* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Effective Key Management in Dynamic Wireless
Survey
Document related concepts
Transcript
DATA ALCOTT SYSTEM, www.finalsemprojects.com 09600095046/ 47 www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB EFFECTIVE KEY MANAGEMENT IN DYNAMIC WIRELESS SENSOR NETWORKS DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB ABSTRACT Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. A certificateless-effective key management (CL-EKM) protocol is proposed for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of this scheme shows that proposed protocol is effective in defending against various attacks. DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB INTRODUCTION Dynamic wireless sensor networks (WSNs), which enable mobility of sensor nodes, facilitate wider network coverage and more accurate service than static WSNs. Therefore, dynamic WSNs are being rapidly adopted in monitoring applications, such as target tracking in battlefield surveillance, healthcare systems, traffic flow and vehicle status monitoring, dairy cattle health monitoring. However, sensor devices are vulnerable to malicious attacks such as impersonation, interception, capture or physical destruction, due to their unattended operative environments and lapses of connectivity in wireless communication. Thus, security is one of the most important issues in many critical dynamic WSN applications. Dynamic WSNs thus need to address key security requirements, such as node authentication, data confidentiality and integrity, whenever and wherever the nodes move. DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB EXISTING SYSTEM To address security, encryption key management protocols for dynamic WSNs have been proposed in the past based on symmetric key encryption. Such type of encryption is well-suited for sensor nodes because of their limited energy and processing capability. Asymmetric key based approaches have been proposed for dynamic WSNs. These approaches take advantage of public key cryptography (PKC) such as elliptic curve cryptography (ECC) or identity-based public key cryptography (ID-PKC) in order to simplify key establishment and data authentication between nodes. PKC is relatively more expensive than symmetric key encryption with respect to computational costs. The critical security flaws studied that the static private key is exposed to the other when both nodes establish the session key. Moreover, these ECCbased schemes with certificates when directly applied to dynamic WSNs, suffer from the certificate management overhead of all the sensor nodes and so are not a practical application for large scale WSNs. The pairing operation based ID-PKC schemes are inefficient due to the computational overhead for pairing operations. DATA ALCOTT SYSTEM, www.finalsemprojects.com 09600095046/ 47 www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB Disadvantages Encryption key management protocols suffers from high communication overhead and requires large memory space to store shared pairwise keys. It is also not scalable and not resilient against compromises, and unable to support node mobility. Therefore symmetric key encryption is not suitable for dynamic WSNs. However, recent improvements in the implementation of ECC have demonstrated the feasibility of applying PKC to WSNs. Moreover, PKC is more resilient to node compromise attacks and is more scalable and flexible. However, we found the security weaknesses of existing ECC-based schemes that these approaches are vulnerable to message forgery, key compromise and known-key attacks. DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB PROPOSED SYSTEM A certificateless effective key management (CL-EKM) scheme is proposed for dynamic WSNs. In certificateless public key cryptography (CL-PKC), the user’s full private key is a combination of a partial private key generated by a key generation center (KGC) and the user’s own secret value. The special organization of the full private/public key pair removes the need for certificates and also resolves the key escrow problem by removing the responsibility for the user’s full private key. In order to dynamically provide both node authentication and establish a pairwise key between nodes, CL-EKM is built by utilizing a pairing-free certificateless hybrid signcryption scheme (CL-HSC). Due to the properties of CL-HSC, the pairwise key of CL-EKM can be efficiently shared between two nodes without requiring taxing pairing operations and the exchange of certificates. To support node mobility, CL-EKM also supports lightweight processes for cluster key updates executed when a node moves, and key revocation is executed when a node is detected as malicious or leaves the cluster permanently. DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB Advantages CL-EKM is scalable in case of additions of new nodes after network deployment. CL-EKM is secure against node compromise, cloning and impersonation, and ensures forward and backward secrecy. The security weaknesses of existing ECC based key management schemes for dynamic WSNs. CL-EKM supports four types of keys, each of which is used for a different purpose, including secure pair-wise node communication and group-oriented key communication within clusters. Efficient key management procedures are defined as supporting node movements across different clusters and key revocation process for compromised nodes. DATA ALCOTT SYSTEM, www.finalsemprojects.com 09600095046/ 47 www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB LITERATURE SUMAMRY Symmetric key schemes Symmetric key schemes are not viable for mobile sensor nodes and thus past approaches have focused only on static WSNs. A few approaches have been proposed based on PKC to support dynamic WSNs. Drawbacks Chuang et al. and Agrawal et al. proposed a two-layered key management scheme and a dynamic key update protocol in dynamic WSNs based on the Diffie-Hellman (DH), respectively. However, both schemes are not suited for sensors with limited resources and are unable to perform expensive computations with large key sizes. ECC Scheme Since ECC is computationally more efficient and has a short key length, several approaches with certificate have been proposed based on ECC. Drawbacks However, since each node must exchange the certificate to establish the pairwise key and verify each other’s certificate before use, the communication and computation overhead increase dramatically. Also, the BS suffers from the overhead of certificate management. Moreover, existing schemes are not secure. DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB ECC-based signcryption Alagheband et al. proposed a key management scheme by using ECC-based signcryption, but this scheme is insecure against message forgery attacks. Huang et al. proposed a ECC-based key establishment scheme for self-organizing WSNs. Drawbacks However, the security weaknesses is found. Distributed deterministic key management scheme Zhang et al. proposed a distributed deterministic key management scheme based on ECC for dynamic WSNs. It uses the symmetric key approach for sharing the pairwise key for existing nodes and uses an asymmetric key approach to share the pairwise keys for a new node after deployment. Drawbacks However, since the initial key KI is used to compute the individual keys and the pairwise keys after deployment for all nodes, if an adversary obtains KI, the adversary has the ability to compute all individual keys and the pairwise keys for all nodes. ECDSA scheme DATA ALCOTT SYSTEM, 09600095046/ 47 www.finalsemprojects.com www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB Du et al. use a ECDSA scheme to verify the identity of a cluster head and a static EC-Diffie- Hellman key agreement scheme to share the pairwise key between the cluster heads. Drawbacks But this scheme is not secure against known-key attacks, because the pairwise key between the cluster heads is static. On the other hand, Du et al. use a modular arithmetic-based symmetric key approach to share the pairwise key between a sensor node and a cluster head. Thus, a sensor node cannot directly establish a pairwise key with other sensor nodes and, instead, it requires the support of the cluster head. ID-PKC based key management schemes Rahman et al. and Chatterjee et al. have proposed ID-PKC based key management schemes supporting the mobility of nodes in dynamic WSNs which removes the certificate management overhead. Drawbacks However, their schemes require expensive pairing operations. Although many approaches that enable pairing operations for sensor nodes have been proposed, the computational cost required for pairing is still considerably higher than standard operations such as ECC point multiplication. DATA ALCOTT SYSTEM, www.finalsemprojects.com 09600095046/ 47 www.ns2projects.com [email protected] IEEE PROJECTS IN JAVA/NS2/HADOOP/BIGDATA/ANDROID/NS3/MATLAB HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Win2000/XP / Linux 9.0 Programming Package : TCL coding Tools : VM ware Workstation