25-08-2017, 09:32 PM
SEMINAR REPORT ON ZERO KNOWLEDGE PROTOCOL AS SECURITY MODEL FOR THREATS IN WSN
ZERO KNOWLEDGE.docx (Size: 359.28 KB / Downloads: 18)
Abstract
Wireless sensor networks is a widely adapted
technology applied to various civilian, commercial and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are sensitive applications that need total security. This has to be understood from the standpoint that WSN lifetime is less due to resource constraints and controlling them personally is not feasible. This paper presents a new protocol that addresses some of the security threats prevailing in the arena of WSNs. We present a scheme and a protocol to prevent attacks such as distributed sensor cloning attack, man – in - the middle attack and replay attack. Our scheme verifies the authenticity of wireless sensor nodes to prevent cloning attack by using fingerprint concept associated with each and every sensor. The proposed protocol ensures that the sensitive data pertaining to cryptographic methods is not transmitted across network and prevents attacks such as replay attack and man – in – the middle attack.
Introduction
Sensor is a node that can collect data from its surroundings and send it to its base station or server.The sensors in WSN are having constraints in terms of resources.They are wireless in nature and have no fixed infrastructure. There is no human intervention in their functioning too. Their energy level is less and the network lifetime depends on the individual node's energy levels. However, this paper looks into the security aspects of WSNs. The security of sensitive applications where WSN is used is a concern.WSN should be in a position to tolerate or withstand attacks. The network must be able to prevent such attacks. The network attacks include distributed sensor cloning, replay attack and man in the middle attack. The goal of this paper is to propose a scheme for preventing distributed sensor cloning attack. This is achieved by attaching fingerprint to each and every node in the network and thus the verification of the actual original node is possible. As part of its security model, this paper also proposes a protocol named zero knowledge protocol which is meant for preventing cryptographic content to be transferred among the nodes of WSN. This protocol is efficient and able to prevent attacks such as Replay attack and Man in the Middle attack
Important Attacks In WSN
There are many attacks that can take place in WSN. However, the important attacks for which solution is provided by our paper are described here.
1. Man in the Middle Attack
In man-in-the-middle attack an attacker sits between sender and receiver and sniffs any information being sends between them. This attack is done by adversaries to gain private information in a conversation. Between any two nodes when there is some private conversation is going on attackers can make independent connections and intercept messages in the original conversation. They can also inject their responses and make the
Disadvantages Of Older Methods
Traditional protocols for the identification of parties in a transaction suffer from flaws that are inherent to the process used to achieve the objective. In simple password protocols, a claimant A gives his password to a verifier B. If certain precautions are not taken, an eavesdropper can get hold of the password that was transferred, and from there on he can impersonate A to his liking. Other protocols try to improve on this, as in the case of challenge-response systems. In this sort of protocols, A responds to B’s challenge to prove knowledge of a shared secret. Of course, the challenge is changed every time the protocol is used; therefore, an eavesdropper can, in time, gather enough partial information about the shared secret to try an impersonation attack like the one described above. Zero Knowledge Protocols (ZKP) which are designed to defeat the disadvantages described above. In ZKP, a prover will try to demonstrate knowledge of a certain secret to a verifier. The main idea is to allow the proof to take place without revealing any information whatsoever about the proof itself, except of course for the fact that it is indeed a valid one. Zero Knowledge Proofs can be compared to an answer obtained from a trusted oracle. Except the validity of his claim.
Zero Knowledge Protocol
Zero Knowledge Protocol is based on the objective to obtain a system in which it is possible for a prover to convince a verifier of his knowledge of a certain secret without disclosing any information. The present invention relates to Zero Knowledge Protocols that allows the knowledge of some “secret” or private key information in a first party domain to be verified by a second party without imparting the actual secret information or private key to that second party or to any eavesdropping third party. Throughout the present specification, the first party owning the secret information or private key (“s”) and wishing to prove that it has possession of the information will be referred to as the “prover” (“P”); the second party wishing to verify that this is the case without actually receiving knowledge of the secret will be referred to as the “verifier” (“V”). The prover P and verifier V may be any suitable electronic device. The secret information may be any numeric value, hereafter referred to as the secret number of the prover P. ZKP based protocols require less bandwidth, less computational power, and less memory compared to other authentication methods and thus seems to be suitable for WSN
Proposed Model
We have categorized nodes into three categories; base station, cluster head and member nodes. Some arbitrary nodes are selected as cluster heads and generation of cluster heads is left to the clustering mechanism . Each cluster head knows about its member nodes, while every member node knows its cluster head. Base station stores information of all sensor nodes (including cluster heads). The base station maintains complete topological information about cluster heads and their respective members. Base station is powerful enough and cannot be compromised like other nodes of the network. There is no communication among the member nodes The algorithm works in two phases whose diagrammatic representation is as shown below
IMPLEMENTATION OF ZKP
An efficient implementation of zero knowledge protocols for authentication of devices and for identification of devices connecting to a network. According to one aspect, the present invention provides a method of verifying the knowledge of a secret number s in a prover device by a verifier device having no knowledge of the secret number, with a zero knowledge protocol using the Montgomery representation of numbers and Montgomery multiplication operations therein.Fig 9 below shows a schematic flow diagram of a protocol to the present invention. It slightly focuses on generation of a public key using randomized algorithm which finally gets stored in a cluster head, whenever there’s a need of communication taking place between two different nodes, it takes place through the randomized generation of a private key between the two nodes using iterative iterations. Thus enabling us the data security
Conclusion
In this paper, we proposed a new security model to address three important active attacks namely cloning attack, MITM attack and Replay attack. We used the concept of zero knowledge protocol which ensures non-transmission of crucial information between the prover and verifier. The proposed model uses social finger print together with ZKP to detect clone attacks and avoid MITM and replay attack. We analyzed various attack scenarios, cryptographic strength and performance of the proposed model