AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.

Slides:



Advertisements
Similar presentations
Multirate adaptive awake-sleep cycle in hierarchical heterogeneous sensor network BY HELAL CHOWDHURY presented by : Helal Chowdhury Telecommunication laboratory,
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
ENERGY-EFFICIENT COMMUNICATIONS PROTOCOL FOR WIRELESS MICROSENSOR NETWORKS W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Published in 2000.
LEACH Low Energy Adaptive Clustering Hierarchy Deparment of Computer Science Institute of System Architecture, Chair for Computer Network Dresden, 23 January.
Presented by Rick Skowyra
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Presentation: Energy Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Mikhail Nesterenko Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari.
Protocols for Wireless Sensor Networks
Kyung Tae Kim, Hee Yong Youn (Sungkyunkwan University)
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Improvement on LEACH Protocol of Wireless Sensor Network
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Low-Energy Adaptive Clustering Hierarchy An Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks M. Aslam hayat.
Kai Li, Kien Hua Department of Computer Science University of Central Florida.
LEACH-SC Presented By M. Jaffar Khan
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
LEACH Week 11 Lecture 2 5/7/2015LEACHFolie 1 von XYZ.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Security Issues In Sensor Networks By Priya Palanivelu.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Wireless Sensor Network Security Anuj Nagar CS 590.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
CuMPE : CLUSTER-MANAGEMENT AND POWER EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORKS ITRE’05 Information Technology: Research and Education Shen Ben Ho.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
LEACH Low Energy Adaptive Clustering Hierarchy Deparment of Computer Science Institute of System Architecture, Chair for Computer Network Dresden, 23 January.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Routing and Clustering Xing Zheng 01/24/05. References Routing A. Woo, T. Tong, D. Culler, "Taming the Underlying Challenges of Reliable Multihop Routing.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
An Application-Specific Protocol Architecture for Wireless Microsensor Networks 컴퓨터 공학과 오영준.
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Protocols for Wireless Sensor Networks
ROUTING PROTOCOLS OF WIRELESS SENSOR NETWORK
Distributed Algorithms for Mobile Sensor Networks
Wireless Sensor Networks 5. Routing
Q-LEACH
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Networks and Communication Systems Department
Leach routing protocol in WSN
Leach routing protocol in WSN
Presentation transcript:

AES based secure LEACH for WSN’s

Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely deployed, so congestion and errors in transmission Unattended operation- Deployed in environment open to adversaries

Security Requirements Data Confidentiality Data Integrity Data Freshness Authentication Availability Self -Organization

Security Primitives Symmetric Key Algorithms – Encryption methods in which both the sender and receiver share the same key. – Block ciphers e.g., DES, AES. – Stream ciphers e.g., RC4.

High Level Description-AES 1.Key Expansion 2.Initial Round AddRoundKey 3.Rounds 1.SubBytes 2.ShiftRows 3.MixColumns 4.AddRoundKey 4.Final Round (no MixColumns) 1.SubBytes 2.ShiftRows 3.AddRoundKey

AES Standards

Low Energy Adaptive Clustering Hierarchy (LEACH) Nodes organize themselves into local clusters with one of node acting as cluster head Cluster head performs Data Integration Randomized rotation of ‘Cluster head’ role among nodes LEACH operation is divided into rounds – Set-up phase – Steady state phase

S-LEACH- The Scheme Consists of two phases – Set-up phase – Steady state phase Cryptographic tools used – AES- for encryption and Decryption – AES-CMAC- AES based to Message Authentication Code(MAC) – AES-PRF- AES based Pseudo random function to generate keys

Cluster formation Algorithm After cluster head election, cluster head sends an Advertisement message(ADV) Non-Cluster head node determines its Cluster head based on the received signal strength of ADV Each node after deciding the cluster head sends a join- Request(Join-REQ) to cluster head Cluster head sets up TDMA Schedule and transmits this schedule to the nodes

Steady-State Phase Steady State phase broken into frames, nodes send data once per frame Frame duration depends on number of nodes in the cluster. Node turns of the radio in the other frames in steady state. Cluster head awake all the time and performs data aggregation

Secure-LEACH Four types of keys – Group key Key shared by all nodes. Used to distribute session key – Session key This key operates for only round – Cluster key Generated by Cluster head Used for exchange of data between cluster base station – Pair wise key Derived from Cluster key For exchange of data between Cluster head and nodes

Set-up Phase Group key is preloaded Base station broadcasts the session key encrypted with the group key BS → * : ({Session key} Kg ) Election Phase Using cluster head election probability, Cluster head election is done Cluster head Transmits Secure advertisement CHD i → * : (ADVERTISEMENT, Id CHDi, MAC KCHDi ) K CHDi =f Ks (Id CHDi )

Steady State Phase Steady state is divided into frames According to schedule received each node transmits in the allocated frame encrypted with the session – ND i → CHD j : ({Data} Knhij ) After the round time finishes, the base station transmits the session key and the process repeats again

Performance analysis of S-LEACH Simulation carried out using Network Simulator OMNeT OMNeT++ is a open source Network Simulator based on C++

Simulation parameters ParameterValue Topology Size1500X1000 m 2 Channel TypeWireless Channel Antenna ModelOmni Antenna Number of nodes50 Cluster head Election7/ round Initial node Energy2J Nodes distributionNodes are randomly distributed Energy ModelBattery Communication modelBi-directional Base station positionFixed at 1050x950

Results Energy Vs Time

Results Time Vs Number of Node Alive

Results Number of Data items received at Base station Vs Energy

Results Number of Data items received at Base station Vs Number of nodes alive

Conclusion Both energy efficient and secure Positive features of symmetric key cryptography and cluster-based methods. Each packet using session key which changes after each session by the sink node

References [1] C. Chong, S. P. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,” Proceedings of the IEEE. 91(8): , Aug [2] S. Zhu, S. Setia, S. Jajodia, Leap: Efficient security mechanisms for large-scale distributed sensor networks, in: ACM Conf. Computer and Commun. Security, pp. 62–72, 2003 [3] Joan Daemen and Vincent Rijmen, ”The design of Rijndael, AES — the advanced encryption standard,” Springer-Verlag, [4] W. B. Heinzelman et al., “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Communications Volume 1, No. 4, pp , Oct [5] A. Wang, W. Heinzelman, and A. Chandrakasan, “Energy-scalable protocols for battery-operated microsensor networks,” Proc IEEE Workshop Signal Processing Systems (SiPS ’99), pp. 483–492, Oct [6] “OMNeT++ discrete event simulation environment,”

Thank you