEM: Secure and Energy-Efficient Multi- path routing protocol is proposed. SEEM uses multi-path alternately as the path for communicating between two nodes, thus it prolongs the lifetime of the network. Its advantages are mitigating the load of sensor nodes by transferring routing related tasks to the base station, extending the lifetime of the whole network by using multi-path to transfer data, reducing the transmission delay through using the shortest and reliable path

5 Design and Implementation of A Secure Routing Protocol ▣ Initial Conditions ◈ Supposing WSN is safe at the initial stage ◈ A unified ID number and a master key K_bs_i are assigned to sensor nodes by base station before the WSN nodes are deployed ◈ A key K_ch_init and hash function Hash(x) are assigned to head-nodes by base station, and a key K_sn_init and hash function Hash(x) are assigned to sensor nodes in the same way, in which the key K_ch_init and the key K_sn_init are equal ▣ Cluster Head Election In this paper, cluster head election is done at the deployment stage. Due to using heterogeneous sensor networks, cluster head nodes have more energy and more capability than sensor nodes, thus it can effectively complete data transmission, extend lifetime of WSN, and provide a meth od to detect typical attacks with the aid of prediction model of energy and traffic for cluster head nodes

6 Design and Implementation of A Secure Routing Protocol ▣ Cluster Formation cluster head sends Hello message to other nodes Chi  SNi: E (K_ch_init, Hello) ▣ Data Transmission Phase SNi  Chi: E (K_sn_init, data) | data) Chi  BS: E (K_ch_init, data) | data) ▣ Prediction Model of Energy Consumption ARMA is used to detect attacks in cluster head election phase

7 Design and Implementation of A Secure Routing Protocol let Pp be predictive value of energy consumption, let Pr be real data of energ y consumption, if |Pp-Pr| > θ, where the threshold is set θ, and N times a nomaly is detected continuously during a given period of time, then the at tacks are therefore considered to occur. ▣ Node Traffic Predicting and Monitoring Kalman filter is used to prevent attacks related with traffic in routing phase let Tp be predictive value of node flow, Tr be real data of node flow, if | Tp- Tr | > θ, where the threshold is set to θ, and M times flow anomaly is detected continuously during a given period of time, then the attacks are therefore considered to occur

8 Design and Implementation of A Secure Routing Protocol ▣ WSN Maintenance When system advances the next round. ◈ the ARMA model is used to predict the energy consumption of nodes to detect attacks in cluster head election phase ◈ we do not take security measures such as authentication, data encryption transmission in the cluster formation phase ◈ Kalman filter model is used to predict and monitor flow of nodes to prevent attacks in routing stages

9 Experimental Results and Analysis ▣ Parameters Configuration ParameterValue Network size1000 m × 1000 m Number of Nodes100 Number of head node5 Initial energy(J)2 Simulation Time400 Windows Size10

Experimental Results and Analysis ▣ Energy Consumption of Node

11 Experimental Results and Analysis ▣ Transmitted data packets of node

12 Conclusions ▣ A secure routing protocol with intrusion detection based on heterogeneous sensor network ▣ A kind of new idea for research on secure routing protocol from the point of intrusion detection

13 Questions or Comments ▣ Any questions or comments?