Вы находитесь на странице: 1из 7

International Journal of Emerging Trends in Engineering and Development Issue 7, Vol.

1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

Design and Analysis of a Secure and


Efficient Data Transfer in a Cluster Based
Wireless Sensor Networks
#1 *2
CHIGURUPATI GOVARDHAN , DR.M.SAMPATH KUMAR
#1 *2
M.Tech , Associate Professor
Department of Computer Science & Systems Engineering,
College of Engineering, Andhra University,
Visakhapatnam-530003, AP, India.

Abstract algorithms are used to identify the malicious


node or sensor which reside within the cluster
during data transmission. In this paper as an
Now a days security plays a vital role
extension we have implemented three types of
in each and every part of human life. As
attacks like active, passive and compromised
security plays an important role in todays
human life, but there is no security during data
transmission in a wireless sensor networks. In a
D
attacks within the wireless media. These three
attacks increase system performance in terms
TE
of potency, integrity. During this proposed
WSN there was a scarcity of security between
NCWSN. By conducting numerous
the sender node and destination node
experiments on the projected two algorithmic
throughout communication in wireless media.
program on a LAN network our simulation
As wireless sensor networks don't have fixed
results clearly tells that this projected idea can
topology like a wired networks ,it is very
E

deliver the goods high level of knowledge &


critical to spot the malicious node that cause
security whereas transferring data through
the failure or attack during the data
wireless media.
IJ

transmission, as they will not reside in that


region. So in this paper we have implemented a
novel cluster based wireless sensing element Keywords
network known as NCWSN for secure and
efficient data transfer in a wireless medium. In Wireless Sensor Networks, Economical
this paper for the first time we have Knowledge, Data Transmission, Clustering,
implemented a new concept like clustering Identity Based Online Signature, Attacks,
where the sensors or intermediate nodes are CompromisedAttack.
bounded freely with in a cluster so that nodes
which move freely can reside within the cluster
but they cant move outside the cluster. In this Introduction
paper we've enforced 2 algorithms like SET-
IBS (Secure Economical knowledge A WSN is a set of autonomous
Transmission with Identity-Based digital devices which are all together connected in a
Signature scheme) and conjointly SET-IBOOS wireless medium to monitor the physical and
(Identity-Based Online/Offline digital environmental changes that takes place like
Signature (IBOOS) scheme). These two temperature , wind pressure, humidity in air
and various physical and climatic changes.

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 23
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

Coming to the architecture of an WSN, this is also varies from one to other, ranging from a
always built on the top of nodes" from a few hundreds of dollars to thousand dollars,
few hundred to several thousand or even depending on the complexity and dimension
lakhs, in which each and every node is of the sensor nodes. The size and cost
connected to one or multiple sensors. In an constraints of any sensor nodes mainly vary
WSN,if we take a sensor node we can find based on energy, bandwidth, memory and
out following components that are attached to computation speed of each and every sensor.
it like a radio transceiver with an internal Generally the topology plays a vital role for
antenna or connection to an external antenna, any network and coming to WSN it doesnt
a microcontroller chip, an electronic circuit have any fixed topology as due to its wireless
for interfacing with the sensors and an energy medium [1], [2].
source, this comes as a battery or an
embedded form of energy harvesting. From the above figure.1, we can
clearly find out that a wireless sensor networks
comprises of a set of sensor nodes all together
surrounded by a mobile relay.The sink node is
a device or node which will try to receive the
data which is available in the network through
D
the sensor field.The data which is requested by
the sink node is uploaded by the base station or
application manager at the we can able to get a
TE
clear idea about the wireless sensor networks,
where the application manager will connect to
the wireless network in order to process his
application with the help of a gateway. Here
E

the gateway is connected to a sink node where


it is used to relay the information to various
sensor nodes which are available in the sensor
IJ

field. Here in the sensor field we can able to


identify a lot of sensor nodes which are
surrounded in a boundary region.

