Download Effective Key Management in Dynamic Wireless

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed operating system wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

CAN bus wikipedia , lookup

Web of trust wikipedia , lookup

Transcript
DATA ALCOTT SYSTEM,
www.finalsemprojects.com
09600095046/ 47
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
EFFECTIVE KEY MANAGEMENT IN DYNAMIC WIRELESS SENSOR
NETWORKS
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
ABSTRACT
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety
of applications, including military sensing and tracking, patient status monitoring,
traffic flow monitoring, where sensory devices often move between different
locations. Securing data and communications requires suitable encryption key
protocols. A certificateless-effective key management (CL-EKM) protocol is
proposed for secure communication in dynamic WSNs characterized by node
mobility. The CL-EKM supports efficient key updates when a node leaves or joins
a cluster and ensures forward and backward key secrecy. The protocol also
supports efficient key revocation for compromised nodes and minimizes the impact
of a node compromise on the security of other communication links. A security
analysis of this scheme shows that proposed protocol is effective in defending
against various attacks.
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
INTRODUCTION
Dynamic wireless sensor networks (WSNs), which enable mobility of sensor
nodes, facilitate wider network coverage and more accurate service than static
WSNs. Therefore, dynamic WSNs are being rapidly adopted in monitoring
applications, such as target tracking in battlefield surveillance, healthcare systems,
traffic flow and vehicle status monitoring, dairy cattle health monitoring. However,
sensor devices are vulnerable to malicious attacks such as impersonation,
interception, capture or physical destruction, due to their unattended operative
environments and lapses of connectivity in wireless communication. Thus, security
is one of the most important issues in many critical dynamic WSN applications.
Dynamic WSNs thus need to address key security requirements, such as node
authentication, data confidentiality and integrity, whenever and wherever the nodes
move.
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
EXISTING SYSTEM
 To address security, encryption key management protocols for dynamic
WSNs have been proposed in the past based on symmetric key encryption.
Such type of encryption is well-suited for sensor nodes because of their
limited energy and processing capability.
 Asymmetric key based approaches have been proposed for dynamic WSNs.
These approaches take advantage of public key cryptography (PKC) such as
elliptic curve cryptography (ECC) or identity-based public key cryptography
(ID-PKC) in order to simplify key establishment and data authentication
between nodes. PKC is relatively more expensive than symmetric key
encryption with respect to computational costs.
 The critical security flaws studied that the static private key is exposed to the
other when both nodes establish the session key. Moreover, these ECCbased schemes with certificates when directly applied to dynamic WSNs,
suffer from the certificate management overhead of all the sensor nodes and
so are not a practical application for large scale WSNs. The pairing
operation based ID-PKC schemes are inefficient due to the computational
overhead for pairing operations.
DATA ALCOTT SYSTEM,
www.finalsemprojects.com
09600095046/ 47
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
Disadvantages
 Encryption key management protocols suffers from high communication
overhead and requires large memory space to store shared pairwise keys. It
is also not scalable and not resilient against compromises, and unable to
support node mobility. Therefore symmetric key encryption is not suitable
for dynamic WSNs.
 However, recent improvements in the implementation of ECC have
demonstrated the feasibility of applying PKC to WSNs.
 Moreover, PKC is more resilient to node compromise attacks and is more
scalable and flexible. However, we found the security weaknesses of
existing ECC-based schemes that these approaches are vulnerable to
message forgery, key compromise and known-key attacks.
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
PROPOSED SYSTEM
 A certificateless effective key management (CL-EKM) scheme is proposed
for dynamic WSNs.
 In certificateless public key cryptography (CL-PKC), the user’s full private
key is a combination of a partial private key generated by a key generation
center (KGC) and the user’s own secret value.
 The special organization of the full private/public key pair removes the need
for certificates and also resolves the key escrow problem by removing the
responsibility for the user’s full private key.
 In order to dynamically provide both node authentication and establish a
