22-09-2014, 12:25 PM
User Authentication using Colors and data security using Armstrong numbers for
Wireless Sensor Networks Project Report
User Authentication.pdf (Size: 337.49 KB / Downloads: 44)
Abstract
In real world, data security plays an important
role where confidentiality, authentication, integrity, non
repudiation are given importance.A wireless sensor
network(WSN) consisiting of a large number of tiny sensors can
be an effective tool for gathering data in diverse kinds of
environments.The data collected by each sensor node is
communicated to the base station,which forwards the data to the
end user. In wireless sensor network data security plays an
important role where confidentiality, authentication, integrity,
non repudiation are given importance. This paper, propose a
User Authentication(UA) scheme for Wireless Sensor Networks
(WSNs), which employs RGB color cube algorithm and
Armstrong number for data security. The simulation results on
NS2 show that Proposed scheme is not only secure but also
increase speed of communication than the existing ATTUA
scheme.
INTRODUCTION
A wireless sensor network[16] is a collection of nodes
organized into a cooperative network . Each node consists of
processing capability (one or more microcontrollers, CPUs or
DSP chips), may contain multiple types of memory
(program, data and flash memories), have a RF transceiver
(usually with a single omni- directional antenna), have a
power source (e.g., batteries and solar cells), and
accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being
deployed in an ad hoc fashion. Systems of 1000s or even
10,000 nodes are anticipated. Currently, wireless sensor
networks are beginning to be deployed at an accelerated pace.
It is not unreasonable to expect that in 10-15 years that the
world will be covered with wireless sensor networks with
access to them via the Internet. This can be considered as the
Internet becoming a physical network. This new technology
is exciting with unlimited potential for numerous application
areas including environmental, medical, military,
transportation, entertainment, crisis management, homeland
defense, and smart spaces.
Sensor network security issue
Two of the most security-oriented applications of wireless
sensor networks are military and medical solutions. Due to
the nature of the military, it is obvious that the data (sensed or
disseminated) is of a private nature and is required to remain
this way to ensure the success of the application. Enemy
tracking and targeting are among the most useful
applications of wireless sensor networks in military
terms[15]. The choice of which security services to
implement on a given sensor mainly depends on the type of
application and its security requirements. Amongst these we
examined:
Wireless sensor Network Scenario
For some special applications of WSNs, such as military
surveillance,information gathered is sensitive and must be
kept confidential.Therefore in such applications UA is
necessary. Health care is a good example of UA application
for WSNs: Let’s say a WSN offers instantaneous medical
data service to subscribed health care employees such as
doctors and nurses. Since the confidentiality of the data is
important (i.e. patient medical records), only the legitimate
users should get a response to their queries. Unauthorized
users must be prevented from accessing the mentioned
confidential information. Therefore UA is a must in these
kinds of networks. UA has been well studied for traditional
networks, but those solutions cannot be used for WSNs
because of the unique characteristics that WSNs possess.
UA is an intended feature that will increase data security for
WSN users and profitability of the network for WS
RELATED WORK
UA for WSNs has been used recently in a few other research
papers. Solutions for homogenous WSNs were proposed in
[2], [3] and [4]. Wong et al. [2] proposed a dynamic UA
scheme for homogenous WSNs. Later this work was
improved by Tseng etal. [3] with the following advantages,
including resistance of the replay and forgery attacks,
reduction of user’s password leakage risk, capability of a
changeable password, and better efficiency. As discussed in
[2], authors claim that weak-password authentication is not
suitable for WSNs because it loads the computational
overhead to the used cryptography algorithm. In other words
the algorithm must be strong enough to compensate for the
weakness in the key. Therefore they recommend
strong-password authentication for WSNs in which
computational load is light owing to the strength in the key.
As a result they use SKC throughout the network which is not
scalable for a large number of sensor nodes. Although
Benenson et al.’s scheme [4] uses PKC, it is not practical for
WSNs because of the homogenous network structure,
meaning that all the power and processing demanding PKC
operations are handled on the normal sensor nodes. As a
result authentication operations take minutes and
batteries of the sensor nodes deplete faster [5]. To our
knowledge, in the literature the only heterogeneous approach
to the UA in WSNs is the Le et al.’s [1] Two Tier User
Authentication (TTUA) scheme. In the TTUA scheme, CHs
are used as a backbone in the network so that the sensed data,
after being collected, are transmitted through
System Model
In this proposed scheme Wsn consists of 1) base station with
high processing capability.2)sensor nodes having low
processing capability with less power.3) Users with no power
constraints compared to sensor nodes. Users interact with the
WSN for data query and retrieval. After processing sensed
information; the sensor node either sends the data upon event
detection or stores it to serve for the nextquery.Between user
and Base station RGB based cauthentication algorithm is
used.And also Armstrong number based security algorithm is
used in which 128 bit key is generated using Armstrong
number and which is used in aes algorithm foe data
encryption and decryption.
RGB Based Authentication
The proposed scheme includes two phases: Registration,
Authentication.
1)User registration: user module selects onr RGB color value
for the user and then find the position of this RGB in the cube
and send request with its ID and POS to the base station for
registration in Wsn.Base station generate a random number
Which is termed as seed .Also the base station module scales
the seed value with the Armstrong number and multiply it
with the POS it received from the user.It performs MD5 on
this product and generate 128 bit key which is used for data
security in AES algorithm.Base station send the key and seed
to user and store the values in its database.User upon
receiving store the POS,SEED,KEY in its database.Figure
below depicts the user registration process.
CONCLUSION
In this paper we propose a user authentication scheme for
wireless sensor network named RGB based authentication
scheme.This scheme provides sufficient security for sensor
nodes having less processing capability. Simulation results
on NS2[12] have shown that the RGB based authentication
scheme requires less time for registration and login also bytes
consumed by the proposed scheme is less than than the
existing scheme.