Related Work
In this section we mainly discuss
Figure. 1. Defines the Working Nature of an about the background work that was related to
Wireless Sensor Network wireless sensor networks and also about the
LEACH protocol that was used in the existing
Generally a sensor node may vary in paper.
size as different sensors will have different
sizes depend on their individual capabilities. Background Work
The size of a sensor varies from a shoe box to
that of size of a dust grain particle. Along
with the size of a sensor the cost of the sensor Generally a wireless sensor networks
are capable of sensing useful information from

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 24
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

remote locations to an autonomous devices consumption by exploitation native


which are all together connected in a wireless collaboration among sensor nodes [3]. In this
medium to monitor the physical and new cluster based wireless sensor network
environmental changes that takes place like (CWSN), each and every node encompasses a
temperature, wind pressure, humidity in air and leader device node, thought to be cluster-head
various physical and climatic changes. As they (CH).Initially the cluster head node try to
are very important for sensing the information aggregate all the nodes information which was
to-and fro autonomous devices, yet still they collected from their leaf nodes (I.e we treat leaf
face a common problem like identifying the nodes as Non CH device nodes) in its cluster
attacker or failure node accurately during and try to send that nodes information to the
transmission of data. This is a major problem Base station which is connected to that CH
as the wireless sensor networks have no fixed device node which is shown in figure 2.
topology and they are almost topology less
networks. Hence if there is any attack occurred
In general the LEACH (Low-Energy
it is very difficult to find the exact location
accommodative Clustering Hierarchy) protocol
where the attack took place, as the nodes
bestowed by Heinzelman et al. [4] may be a
always moves from one location to other. wide familiar and effective one to cut back and
balance the whole energy consumption for
D
CWSNs. This LEACH protocol initially to
prevent the fast energy consumption of the set
TE
of Cluster Heads, it will indiscriminately
rotates the cluster heads among all device
nodes in the network, in rounds. Following the
thought of LEACH, a number of protocols are
bestowed like APTEEN [5] and PEACH [7]
E

that use similar ideas of LEACH. In this paper,


for convenience, we tend to decision this kind
of cluster-based protocols as LEACH-like
IJ

protocols. Researchers are widely learning


CWSNs[6] within the last decade within the
literature; however, the implementation of the
cluster-based design in the universe is very
complicated .

Main Contributions

Figure. 1. Represents the architecture In this section we mainly discuss


flow of LEACH Protocol about the main contributions that was studied
and analyzed in this proposed paper. Now let is
look about that in detail.
Hence the researchers try to design a
new wireless sensor network which is cluster -
based network, so as to realize the network After conducting a thorough analysis on
measurability and management that maximizes our proposed model, we have a tendency to
node period and cut back bandwidth propose a two level of protocols with a Secure

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 25
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

and economical information Transmission this new technique, initially they choose
(SET) facilities for CWSNs, referred to as randomly two large primes p and q, and let
SET-IBS and SETIBOOS, by victimization the E/Fp indicate an elliptic curve
IBS theme and therefore the IBOOS scheme is
mainly deal with either online or offline mode y2 = x3 + ax + b (4a3 + 27b2 0)
of data transmission in a cluster based wireless
sensor networks. The key plan of each SET- over a finite field Fp. We denote by G1 a q-
IBS and SET-IBOOS is to evidence the order subgroup of the additive group of points
encrypted detected data, by applying digital in E/Fp, and G2 a q-order subgroup of the
signatures to message packets, which are multiplicative group in the finite field Fp*. The
economical in communication and applying the pairing is a mapping e : G1G1 G2, which is
key management for security[9]. Within the a bilinear map with the following properties.
projected protocols, secret keys and pairing
parameters are distributed and preloaded Bilinear: P, Q, R, S G1, e (P + Q,
altogether sensing element nodes by the SB at
R + S) = e (P, R) e (P, S ) e (Q, R) e
the start, which overcomes the key written
agreement drawback represented in ID-based (Q, S). In the same way, c, d Zq,
crypto-systems. e (cP, dQ) =e (P, dQ) c =e (cP, Q) d

