Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Secure Data Collection in Wireless Sensor Networks Using Randomized FULL REPORT
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

[attachment=22467]


INTRODUCTION
Motivations



OF the various possible security threats encountered in a
wireless sensor network (WSN), in this paper, we are
specifically interested in combating two types of attacks:
compromised node (CN) and denial of service (DOS) [22].
In the CN attack, an adversary physically compromises a
subset of nodes to eavesdrop information, whereas in the
DOS attack, the adversary interferes with the normal
operation of the network by actively disrupting, changing,
or even paralyzing the functionality of a subset of nodes.
These two attacks are similar in the sense that they both
generate black holes: areas within which the adversary can
either passively intercept or actively block information
delivery. Due to the unattended nature of WSNs, adversaries
can easily produce such black holes [1]. Severe CN
and DOS attacks can disrupt normal data delivery between
sensor nodes and the sink, or even partition the topology.


Contributions and Organization

The key contributions of this work are as follows:
1. We explore the potential of random dispersion for
information delivery in WSNs. Depending on the
type of information available to a sensor, we develop
four distributed schemes for propagating information
“shares”: purely random propagation (PRP),
directed random propagation (DRP), nonrepetitive
random propagation (NRRP), and multicast treeassisted
random propagation (MTRP). PRP utilizes
only one-hop neighborhood information and provides
baseline performance. DRP utilizes two-hop
neighborhood information to improve the propagation
efficiency, leading to a smaller packet interception
probability. The NRRP scheme achieves a
similar effect, but in a different way:


RANDOMIZED MULTIPATH DELIVERY
Overview


As illustrated in Fig. 1, we consider a three-phase approach
for secure information delivery in a WSN: secret sharing of
information, randomized propagation of each information
share, and normal routing (e.g., min-hop routing) toward
the sink. More specifically, when a sensor node wants to
send a packet to the sink, it first breaks the packet into
M shares, according to a ðT;MÞ-threshold secret sharing
algorithm, e.g., Shamir’s algorithm [20]. Each share is then
transmitted to some randomly selected neighbor.


Random Propagation of Information Shares
To diversify routes, an ideal random propagation algorithm
would propagate shares as dispersively as possible.
Typically, this means propagating the shares farther from
their source. At the same time, it is highly desirable to have
an energy-efficient propagation, which calls for limiting the
number of randomly propagated hops. The challenge here
lies in the random and distributed nature of the propagation:
a share may be sent one hop farther from its source in a
given step, but may be sent back closer to the source in the
next step, wasting both steps from a security standpoint. To
tackle this issue, some control needs to be imposed on the
random propagation process.