Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks



[attachment=64951]


ABSTRACT

Recent developments on Wireless sensor networks have made their application used in a wide range of applications, such as, military sensing and tracking, health monitoring. Wireless sensor nodes have restricted computational resources, and are always deployed in a harsh, unattended or hostile environment. Therefore, network security represents a challenging task. This work presents a public-key based pre-distribution scheme with time-position nodes for simultaneous exchange of secure keys. In this paper, we proposed a general three-tier security framework for authentication and pair wise key establishment between mobile sinks and sensor nodes. The proposed defend attack and key management mechanism for sensor network applications can successfully handle sink mobility and can continually deliver data to neighboring nodes and sinks. Simulation results indicate that the proposed mechanism can reduce energy consumption and extend the average network lifetime by about 25%.

EXISTING SYSTEM

• The Existing Systems used various techniques such as:
o Asymmetric key technique for the key exchange technique.
o Probabilistic key predistribution scheme
o Two key predistribution schemes

• Although the above security approach makes the network more resilient to mobile sink replication attacks compared to the single polynomial pool-based key predistribution scheme, it is still vulnerable to stationary access node replication attacks. In these types of attacks, the attacker is able to launch a replication attack similar to the mobile sink replication attack. After a fraction of sensor nodes have been compromised by an adversary, captured static polynomials can be loaded into a replicated stationary access node that transmits


Disadvantages of Existing System

For the basic probabilistic and q-composite key pre-distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node.

PROPOSED SYSTEM

To address the above-mentioned problem, we have developed a general framework that permits the use of any pairwise key predistribution scheme as its basic component, to provide authentication and pairwise key establishment between sensor nodes and MSs.

To facilitate the study of a new security technique, we first cultivated a general three-tier security framework for authentication and pairwise key establishment, based on the polynomial pool-based key predistribution scheme


Advantages of Proposed System

The proposed technique will substantially improve network resilience to mobile sink replication attacks compared to the single polynomial pool-based key pre distribution approach, as an attacker would have to compromise many more sensor nodes to launch a successful mobile sink replication attack

MODULE DESCRIPTION

Sensor Module
We know that Wireless Sensor Networks (WSN) are sensing, computing and communication infrastructure that are able to observe and respond to phenomena in the natural environment and in our physical and cyber infrastructure. The sensors themselves can range from small passive micro sensors to larger scale, controllable weather-sensing platforms

Access Point Module

In this module first we develop the access point module. In WSN, these access point module acts as an intermediate between the sensor node and sink node

Mobile Sink Module

In this module first we develop the Mobile Sink Module, where the data are to be delivered or reached as destination

Key Distribution scheme Module

 This protocol uses two separate key management schemes; one for group-wide and individual keys and another for sub-network key management.

 The group-wide key is used for non-critical broadcast messages between Nodes. The individual keys are used for secure communication between nodes creating a subnetwork and setting up a subnetwork key. The second key management scheme is creating and distributing the keys for the dynamically created subnetworks.

 Securely distributing the keys for the subnetworks created by events within the sensor network is a non-trivial problem since the subnetworks may contain any arbitrary set of neighboring nodes. These nodes all must have a mechanism to securely communicate with each other to distribute the subnetwork key to all the subnetwork members.