A Novel Secure and Efficient


D =e (P, Q) cd, etc.
TE
Non-degeneracy: If P is a generator
Transmission ( SET )Protocol of G1, then e (P, P) is a generator of
G2.
In this section, we will mainly discuss
about the proposed Novel Secure Efficient
Computability: There is an efficient
E

Transmission protocol for efficient data


algorithm to compute e (P, Q) in G2,
P, Q G1.
transfer in wireless sensor networks based on
Identity Based Signature in Online/Offline.
IJ

IBS Technique Proposed Enhanced Identity


Based Digital Signature for CWSN
In this section we mainly discuss
about the identity based digital signature (IBS) An IBS theme enforced for CWSNs
technique which was applied for cluster based consists of the following operations,
wireless sensor networks in order to identify specifically, setup at the BS, key extraction and
the impact of attackers. In the traditional WSN signature linguistic communication of the info
there was no integration of this IBS technique, causation nodes, and verification of the info
so there were many limitations and failures that receiving nodes,which is clearly shown in
take place in usage of traditional wsn networks. figure 3.

A two well known authors like Boneh


and Franklin for the first time have introduced
Setup Phase: The Batch Signature (BS)
the novel functional and efficient ID-based initially generates a passkey msk and public
encryption scheme based on bilinear pairings parameters param for the non-public key
on elliptic curves [9]. In order to implement

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 26
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

generator (PKG), and offers them to all or the data causing nodes, and verification of the
any device nodes. receiving nodes.

Extraction: Given associate degree ID string, Setup: Same as that within the IBS theme.
a device node generates a private key sekID
related to the ID exploitation msk. Extraction: Same as that within the IBS
theme.
Signature signing: Given a message M,
time-stamp t and a linguistic communication Offline Signing: Given public parameters and
key , the causation node generates a signature time-stamp t, the CH detector node generates
SIG. associate degree offline signature SIGoffline,
and transmit it to the leaf nodes in its cluster.
Verification: Given the ID, M and SIG, the
receiving node outputs accept if SIG is valid, On-line signing: From the non-public key
and outputs reject otherwise. sekID, SIGoffline and message M, a causing
node (leaf node) generates a web signature
SIGonline.

D
Verification: Given ID, M and SIG online,
the receiving node (CH node) outputs accept
TE
if SIGonline is valid, and outputs reject
otherwise.

Implementation Phase
E

Implementation is the stage where


IJ

theoretical design is converted into a practical


form by dividing application into following
modules. The below are the 6 modules which
are developed in this application for
Figure. 3. Shows the process of generating implementing the IBOOS on cluster based
a Identity based Digital Signature wireless sensor networks.

SET Protocol
Extended IBOOS Scheme
In this module, Secure and Efficient
for CWSNs data Transmission (SET) protocol for CWSNs.
The SET-IBOOS protocol is designed with the
same purpose and scenarios for CWSNs with
An Enhanced IBOOS theme enforced higher efficiency. The proposed SET-IBOOS
for CWSNs consists of following four operates similarly to the previous SETIBS,
operations, specifically, setup at the which has a protocol initialization prior to the
baccalaureate, key extraction and offline sign network deployment and operates in rounds
language at the CHs, on-line sign language of during communication. We first introduce the

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 27
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

protocol initialization, and then describe the SET-IBS and SET-IBOOS, in the secure data
key management of the protocol by using the transmission with a symmetric key
IBOOS scheme, and the protocol operations management, the larger network scale
afterwards. increases, the more orphan nodes appear in the
network.And there was no communication
Key Management for Security overhead problem for the data packets which
are stored during communication.
In this module, security is based on
the DLP in the multiplicative group. The
corresponding private pairing parameters are Computational Overhead &
preloaded in the sensor nodes during the Attack Resilience Module
protocol initialization. The IBOOS scheme in
the proposed SET-IBOOS consists of In this module, the energy cost and
following four operations, extraction, oine computation efficiency on the generation and
signing, online signing and verifications. verifications of the certificates or signatures for
security. The attack resilience is nothing but
the facility where the security protocol can
Key Management Module protect against any type of attacks.