pairwise key between nodes, CL-EKM is built by utilizing a pairing-free
certificateless hybrid signcryption scheme (CL-HSC).
 Due to the properties of CL-HSC, the pairwise key of CL-EKM can be
efficiently shared between two nodes without requiring taxing pairing
operations and the exchange of certificates.
 To support node mobility, CL-EKM also supports lightweight processes for
cluster key updates executed when a node moves, and key revocation is
executed when a node is detected as malicious or leaves the cluster
permanently.
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
Advantages
 CL-EKM is scalable in case of additions of new nodes after network
deployment.
 CL-EKM is secure against node compromise, cloning and impersonation,
and ensures forward and backward secrecy.
 The security weaknesses of existing ECC based key management schemes
for dynamic WSNs.
 CL-EKM supports four types of keys, each of which is used for a different
purpose, including secure pair-wise node communication and group-oriented
key communication within clusters.
 Efficient key management procedures are defined as supporting node
movements across different clusters and key revocation process for
compromised nodes.
DATA ALCOTT SYSTEM,
www.finalsemprojects.com
09600095046/ 47
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
LITERATURE SUMAMRY
Symmetric key schemes
Symmetric key schemes are not viable for mobile sensor nodes and thus past
approaches have focused only on static WSNs. A few approaches have been
proposed based on PKC to support dynamic WSNs.
Drawbacks
Chuang et al. and Agrawal et al. proposed a two-layered key management scheme
and a dynamic key update protocol in dynamic WSNs based on the Diffie-Hellman
(DH), respectively. However, both schemes are not suited for sensors with limited
resources and are unable to perform expensive computations with large key sizes.
ECC Scheme
Since ECC is computationally more efficient and has a short key length, several
approaches with certificate have been proposed based on ECC.
Drawbacks
However, since each node must exchange the certificate to establish the pairwise
key and verify each other’s certificate before use, the communication and
computation overhead increase dramatically. Also, the BS suffers from the
overhead of certificate management. Moreover, existing schemes are not secure.
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
ECC-based signcryption
Alagheband et al. proposed a key management scheme by using ECC-based
signcryption, but this scheme is insecure against message forgery attacks.
Huang et al. proposed a ECC-based key establishment scheme for self-organizing
WSNs.
Drawbacks
However, the security weaknesses is found.
Distributed deterministic key management scheme
Zhang et al. proposed a distributed deterministic key management scheme based
on ECC for dynamic WSNs. It uses the symmetric key approach for sharing the
pairwise key for existing nodes and uses an asymmetric key approach to share the
pairwise keys for a new node after deployment.
Drawbacks
However, since the initial key KI is used to compute the individual keys and the
pairwise keys after deployment for all nodes, if an adversary obtains KI, the
adversary has the ability to compute all individual keys and the pairwise keys for
all nodes.
ECDSA scheme
DATA ALCOTT SYSTEM,
09600095046/ 47
www.finalsemprojects.com
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
Du et al. use a ECDSA scheme to verify the identity of a cluster head and a static
EC-Diffie- Hellman key agreement scheme to share the pairwise key between the
cluster heads.
Drawbacks
But this scheme is not secure against known-key attacks, because the pairwise key
between the cluster heads is static. On the other hand, Du et al. use a modular
arithmetic-based symmetric key approach to share the pairwise key between a
sensor node and a cluster head. Thus, a sensor node cannot directly establish a
pairwise key with other sensor nodes and, instead, it requires the support of the
cluster head.
ID-PKC based key management schemes
Rahman et al. and Chatterjee et al. have proposed ID-PKC based key management
schemes supporting the mobility of nodes in dynamic WSNs which removes the
certificate management overhead.
Drawbacks
However, their schemes require expensive pairing operations. Although many
approaches that enable pairing operations for sensor nodes have been proposed, the
computational cost required for pairing is still considerably higher than standard
operations such as ECC point multiplication.
DATA ALCOTT SYSTEM,
www.finalsemprojects.com
09600095046/ 47
www.ns2projects.com
[email protected]
IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB
HARDWARE REQUIREMENTS
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 Gb.
Compact Disk
: 650 Mb.
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System
: Win2000/XP / Linux 9.0
Programming Package
: TCL coding
Tools
: VM ware Workstation