24-07-2012, 12:20 PM
Wireless Sensor Network Security model using Zero Knowledge Protocol
Wireless Sensor Network Security model using Zero Knowledge Protocol.docx (Size: 723.58 KB / Downloads: 99)
introduction
Advances in technology have made it possible to develop sensor nodes which are compact and inexpensive. They are mounted with a variety of sensors and are wireless enabled. Once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring, it creates a security concern. Nodes may be subjected to various physical attacks. The network must be able to autonomously detect, tolerate, and/or avoid these attacks. One important physical attack is the introduction of cloned nodes into the network. When commodity hardware and operating systems are used, it is easy for an adversary to capture legitimate nodes, make clones by copying the cryptographic information, and deploying these clones back into the network. These clones may even be selectively reprogrammed to subvert the network. Individual sensor node contains a light weight processor, cheap hardware components, less memory. Because of these constraints, general-purpose security protocols are hardly appropriate. Public key cryptography is based on RSA approach. The energy consumption and computational latency makes RSA inappropriate for sensor network applications. Security algorithms that are designed specifically for sensor networks are found to be more suitable. The goal of this paper is to develop a security model for wireless sensor networks. We propose a method for identifying the compromised/cloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol.
1.2 PROJECT DESCRIPTION
The project entitled as Wireless Sensor Network Security Model by using Zero Knowledge protocol developed using JAVA.
Modules display as follows.
Server.
Destination (client).
Server:
In this server user is login to system. And sending the data to clients (destination)
Destination (Client):
When client is login to the system it maintains the 3 nodes.
Those are
Base Station, Cluster head and Member nodes.
Base Station maintains the all the information of the neighbor nodes (cluster nodes, member node). Randomly we are selecting the cluster head node. That head node is maintained by the Base Station.
Server sanded data is maintain by the Base Station. If any users try see that server sending data that will be shown in the form of encryption.
If the user sees through the cluster then the data will be in the form of decryption. (It means all data maintain at the Base Station and it is decrypted through the cluster only).
Secure Zero-knowledge protocol:
Zero-knowledge protocol allow identification, key exchange and other basic cryptographic operations to be implemented without revealing any secret information during the conversation and with smaller computational requirements in comparison to public key protocols. Thus ZKP seems to be very attractive for resource constrained devices. ZKP allows one party to prove its knowledge of a secret to another party without ever revealing the secret. ZKP is an interactive proof system which involves a proverb, P and verifier, V. The role of the proverb is to convince the verifier of some secret through a series of communications.
2. Clone Attack:
In clone attack, an adversary may capture a sensor node and copy the cryptographic information to another node known as cloned node. Then this cloned sensor node can be installed to capture the information of the network. The adversary can also inject false information, or manipulate the information passing through cloned nodes. Continuous physical monitoring of nodes is not possible to detect potential tampering and cloning. Thus reliable and fast schemes for detection are necessary to combat these attacks.
3. Man in the Middle Attack:
The man-in-the-middle attack (MITM) is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection. The attacker will be able to intercept all messages exchanging between the two victims and inject new ones.
4. Replay Attack:
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by adversary who intercepts the data and retransmits it. This type of attack can easily overrule encryption.
2. PROBLEM DEFINATION
2.1 Existing System:
Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring.
2.2 Proposed System:
Nodes are divided into three categories; base station, cluster head and member nodes. Some arbitrary nodes are selected as cluster heads and generation of cluster heads is left to the clustering mechanism (not dealt in this work). Each cluster head knows about its member nodes, while every member node knows its cluster head.
Base station stores information of all sensor nodes (including cluster heads). The base station maintains complete topological information about cluster heads and their respective members.
Base station is powerful enough and cannot be compromised like other nodes of the network.
There is no communication among the member nodes.
Public key cryptography is based on RSA approach. The energy consumption and computational latency makes RSA inappropriate for sensor network applications. Security algorithms that are designed specifically for sensor networks are found to be more suitable. The goal of this paper is to develop a security model for wireless sensor networks. We propose a method for identifying the compromised/cloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge protocol.
3. SOFTWARE AND HARDWARE REQUIREMENTS
3.1 Software Requirements:
Operating System : Windows xp/2000
Server Side : swings.
Database : oracle
3.2 Hard Ware Requirements:
Processor : Pentium-III (or) Higher.
Ram : 64MB (or) Higher.
Cache : 512MB
Hard disk : 10GB.
4. SYSTEM STUDY
4.1 Feasibility Study:
The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the sever. For feasibility analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are---
• Economical Feasibility
• Technical Feasibility
• Social Feasibility
Economical Feasibility:
This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.
• Technical Feasibility:
This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system.
• Social Feasibility:
The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.