In this Module, the key cryptographies


used in the protocol to achieve secure data
transmission, which consist of symmetric and
D
Conclusion
TE
asymmetric key based security. In this paper, we have finally
concluded with a two set of new algorithms
Neighborhood Authentication & based on identity based digital signature either
Storage Cost Module in online or offline mode. These two
algorithms are efficient in identifying the
E

failure nodes which are available in wireless


In this module, used for secure access medium and provides and efficient data
and data transmission to nearby sensor nodes,
IJ

transmission. Finally , the comparison between


by authenticating with each other. Here, the calculation and simulation results show
limited means the probability of that, the planned SET-IBS and SET-IBOOS
neighborhood authentication, where only the protocols have higher performance than
nodes with the shared Pair wise key can existing secure protocols for CWSNs As an
authenticate each other. Here the storage cost is extension for this paper we have implemented
denoted as the number of security keys that are this proposed algorithm with 3 attacks like
stored on sensors node memory. active, passive and compromised attacks in the
wireless media. By conducting various
Network Scalability& experiments on the proposed two algorithms on
Communication Overhead Module a LAN network our simulation results clearly
tells that this proposed concept will achieve
high level of data security while transferring
In this module, indicates whether a
data through wireless media.
security protocol is able to scale without
compromising the security requirements. Here,
comparative low means that, compared with

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 28
International Journal of Emerging Trends in Engineering and Development Issue 7, Vol. 1 (January 2017)

_________________________
Available online on http://www.rspublication.com/ijeted/ijeted_index.htm ISSN 2249-6149

References [9] K. Pradeepa, W. R. Anne, and S.


Duraisamy, Design and Implementation
problems of clump in Wireless detector
[1] W. Heinzelman, A. Chandrakasan, and H. Networks, Int. J. Comput. Applications, vol.
Balakrishnan, An application-specific 47, no. 11, 2012.
protocol design for wireless microsensor
networks, IEEE Trans. Wireless Commun.,
vol. 1, no. 4, 2002. About the Authors
[2] A. Manjeshwar, Q.-A.Zeng, and D. P.
Agrawal, An analytical model for data CHIGURUPATI GOVARDHAN is currently
retrieval in wireless detector networks pursuing his second years
victimisation increased APTEEN M.Tech (CST) in
protocol,IEEE Trans. Parallel Distrib. Syst., Department of Computer
vol. 13, 2002. Science and Systems
Engineering at College of
[3] T. Hara, V. I. Zadorozhny, and E.
Engineering, Andhra
Buchmann, Wireless detector Network
University, Visakhapatnam,
Technologies for the information. Explosion
AP, India.His area of
Era, Stud. Comput. Intell. Springer-Verlag,
2010, vol. 278.
D interest includes Computer
Networks and Web
TE
Designing.
[4] Y.Wang, G. Attebury, and B. Ramamurthy,
A Survey of Security problems in Wireless
Sensor Networks, IEEE Commun. Surveys
Tuts., vol. 8, no. 2, 2006.
E

[5] A. A. Abbasi and M. Younis, A survey on DR. M.SAMPATH KUMAR is currently


clump algorithms for wireless detector working as an Associate
IJ

networks, Comput. Commun., vol. 30, no. 14- Professor in Department


15, 2007. of Computer Science and
Systems Engineering at
[6] S. Yi, J. Heo, Y. Cho et al., PEACH: College of Engineering,
Andhra University,
Power-efficient and adjustive clump hierarchy
Visakhapatnam, AP,
protocol for WSNs, Comput. Commun., vol.
India. He has more than
30, no. 14-15, 2007.
20 years of teaching
experience. His research
[7] H. Lu, J. Li, and H. Kameda, A Secure interest includes crypto-
Routing Protocol for Cluster-Based WSNs graphy,Image Processing
Using ID-Based Digital Signature, in Proc.
IEEE GLOBECOM, 2010. and Computer Networks.

[8] D. Boneh and M. Franklin, Identity-Based


coding from the Weil Pairing, in Lect. Notes.
Comput. Sc. - CRYPTO, 2001.

_________________________
2017 RS Publication, rspublicationhouse@gmail.com Page 29

Вам также может понравиться